[SUSE-SU-2015:1174-1] Security update for Linux kernel

Severity Moderate
Affected Packages 95
CVEs 148

Security update for Linux kernel

The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix
various bugs and security issues.

The following security bugs have been fixed:

* 

  CVE-2014-1739: The media_device_enum_entities function in
  drivers/media/media-device.c in the Linux kernel before 3.14.6 does
  not initialize a certain data structure, which allows local users to
  obtain sensitive information from kernel memory by leveraging
  /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call
  (bnc#882804).

* 

  CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not
  properly implement the interaction between range notification and
  hole punching, which allows local users to cause a denial of service
  (i_mutex hold) by using the mmap system call to access a hole, as
  demonstrated by interfering with intended shmem activity by blocking
  completion of (1) an MADV_REMOVE madvise call or (2) an
  FALLOC_FL_PUNCH_HOLE fallocate call (bnc#883518).

* 

  CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through
  3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and
  the sep CPU feature flag is set, allows local users to cause a denial
  of service (OOPS and system crash) via an invalid syscall number, as
  demonstrated by number 1000 (bnc#883724).

* 

  CVE-2014-4667: The sctp_association_free function in
  net/sctp/associola.c in the Linux kernel before 3.15.2 does not
  properly manage a certain backlog value, which allows remote
  attackers to cause a denial of service (socket outage) via a crafted
  SCTP packet (bnc#885422).

* 

  CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the
  Linux kernel through 3.15.6 allows local users to gain privileges by
  leveraging data-structure differences between an l2tp socket and an
  inet socket (bnc#887082).

* 

  CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c
  in the Linux kernel through 3.15.8, when SCTP authentication is
  enabled, allows remote attackers to cause a denial of service (NULL
  pointer dereference and OOPS) by starting to establish an association
  between two endpoints immediately after an exchange of INIT and INIT
  ACK chunks to establish an earlier association between these
  endpoints in the opposite direction (bnc#889173).

* 

  CVE-2014-5471: Stack consumption vulnerability in the
  parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the
  Linux kernel through 3.16.1 allows local users to cause a denial of
  service (uncontrolled recursion, and system crash or reboot) via a
  crafted iso9660 image with a CL entry referring to a directory entry
  that has a CL entry. (bnc#892490)

* 

  CVE-2014-5472: The parse_rock_ridge_inode_internal function in
  fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users
  to cause a denial of service (unkillable mount process) via a crafted
  iso9660 image with a self-referential CL entry. (bnc#892490)

* 

  CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux
  kernel before 3.13.7 allows remote attackers to cause a denial of
  service (system crash) via network traffic that improperly interacts
  with the WLAN_STA_PS_STA state (aka power-save mode), related to
  sta_info.c and tx.c. (bnc#871797)

* 

  CVE-2014-4027: The rd_build_device_space function in
  drivers/target/target_core_rd.c in the Linux kernel before 3.14 does
  not properly initialize a certain data structure, which allows local
  users to obtain sensitive information from ramdisk_mcp memory by
  leveraging access to a SCSI initiator. (bnc#882639)

* 

  CVE-2014-3153 The futex_requeue function in kernel/futex.c in the
  Linux kernel through 3.14.5 does not ensure that calls have two
  different futex addresses, which allows local users to gain
  privileges via a crafted FUTEX_REQUEUE command that facilitates
  unsafe waiter modification. (bnc#880892)

* 

  CVE-2014-6410: Avoid infinite loop when processing indirect ICBs
  (bnc#896689)

The following non-security bugs have been fixed:

* ACPI / PAD: call schedule() when need_resched() is true (bnc#866911).
* ACPI: Fix bug when ACPI reset register is implemented in system
  memory (bnc#882900).
* ACPI: Limit access to custom_method (bnc#884333).
* ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746).
* Add option to automatically enforce module signatures when in Secure
  Boot mode (bnc#884333).
* Add secure_modules() call (bnc#884333).
* Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344).
* Backported new patches of Lock down functions for UEFI secure boot
  Also updated series.conf and removed old patches.
* Btrfs: Return EXDEV for cross file system snapshot.
* Btrfs: abort the transaction when we does not find our extent ref.
* Btrfs: avoid warning bomb of btrfs_invalidate_inodes.
* Btrfs: cancel scrub on transaction abortion.
* Btrfs: correctly set profile flags on seqlock retry.
* Btrfs: does not check nodes for extent items.
* Btrfs: fix a possible deadlock between scrub and transaction
  committing.
* Btrfs: fix corruption after write/fsync failure + fsync + log
  recovery (bnc#894200).
* Btrfs: fix csum tree corruption, duplicate and outdated checksums
  (bnc#891619).
* Btrfs: fix double free in find_lock_delalloc_range.
* Btrfs: fix possible memory leak in btrfs_create_tree().
* Btrfs: fix use of uninit 'ret' in end_extent_writepage().
* Btrfs: free delayed node outside of root->inode_lock (bnc#866864).
* Btrfs: make DEV_INFO ioctl available to anyone.
* Btrfs: make FS_INFO ioctl available to anyone.
* Btrfs: make device scan less noisy.
* Btrfs: make sure there are not any read requests before stopping
  workers.
* Btrfs: more efficient io tree navigation on wait_extent_bit.
* Btrfs: output warning instead of error when loading free space cache
  failed.
* Btrfs: retrieve more info from FS_INFO ioctl.
* Btrfs: return EPERM when deleting a default subvolume (bnc#869934).
* Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol
  (bnc#866615).
* Btrfs: use right type to get real comparison.
* Btrfs: wake up @scrub_pause_wait as much as we can.
* Btrfs: wake up transaction thread upon remount.
* CacheFiles: Add missing retrieval completions (bnc#880344).
* CacheFiles: Does not try to dump the index key if the cookie has been
  cleared (bnc#880344).
* CacheFiles: Downgrade the requirements passed to the allocator
  (bnc#880344).
* CacheFiles: Fix the marking of cached pages (bnc#880344).
* CacheFiles: Implement invalidation (bnc#880344).
* CacheFiles: Make some debugging statements conditional (bnc#880344).
* Drivers: hv: util: Fix a bug in the KVP code (bnc#886840).
* Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code
  (bnc#886840).
* FS-Cache: Add transition to handle invalidate immediately after
  lookup (bnc#880344).
* FS-Cache: Check that there are no read ops when cookie relinquished
  (bnc#880344).
* FS-Cache: Clear remaining page count on retrieval cancellation
  (bnc#880344).
* FS-Cache: Convert the object event ID #defines into an enum
  (bnc#880344).
* FS-Cache: Does not sleep in page release if __GFP_FS is not set
  (bnc#880344).
* FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344).
* FS-Cache: Exclusive op submission can BUG if there is been an I/O
  error (bnc#880344).
* FS-Cache: Fix __wait_on_atomic_t() to call the action func if the
  counter != 0 (bnc#880344).
* FS-Cache: Fix object state machine to have separate work and wait
  states (bnc#880344).
* FS-Cache: Fix operation state management and accounting (bnc#880344).
* FS-Cache: Fix signal handling during waits (bnc#880344).
* FS-Cache: Initialise the object event mask with the calculated mask
  (bnc#880344).
* FS-Cache: Limit the number of I/O error reports for a cache
  (bnc#880344).
* FS-Cache: Make cookie relinquishment wait for outstanding reads
  (bnc#880344).
* FS-Cache: Mark cancellation of in-progress operation (bnc#880344).
* FS-Cache: One of the write operation paths doeses not set the object
  state (bnc#880344).
* FS-Cache: Provide proper invalidation (bnc#880344).
* FS-Cache: Simplify cookie retention for fscache_objects, fixing oops
  (bnc#880344).
* FS-Cache: The retrieval remaining-pages counter needs to be atomic_t
  (bnc#880344).
* FS-Cache: Uninline fscache_object_init() (bnc#880344).
* FS-Cache: Wrap checks on object state (bnc#880344).
* HID: usbhid: add always-poll quirk (bnc#888607).
* HID: usbhid: enable always-poll quirk for Elan Touchscreen
  (bnc#888607).
* IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297).
* Ignore 'flags' change to event_constraint (bnc#876114).
* Ignore data_src/weight changes to perf_sample_data (bnc#876114).
* NFS: Allow more operations in an NFSv4.1 request (bnc#890513).
* NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968).
* NFS: Does not copy read delegation stateids in setattr (bnc#888968).
* NFS: Does not use a delegation to open a file when returning that
  delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496)
* NFS: Fixes for NFS RCU-walk support in line with code going upstream
* NFS: Use FS-Cache invalidation (bnc#880344).
* NFS: allow lockless access to access_cache (bnc#866130).
* NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts
  (bnc#888591).
* NFS: nfs4_do_open should add negative results to the dcache
  (bnc#866130).
* NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a
  page (bnc#880344).
* NFS: nfs_open_revalidate: only evaluate parent if it will be used
  (bnc#866130).
* NFS: prepare for RCU-walk support but pushing tests later in code
  (bnc#866130).
* NFS: support RCU_WALK in nfs_permission() (bnc#866130).
* NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130).
* NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130).
* NFSD: Does not hand out delegations for 30 seconds after recalling
  them (bnc#880370).
* NFSv4 set open access operation call flag in nfs4_init_opendata_res
  (bnc#888968, bnc#892200, bnc#893596, bnc#893496).
* NFSv4: Add a helper for encoding opaque data (bnc#888968).
* NFSv4: Add a helper for encoding stateids (bnc#888968).
* NFSv4: Add helpers for basic copying of stateids (bnc#888968).
* NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968).
* NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968).
* NFSv4: Rename nfs4_copy_stateid() (bnc#888968).
* NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an
  error (bnc#888968).
* NFSv4: Simplify the struct nfs4_stateid (bnc#888968).
* NFSv4: The stateid must remain the same for replayed RPC calls
  (bnc#888968).
* NFSv4: nfs4_stateid_is_current should return 'true' for an invalid
  stateid (bnc#888968).
* One more fix for kABI breakage.
* PCI: Lock down BAR access when module security is enabled
  (bnc#884333).
* PCI: enable MPS 'performance' setting to properly handle bridge MPS
  (bnc#883376).
* PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441).
* PM / Hibernate: Create a Radix-Tree to store memory bitmap
  (bnc#860441).
* PM / Hibernate: Implement position keeping in radix tree
  (bnc#860441).
* PM / Hibernate: Iterate over set bits instead of PFNs in
  swsusp_free() (bnc#860441).
* PM / Hibernate: Remove the old memory-bitmap implementation
  (bnc#860441).
* PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node
  (bnc#860441).
* Restrict /dev/mem and /dev/kmem when module loading is restricted
  (bnc#884333).
* Reuse existing 'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT
  (bnc#876114).
* USB: handle LPM errors during device suspend correctly (bnc#849123).
* Update kabi files to reflect fscache change (bnc#880344)
* Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281)
* VFS: Make more complete truncate operation available to CacheFiles
  (bnc#880344).
* [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366,
  ltc#83367).
* acpi: Ignore acpi_rsdp kernel parameter when module loading is
  restricted (bnc#884333).
* af_iucv: correct cleanup if listen backlog is full (bnc#885262,
  LTC#111728).
* asus-wmi: Restrict debugfs interface when module loading is
  restricted (bnc#884333).
* autofs4: allow RCU-walk to walk through autofs4 (bnc#866130).
* autofs4: avoid taking fs_lock during rcu-walk (bnc#866130).
* autofs4: does not take spinlock when not needed in
  autofs4_lookup_expiring (bnc#866130).
* autofs4: factor should_expire() out of autofs4_expire_indirect
  (bnc#866130).
* autofs4: make 'autofs4_can_expire' idempotent (bnc#866130).
* autofs4: remove a redundant assignment (bnc#866130).
* autofs: fix lockref lookup (bnc#888591).
* be2net: add dma_mapping_error() check for dma_map_page()
  (bnc#881759).
* block: add cond_resched() to potentially long running ioctl discard
  loop (bnc#884725).
* block: fix race between request completion and timeout handling
  (bnc#881051).
* cdc-ether: clean packet filter upon probe (bnc#876017).
* cpuset: Fix memory allocator deadlock (bnc#876590).
* crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs
  have them, but some are FIPS certified, with some kernel support.
* crypto: fips - only panic on bad/missing crypto mod signatures
  (bnc#887503).
* crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips
  mode (bnc#889451).
* dasd: validate request size before building CCW/TCW (bnc#891087,
  LTC#114068).
* dm mpath: fix race condition between multipath_dtr and pg_init_done
  (bnc#826486).
* dm-mpath: fix panic on deleting sg device (bnc#870161).
* drm/ast: AST2000 cannot be detected correctly (bnc#895983).
* drm/ast: Actually load DP501 firmware when required (bnc#895608
  bnc#871134).
* drm/ast: Add missing entry to dclk_table[].
* drm/ast: Add reduced non reduced mode parsing for wide screen mode
  (bnc#892723).
* drm/ast: initial DP501 support (v0.2) (bnc#871134).
* drm/ast: open key before detect chips (bnc#895983).
* drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304).
* drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064).
* drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init
  (bnc#869055).
* drm/i915: create functions for the 'unclaimed register' checks
  (bnc#869055).
* drm/i915: use FPGA_DBG for the 'unclaimed register' checks
  (bnc#869055).
* drm/mgag200: Initialize data needed to map fbdev memory (bnc
  #806990).
* e1000e: enable support for new device IDs (bnc#885509).
* fs/fscache: remove spin_lock() from the condition in while()
  (bnc#880344).
* hibernate: Disable in a signed modules environment (bnc#884333).
* hugetlb: does not use ERR_PTR with VM_FAULT* values
* ibmvscsi: Abort init sequence during error recovery (bnc#885382).
* ibmvscsi: Add memory barriers for send / receive (bnc#885382).
* inet: add a redirect generation id in inetpeer (bnc#860593).
* inetpeer: initialize ->redirect_genid in inet_getpeer() (bnc#860593).
* ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645).
* kabi: hide bnc#860593 changes of struct inetpeer_addr_base
  (bnc#860593).
* kernel: 3215 tty hang (bnc#891087, LTC#114562).
* kernel: fix data corruption when reading /proc/sysinfo (bnc#891087,
  LTC#114480).
* kernel: fix kernel oops with load of fpc register (bnc#889061,
  LTC#113596).
* kernel: sclp console tty reference counting (bnc#891087, LTC#115466).
* kexec: Disable at runtime if the kernel enforces module loading
  restrictions (bnc#884333).
* md/raid6: avoid data corruption during recovery of double-degraded
  RAID6.
* memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim
  fix).
* memcg: do not expose uninitialized mem_cgroup_per_node to world
  (bnc#883096).
* mm, hugetlb: add VM_NORESERVE check in vma_has_reserves()
* mm, hugetlb: change variable name reservations to resv
* mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache
* mm, hugetlb: defer freeing pages when gathering surplus pages
* mm, hugetlb: do not use a page in page cache for cow optimization
* mm, hugetlb: fix and clean-up node iteration code to alloc or free
* mm, hugetlb: fix race in region tracking
* mm, hugetlb: fix subpool accounting handling
* mm, hugetlb: improve page-fault scalability
* mm, hugetlb: improve, cleanup resv_map parameters
* mm, hugetlb: move up the code which check availability of free huge
  page
* mm, hugetlb: protect reserved pages when soft offlining a hugepage
* mm, hugetlb: remove decrement_hugepage_resv_vma()
* mm, hugetlb: remove redundant list_empty check in
  gather_surplus_pages()
* mm, hugetlb: remove resv_map_put
* mm, hugetlb: remove useless check about mapping type
* mm, hugetlb: return a reserved page to a reserved pool if failed
* mm, hugetlb: trivial commenting fix
* mm, hugetlb: unify region structure handling
* mm, hugetlb: unify region structure handling kabi
* mm, hugetlb: use long vars instead of int in region_count() (Hugetlb
  Fault Scalability).
* mm, hugetlb: use vma_resv_map() map types
* mm, oom: fix badness score underflow (bnc#884582, bnc#884767).
* mm, oom: normalize oom scores to oom_score_adj scale only for
  userspace (bnc#884582, bnc#884767).
* mm, thp: do not allow thp faults to avoid cpuset restrictions
  (bnc#888849).
* net/mlx4_core: Load higher level modules according to ports type
  (bnc#887680).
* net/mlx4_core: Load the IB driver when the device supports IBoE
  (bnc#887680).
* net/mlx4_en: Fix a race between napi poll function and RX ring
  cleanup (bnc#863586).
* net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058).
* net: fix checksumming features handling in output path (bnc#891259).
* pagecache_limit: batch large nr_to_scan targets (bnc#895221).
* pagecachelimit: reduce lru_lock congestion for heavy parallel reclaim
  fix (bnc#895680).
* perf/core: Add weighted samples (bnc#876114).
* perf/x86: Add flags to event constraints (bnc#876114).
* perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114).
* perf: Add generic memory sampling interface (bnc#876114).
* qla2xxx: Avoid escalating the SCSI error handler if the command is
  not found in firmware (bnc#859840).
* qla2xxx: Clear loop_id for ports that are marked lost during fabric
  scanning (bnc#859840).
* qla2xxx: Does not check for firmware hung during the reset context
  for ISP82XX (bnc#859840).
* qla2xxx: Issue abort command for outstanding commands during cleanup
  when only firmware is alive (bnc#859840).
* qla2xxx: Reduce the time we wait for a command to complete during
  SCSI error handling (bnc#859840).
* qla2xxx: Set host can_queue value based on available resources
  (bnc#859840).
* restore smp_mb() in unlock_new_inode() (bnc#890526).
* s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061,
  LTC#113725).
* sched: fix the theoretical signal_wake_up() vs schedule() race
  (bnc#876055).
* sclp_vt220: Enable integrated ASCII console per default (bnc#885262,
  LTC#112035).
* scsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614).
* scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608).
* scsiback: correct grant page unmapping.
* scsiback: fix retry handling in __report_luns().
* scsiback: free resources after error.
* sunrpc/auth: allow lockless (rcu) lookup of credential cache
  (bnc#866130).
* supported.conf: remove external from drivers/net/veth (bnc#889727)
* supported.conf: support net/sched/act_police.ko (bnc#890426)
* tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921).
* tg3: Change nvram command timeout value to 50ms (bnc#855657).
* tg3: Override clock, link aware and link idle mode during NVRAM dump
  (bnc#855657).
* tg3: Set the MAC clock to the fastest speed during boot code load
  (bnc#855657).
* usb: Does not enable LPM if the exit latency is zero (bnc#832309).
* usbcore: Does not log on consecutive debounce failures of the same
  port (bnc#888105).
* usbhid: fix PIXART optical mouse (bnc#888607).
* uswsusp: Disable when module loading is restricted (bnc#884333).
* vscsi: support larger transfer sizes (bnc#774818).
* writeback: Do not sync data dirtied after sync start (bnc#833820).
* x86 thermal: Delete power-limit-notification console messages
  (bnc#882317).
* x86 thermal: Disable power limit notification interrupt by default
  (bnc#882317).
* x86 thermal: Re-enable power limit notification interrupt by default
  (bnc#882317).
* x86, cpu hotplug: Fix stack frame warning in
  check_irq_vectors_for_cpu_disable() (bnc#887418).
* x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847).
* x86/UV: Add kdump to UV NMI handler (bnc#888847).
* x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847).
* x86/UV: Move NMI support (bnc#888847).
* x86/UV: Update UV support for external NMI signals (bnc#888847).
* x86/uv/nmi: Fix Sparse warnings (bnc#888847).
* x86: Add check for number of available vectors before CPU down
  (bnc#887418).
* x86: Lock down IO port access when module security is enabled
  (bnc#884333).
* x86: Restrict MSR access when module loading is restricted
  (bnc#884333).

Security Issues:

* CVE-2013-1979
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979>
* CVE-2014-1739
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739>
* CVE-2014-2706
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706>
* CVE-2014-4027
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027>
* CVE-2014-4171
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171>
* CVE-2014-4508
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508>
* CVE-2014-4667
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667>
* CVE-2014-4943
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943>
* CVE-2014-5077
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077>
* CVE-2014-5471
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471>
* CVE-2014-5472
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472>
* CVE-2014-3153
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153>
* CVE-2014-6410
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410>

The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to fix
various bugs and security issues.

Following security bugs were fixed: CVE-2013-1979: The scm_set_cred
function in include/net/scm.h in the Linux kernel before 3.8.11 uses
incorrect uid and gid values during credentials passing, which allows local
users to gain privileges via a crafted application (bnc#816708).

CVE-2014-1739: The media_device_enum_entities function in
drivers/media/media-device.c in the Linux kernel before 3.14.6 does not
initialize a certain data structure, which allows local users to obtain
sensitive information from kernel memory by leveraging /dev/media0 read
access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804).

CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not
properly implement the interaction between range notification and hole
punching, which allows local users to cause a denial of service (i_mutex
hold) by using the mmap system call to access a hole, as demonstrated by
interfering with intended shmem activity by blocking completion of (1) an
MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call
(bnc#883518).

CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through
3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the
sep CPU feature flag is set, allows local users to cause a denial of
service (OOPS and system crash) via an invalid syscall number, as
demonstrated by number 1000 (bnc#883724).

CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c
in the Linux kernel before 3.15.2 does not properly manage a certain
backlog value, which allows remote attackers to cause a denial of service
(socket outage) via a crafted SCTP packet (bnc#885422).

CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux
kernel through 3.15.6 allows local users to gain privileges by leveraging
data-structure differences between an l2tp socket and an inet socket
(bnc#887082).

CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in
the Linux kernel through 3.15.8, when SCTP authentication is enabled,
allows remote attackers to cause a denial of service (NULL pointer
dereference and OOPS) by starting to establish an association between two
endpoints immediately after an exchange of INIT and INIT ACK chunks to
establish an earlier association between these endpoints in the opposite
direction (bnc#889173).

CVE-2014-5471: Stack consumption vulnerability in the
parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux
kernel through 3.16.1 allows local users to cause a denial of service
(uncontrolled recursion, and system crash or reboot) via a crafted iso9660
image with a CL entry referring to a directory entry that has a CL entry.
(bnc#892490)

CVE-2014-5472: The parse_rock_ridge_inode_internal function in
fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to
cause a denial of service (unkillable mount process) via a crafted iso9660
image with a self-referential CL entry. (bnc#892490)

CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux kernel
before 3.13.7 allows remote attackers to cause a denial of service (system
crash) via network traffic that improperly interacts with the
WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and
tx.c. (bnc#871797)

CVE-2014-4027: The rd_build_device_space function in
drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not
properly initialize a certain data structure, which allows local users to
obtain sensitive information from ramdisk_mcp memory by leveraging access
to a SCSI initiator. (bnc#882639)

CVE-2014-3153 The futex_requeue function in kernel/futex.c in the Linux
kernel through 3.14.5 does not ensure that calls have two different futex
addresses, which allows local users to gain privileges via a crafted
FUTEX_REQUEUE command that facilitates unsafe waiter modification.
(bnc#880892)

CVE-2014-6410: Avoid infinite loop when processing indirect ICBs
(bnc#896689)

The following non-security bugs were fixed: - ACPI / PAD: call schedule()
when need_resched() is true (bnc#866911). - ACPI: Fix bug when ACPI reset
register is implemented in system memory (bnc#882900). - ACPI: Limit access
to custom_method (bnc#884333). - ALSA: hda - Enabling Realtek ALC 671 codec
(bnc#891746). - Add option to automatically enforce module signatures when
in Secure Boot mode (bnc#884333). - Add secure_modules() call (bnc#884333).
- Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344). - Backported
new patches of Lock down functions for UEFI secure boot Also updated
series.conf and removed old patches. - Btrfs: Return EXDEV for cross file
system snapshot. - Btrfs: abort the transaction when we does not find our
extent ref. - Btrfs: avoid warning bomb of btrfs_invalidate_inodes. -
Btrfs: cancel scrub on transaction abortion. - Btrfs: correctly set profile
flags on seqlock retry. - Btrfs: does not check nodes for extent items. -
Btrfs: fix a possible deadlock between scrub and transaction committing. -
Btrfs: fix corruption after write/fsync failure + fsync + log recovery
(bnc#894200). - Btrfs: fix csum tree corruption, duplicate and outdated
checksums (bnc#891619). - Btrfs: fix double free in
find_lock_delalloc_range. - Btrfs: fix possible memory leak in
btrfs_create_tree(). - Btrfs: fix use of uninit 'ret' in
end_extent_writepage(). - Btrfs: free delayed node outside of
root->inode_lock (bnc#866864). - Btrfs: make DEV_INFO ioctl available to
anyone. - Btrfs: make FS_INFO ioctl available to anyone. - Btrfs: make
device scan less noisy. - Btrfs: make sure there are not any read requests
before stopping workers. - Btrfs: more efficient io tree navigation on
wait_extent_bit. - Btrfs: output warning instead of error when loading free
space cache failed. - Btrfs: retrieve more info from FS_INFO ioctl. -
Btrfs: return EPERM when deleting a default subvolume (bnc#869934). -
Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615).
- Btrfs: use right type to get real comparison. - Btrfs: wake up
@scrub_pause_wait as much as we can. - Btrfs: wake up transaction thread
upon remount. - CacheFiles: Add missing retrieval completions (bnc#880344).
- CacheFiles: Does not try to dump the index key if the cookie has been
cleared (bnc#880344). - CacheFiles: Downgrade the requirements passed to
the allocator (bnc#880344). - CacheFiles: Fix the marking of cached pages
(bnc#880344). - CacheFiles: Implement invalidation (bnc#880344). -
CacheFiles: Make some debugging statements conditional (bnc#880344). -
Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). - Drivers: hv:
vmbus: Fix a bug in the channel callback dispatch code (bnc#886840). -
FS-Cache: Add transition to handle invalidate immediately after lookup
(bnc#880344). - FS-Cache: Check that there are no read ops when cookie
relinquished (bnc#880344). - FS-Cache: Clear remaining page count on
retrieval cancellation (bnc#880344). - FS-Cache: Convert the object event
ID #defines into an enum (bnc#880344). - FS-Cache: Does not sleep in page
release if __GFP_FS is not set (bnc#880344). - FS-Cache: Does not use
spin_is_locked() in assertions (bnc#880344). - FS-Cache: Exclusive op
submission can BUG if there is been an I/O error (bnc#880344). - FS-Cache:
Fix __wait_on_atomic_t() to call the action func if the counter != 0
(bnc#880344). - FS-Cache: Fix object state machine to have separate work
and wait states (bnc#880344). - FS-Cache: Fix operation state management
and accounting (bnc#880344). - FS-Cache: Fix signal handling during waits
(bnc#880344). - FS-Cache: Initialise the object event mask with the
calculated mask (bnc#880344). - FS-Cache: Limit the number of I/O error
reports for a cache (bnc#880344). - FS-Cache: Make cookie relinquishment
wait for outstanding reads (bnc#880344). - FS-Cache: Mark cancellation of
in-progress operation (bnc#880344). - FS-Cache: One of the write operation
paths doeses not set the object state (bnc#880344). - FS-Cache: Provide
proper invalidation (bnc#880344). - FS-Cache: Simplify cookie retention for
fscache_objects, fixing oops (bnc#880344). - FS-Cache: The retrieval
remaining-pages counter needs to be atomic_t (bnc#880344). - FS-Cache:
Uninline fscache_object_init() (bnc#880344). - FS-Cache: Wrap checks on
object state (bnc#880344). - HID: usbhid: add always-poll quirk
(bnc#888607). - HID: usbhid: enable always-poll quirk for Elan Touchscreen
(bnc#888607). - IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297). -
Ignore 'flags' change to event_constraint (bnc#876114). - Ignore
data_src/weight changes to perf_sample_data (bnc#876114). - NFS: Allow more
operations in an NFSv4.1 request (bnc#890513). - NFS: Clean up helper
function nfs4_select_rw_stateid() (bnc#888968). - NFS: Does not copy read
delegation stateids in setattr (bnc#888968). - NFS: Does not use a
delegation to open a file when returning that delegation (bnc#888968,
bnc#892200, bnc#893596, bnc#893496) - NFS: Fixes for NFS RCU-walk support
in line with code going upstream - NFS: Use FS-Cache invalidation
(bnc#880344). - NFS: allow lockless access to access_cache (bnc#866130). -
NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts
(bnc#888591). - NFS: nfs4_do_open should add negative results to the dcache
(bnc#866130). - NFS: nfs_migrate_page() does not wait for FS-Cache to
finish with a page (bnc#880344). - NFS: nfs_open_revalidate: only evaluate
parent if it will be used (bnc#866130). - NFS: prepare for RCU-walk support
but pushing tests later in code (bnc#866130). - NFS: support RCU_WALK in
nfs_permission() (bnc#866130). - NFS: teach nfs_lookup_verify_inode to
handle LOOKUP_RCU (bnc#866130). - NFS: teach nfs_neg_need_reval to
understand LOOKUP_RCU (bnc#866130). - NFSD: Does not hand out delegations
for 30 seconds after recalling them (bnc#880370). - NFSv4 set open access
operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200,
bnc#893596, bnc#893496). - NFSv4: Add a helper for encoding opaque data
(bnc#888968). - NFSv4: Add a helper for encoding stateids (bnc#888968). -
NFSv4: Add helpers for basic copying of stateids (bnc#888968). - NFSv4:
Clean up nfs4_select_rw_stateid() (bnc#888968). - NFSv4: Fix the return
value of nfs4_select_rw_stateid (bnc#888968). - NFSv4: Rename
nfs4_copy_stateid() (bnc#888968). - NFSv4: Resend the READ/WRITE RPC call
if a stateid change causes an error (bnc#888968). - NFSv4: Simplify the
struct nfs4_stateid (bnc#888968). - NFSv4: The stateid must remain the same
for replayed RPC calls (bnc#888968). - NFSv4: nfs4_stateid_is_current
should return 'true' for an invalid stateid (bnc#888968). - One more fix
for kABI breakage. - PCI: Lock down BAR access when module security is
enabled (bnc#884333). - PCI: enable MPS 'performance' setting to properly
handle bridge MPS (bnc#883376). - PM / Hibernate: Add memory_rtree_find_bit
function (bnc#860441). - PM / Hibernate: Create a Radix-Tree to store
memory bitmap (bnc#860441). - PM / Hibernate: Implement position keeping in
radix tree (bnc#860441). - PM / Hibernate: Iterate over set bits instead of
PFNs in swsusp_free() (bnc#860441). - PM / Hibernate: Remove the old
memory-bitmap implementation (bnc#860441). - PM / Hibernate: Touch Soft
Lockup Watchdog in rtree_next_node (bnc#860441). - Restrict /dev/mem and
/dev/kmem when module loading is restricted (bnc#884333). - Reuse existing
'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). - USB:
handle LPM errors during device suspend correctly (bnc#849123). - Update
kabi files to reflect fscache change (bnc#880344) - Update x86_64 config
files: re-enable SENSORS_W83627EHF (bnc#891281) - VFS: Make more complete
truncate operation available to CacheFiles (bnc#880344). - [FEAT NET1222]
ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). - acpi:
Ignore acpi_rsdp kernel parameter when module loading is restricted
(bnc#884333). - af_iucv: correct cleanup if listen backlog is full
(bnc#885262, LTC#111728). - asus-wmi: Restrict debugfs interface when
module loading is restricted (bnc#884333). - autofs4: allow RCU-walk to
walk through autofs4 (bnc#866130). - autofs4: avoid taking fs_lock during
rcu-walk (bnc#866130). - autofs4: does not take spinlock when not needed in
autofs4_lookup_expiring (bnc#866130). - autofs4: factor should_expire() out
of autofs4_expire_indirect (bnc#866130). - autofs4: make
'autofs4_can_expire' idempotent (bnc#866130). - autofs4: remove a redundant
assignment (bnc#866130). - autofs: fix lockref lookup (bnc#888591). -
be2net: add dma_mapping_error() check for dma_map_page() (bnc#881759). -
block: add cond_resched() to potentially long running ioctl discard loop
(bnc#884725). - block: fix race between request completion and timeout
handling (bnc#881051). - cdc-ether: clean packet filter upon probe
(bnc#876017). - cpuset: Fix memory allocator deadlock (bnc#876590). -
crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs have
them, but some are FIPS certified, with some kernel support. - crypto: fips
- only panic on bad/missing crypto mod signatures (bnc#887503). - crypto:
testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode
(bnc#889451). - dasd: validate request size before building CCW/TCW
(bnc#891087, LTC#114068). - dm mpath: fix race condition between
multipath_dtr and pg_init_done (bnc#826486). - dm-mpath: fix panic on
deleting sg device (bnc#870161). - drm/ast: AST2000 cannot be detected
correctly (bnc#895983). - drm/ast: Actually load DP501 firmware when
required (bnc#895608 bnc#871134). - drm/ast: Add missing entry to
dclk_table[]. - drm/ast: Add reduced non reduced mode parsing for wide
screen mode (bnc#892723). - drm/ast: initial DP501 support (v0.2)
(bnc#871134). - drm/ast: open key before detect chips (bnc#895983). -
drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304). -
drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064). -
drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init (bnc#869055). -
drm/i915: create functions for the 'unclaimed register' checks
(bnc#869055). - drm/i915: use FPGA_DBG for the 'unclaimed register' checks
(bnc#869055). - drm/mgag200: Initialize data needed to map fbdev memory
(bnc #806990). - e1000e: enable support for new device IDs (bnc#885509). -
fs/fscache: remove spin_lock() from the condition in while() (bnc#880344).
- hibernate: Disable in a signed modules environment (bnc#884333). -
hugetlb: does not use ERR_PTR with VM_FAULT* values - ibmvscsi: Abort init
sequence during error recovery (bnc#885382). - ibmvscsi: Add memory
barriers for send / receive (bnc#885382). - inet: add a redirect generation
id in inetpeer (bnc#860593). - inetpeer: initialize ->redirect_genid in
inet_getpeer() (bnc#860593). - ipv6: tcp: fix tcp_v6_conn_request()
(bnc#887645). - kabi: hide bnc#860593 changes of struct inetpeer_addr_base
(bnc#860593). - kernel: 3215 tty hang (bnc#891087, LTC#114562). - kernel:
fix data corruption when reading /proc/sysinfo (bnc#891087, LTC#114480). -
kernel: fix kernel oops with load of fpc register (bnc#889061, LTC#113596).
- kernel: sclp console tty reference counting (bnc#891087, LTC#115466). -
kexec: Disable at runtime if the kernel enforces module loading
restrictions (bnc#884333). - md/raid6: avoid data corruption during
recovery of double-degraded RAID6. - memcg, vmscan: Fix forced scan of
anonymous pages (memory reclaim fix). - memcg: do not expose uninitialized
mem_cgroup_per_node to world (bnc#883096). - mm, hugetlb: add VM_NORESERVE
check in vma_has_reserves() - mm, hugetlb: change variable name
reservations to resv - mm, hugetlb: decrement reserve count if VM_NORESERVE
alloc page cache - mm, hugetlb: defer freeing pages when gathering surplus
pages - mm, hugetlb: do not use a page in page cache for cow optimization -
mm, hugetlb: fix and clean-up node iteration code to alloc or free - mm,
hugetlb: fix race in region tracking - mm, hugetlb: fix subpool accounting
handling - mm, hugetlb: improve page-fault scalability - mm, hugetlb:
improve, cleanup resv_map parameters - mm, hugetlb: move up the code which
check availability of free huge page - mm, hugetlb: protect reserved pages
when soft offlining a hugepage - mm, hugetlb: remove
decrement_hugepage_resv_vma() - mm, hugetlb: remove redundant list_empty
check in gather_surplus_pages() - mm, hugetlb: remove resv_map_put - mm,
hugetlb: remove useless check about mapping type - mm, hugetlb: return a
reserved page to a reserved pool if failed - mm, hugetlb: trivial
commenting fix - mm, hugetlb: unify region structure handling - mm,
hugetlb: unify region structure handling kabi - mm, hugetlb: use long vars
instead of int in region_count() (Hugetlb Fault Scalability). - mm,
hugetlb: use vma_resv_map() map types - mm, oom: fix badness score
underflow (bnc#884582, bnc#884767). - mm, oom: normalize oom scores to
oom_score_adj scale only for userspace (bnc#884582, bnc#884767). - mm, thp:
do not allow thp faults to avoid cpuset restrictions (bnc#888849). -
net/mlx4_core: Load higher level modules according to ports type
(bnc#887680). - net/mlx4_core: Load the IB driver when the device supports
IBoE (bnc#887680). - net/mlx4_en: Fix a race between napi poll function and
RX ring cleanup (bnc#863586). - net/mlx4_en: Fix selftest failing on non
10G link speed (bnc#888058). - net: fix checksumming features handling in
output path (bnc#891259). - pagecache_limit: batch large nr_to_scan targets
(bnc#895221). - pagecachelimit: reduce lru_lock congestion for heavy
parallel reclaim fix (bnc#895680). - perf/core: Add weighted samples
(bnc#876114). - perf/x86: Add flags to event constraints (bnc#876114). -
perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114). - perf:
Add generic memory sampling interface (bnc#876114). - qla2xxx: Avoid
escalating the SCSI error handler if the command is not found in firmware
(bnc#859840). - qla2xxx: Clear loop_id for ports that are marked lost
during fabric scanning (bnc#859840). - qla2xxx: Does not check for firmware
hung during the reset context for ISP82XX (bnc#859840). - qla2xxx: Issue
abort command for outstanding commands during cleanup when only firmware is
alive (bnc#859840). - qla2xxx: Reduce the time we wait for a command to
complete during SCSI error handling (bnc#859840). - qla2xxx: Set host
can_queue value based on available resources (bnc#859840). - restore
smp_mb() in unlock_new_inode() (bnc#890526). - s390/pci: introduce lazy
IOTLB flushing for DMA unmap (bnc#889061, LTC#113725). - sched: fix the
theoretical signal_wake_up() vs schedule() race (bnc#876055). - sclp_vt220:
Enable integrated ASCII console per default (bnc#885262, LTC#112035). -
scsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614). -
scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608). -
scsiback: correct grant page unmapping. - scsiback: fix retry handling in
__report_luns(). - scsiback: free resources after error. - sunrpc/auth:
allow lockless (rcu) lookup of credential cache (bnc#866130). -
supported.conf: remove external from drivers/net/veth (bnc#889727) -
supported.conf: support net/sched/act_police.ko (bnc#890426) - tcp: adapt
selected parts of RFC 5682 and PRR logic (bnc#879921). - tg3: Change nvram
command timeout value to 50ms (bnc#855657). - tg3: Override clock, link
aware and link idle mode during NVRAM dump (bnc#855657). - tg3: Set the MAC
clock to the fastest speed during boot code load (bnc#855657). - usb: Does
not enable LPM if the exit latency is zero (bnc#832309). - usbcore: Does
not log on consecutive debounce failures of the same port (bnc#888105). -
usbhid: fix PIXART optical mouse (bnc#888607). - uswsusp: Disable when
module loading is restricted (bnc#884333). - vscsi: support larger transfer
sizes (bnc#774818). - writeback: Do not sync data dirtied after sync start
(bnc#833820). - x86 thermal: Delete power-limit-notification console
messages (bnc#882317). - x86 thermal: Disable power limit notification
interrupt by default (bnc#882317). - x86 thermal: Re-enable power limit
notification interrupt by default (bnc#882317). - x86, cpu hotplug: Fix
stack frame warning in check_irq_vectors_for_cpu_disable() (bnc#887418). -
x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847). - x86/UV: Add
kdump to UV NMI handler (bnc#888847). - x86/UV: Add summary of cpu activity
to UV NMI handler (bnc#888847). - x86/UV: Move NMI support (bnc#888847). -
x86/UV: Update UV support for external NMI signals (bnc#888847). -
x86/uv/nmi: Fix Sparse warnings (bnc#888847). - x86: Add check for number
of available vectors before CPU down (bnc#887418). - x86: Lock down IO port
access when module security is enabled (bnc#884333). - x86: Restrict MSR
access when module loading is restricted (bnc#884333).

Security Issues:

* CVE-2013-1979
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979>
* CVE-2014-1739
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739>
* CVE-2014-2706
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706>
* CVE-2014-4027
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027>
* CVE-2014-4171
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171>
* CVE-2014-4508
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508>
* CVE-2014-4667
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667>
* CVE-2014-4943
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943>
* CVE-2014-5077
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077>
* CVE-2014-5471
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471>
* CVE-2014-5472
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472>
* CVE-2014-3153
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153>
* CVE-2014-6410
  <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410>
Package Affected Version
pkg:rpm/suse/xen-kmp-pae?arch=i586&distro=sles-11&sp=3 < 4.2.4_04_3.0.101_0.40-0.7.3
pkg:rpm/suse/xen-kmp-pae?arch=i586&distro=sled-11&sp=3 < 4.2.4_04_3.0.101_0.40-0.7.3
pkg:rpm/suse/xen-kmp-default?arch=x86_64&distro=sles-11&sp=3 < 4.2.4_04_3.0.101_0.40-0.7.3
pkg:rpm/suse/xen-kmp-default?arch=x86_64&distro=sled-11&sp=3 < 4.2.4_04_3.0.101_0.40-0.7.3
pkg:rpm/suse/xen-kmp-default?arch=i586&distro=sles-11&sp=3 < 4.2.4_04_3.0.101_0.40-0.7.3
pkg:rpm/suse/xen-kmp-default?arch=i586&distro=sled-11&sp=3 < 4.2.4_04_3.0.101_0.40-0.7.3
pkg:rpm/suse/kernel-xen?arch=x86_64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-xen?arch=x86_64&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-xen?arch=i586&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-xen?arch=i586&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-xen-extra?arch=x86_64&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-xen-extra?arch=i586&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-xen-devel?arch=x86_64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-xen-devel?arch=x86_64&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-xen-devel?arch=i586&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-xen-devel?arch=i586&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-xen-base?arch=x86_64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-xen-base?arch=x86_64&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-xen-base?arch=i586&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-xen-base?arch=i586&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-trace?arch=x86_64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-trace?arch=s390x&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-trace?arch=ppc64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-trace?arch=ia64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-trace?arch=i586&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-trace-devel?arch=x86_64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-trace-devel?arch=x86_64&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-trace-devel?arch=s390x&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-trace-devel?arch=ppc64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-trace-devel?arch=ia64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-trace-devel?arch=i586&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-trace-devel?arch=i586&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-trace-base?arch=x86_64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-trace-base?arch=s390x&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-trace-base?arch=ppc64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-trace-base?arch=ia64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-trace-base?arch=i586&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-syms?arch=ppc64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-syms?arch=ia64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-syms?arch=i586&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-syms?arch=i586&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-source?arch=x86_64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-source?arch=x86_64&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-source?arch=s390x&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-source?arch=ppc64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-source?arch=ia64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-source?arch=i586&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-source?arch=i586&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-ppc64?arch=ppc64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-ppc64-devel?arch=ppc64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-ppc64-base?arch=ppc64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-pae?arch=i586&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-pae?arch=i586&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-pae-extra?arch=i586&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-pae-devel?arch=i586&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-pae-devel?arch=i586&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-pae-base?arch=i586&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-pae-base?arch=i586&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-ec2?arch=x86_64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-ec2?arch=i586&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-ec2-devel?arch=x86_64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-ec2-devel?arch=i586&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-ec2-base?arch=x86_64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-ec2-base?arch=i586&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-default?arch=x86_64&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-default?arch=ppc64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-default?arch=ia64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-default?arch=i586&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-default?arch=i586&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-default-man?arch=s390x&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-default-extra?arch=x86_64&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-default-extra?arch=i586&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-default-devel?arch=ppc64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-default-devel?arch=ia64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-default-devel?arch=i586&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-default-devel?arch=i586&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-default-base?arch=ppc64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-default-base?arch=ia64&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-default-base?arch=i586&distro=sles-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-default-base?arch=i586&distro=sled-11&sp=3 < 3.0.101-0.40.1
pkg:rpm/suse/kernel-bigsmp?arch=x86_64&distro=sles-11&sp=3 < 3.0.101-0.47.55.1
pkg:rpm/suse/kernel-bigsmp-devel?arch=x86_64&distro=sles-11&sp=3 < 3.0.101-0.47.55.1
pkg:rpm/suse/kernel-bigsmp-devel?arch=x86_64&distro=sled-11&sp=3 < 3.0.101-0.47.55.1
pkg:rpm/suse/kernel-bigsmp-base?arch=x86_64&distro=sles-11&sp=3 < 3.0.101-0.47.55.1
ID
SUSE-SU-2015:1174-1
Severity
moderate
URL
https://www.suse.com/support/update/announcement/2015/suse-su-20151174-1/
Published
2014-09-24T00:35:24
(10 years ago)
Modified
2014-09-24T00:35:24
(10 years ago)
Rights
Copyright 2024 SUSE LLC. All rights reserved.
Other Advisories
Source # ID Name URL
Suse SUSE ratings https://www.suse.com/support/security/rating/
Suse URL of this CSAF notice https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1174-1.json
Suse URL for SUSE-SU-2015:1174-1 https://www.suse.com/support/update/announcement/2015/suse-su-20151174-1/
Suse E-Mail link for SUSE-SU-2015:1174-1 https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html
Bugzilla SUSE Bug 599263 https://bugzilla.suse.com/599263
Bugzilla SUSE Bug 708296 https://bugzilla.suse.com/708296
Bugzilla SUSE Bug 733022 https://bugzilla.suse.com/733022
Bugzilla SUSE Bug 745640 https://bugzilla.suse.com/745640
Bugzilla SUSE Bug 755743 https://bugzilla.suse.com/755743
Bugzilla SUSE Bug 760407 https://bugzilla.suse.com/760407
Bugzilla SUSE Bug 763463 https://bugzilla.suse.com/763463
Bugzilla SUSE Bug 763968 https://bugzilla.suse.com/763968
Bugzilla SUSE Bug 765523 https://bugzilla.suse.com/765523
Bugzilla SUSE Bug 767610 https://bugzilla.suse.com/767610
Bugzilla SUSE Bug 769035 https://bugzilla.suse.com/769035
Bugzilla SUSE Bug 769644 https://bugzilla.suse.com/769644
Bugzilla SUSE Bug 770541 https://bugzilla.suse.com/770541
Bugzilla SUSE Bug 771619 https://bugzilla.suse.com/771619
Bugzilla SUSE Bug 773006 https://bugzilla.suse.com/773006
Bugzilla SUSE Bug 773255 https://bugzilla.suse.com/773255
Bugzilla SUSE Bug 773837 https://bugzilla.suse.com/773837
Bugzilla SUSE Bug 774818 https://bugzilla.suse.com/774818
Bugzilla SUSE Bug 779488 https://bugzilla.suse.com/779488
Bugzilla SUSE Bug 783475 https://bugzilla.suse.com/783475
Bugzilla SUSE Bug 785901 https://bugzilla.suse.com/785901
Bugzilla SUSE Bug 786450 https://bugzilla.suse.com/786450
Bugzilla SUSE Bug 787843 https://bugzilla.suse.com/787843
Bugzilla SUSE Bug 789010 https://bugzilla.suse.com/789010
Bugzilla SUSE Bug 789359 https://bugzilla.suse.com/789359
Bugzilla SUSE Bug 792271 https://bugzilla.suse.com/792271
Bugzilla SUSE Bug 793727 https://bugzilla.suse.com/793727
Bugzilla SUSE Bug 794824 https://bugzilla.suse.com/794824
Bugzilla SUSE Bug 797090 https://bugzilla.suse.com/797090
Bugzilla SUSE Bug 797526 https://bugzilla.suse.com/797526
Bugzilla SUSE Bug 797727 https://bugzilla.suse.com/797727
Bugzilla SUSE Bug 797909 https://bugzilla.suse.com/797909
Bugzilla SUSE Bug 798050 https://bugzilla.suse.com/798050
Bugzilla SUSE Bug 800255 https://bugzilla.suse.com/800255
Bugzilla SUSE Bug 800875 https://bugzilla.suse.com/800875
Bugzilla SUSE Bug 801341 https://bugzilla.suse.com/801341
Bugzilla SUSE Bug 801427 https://bugzilla.suse.com/801427
Bugzilla SUSE Bug 803320 https://bugzilla.suse.com/803320
Bugzilla SUSE Bug 804482 https://bugzilla.suse.com/804482
Bugzilla SUSE Bug 804609 https://bugzilla.suse.com/804609
Bugzilla SUSE Bug 804950 https://bugzilla.suse.com/804950
Bugzilla SUSE Bug 805114 https://bugzilla.suse.com/805114
Bugzilla SUSE Bug 805371 https://bugzilla.suse.com/805371
Bugzilla SUSE Bug 805740 https://bugzilla.suse.com/805740
Bugzilla SUSE Bug 805804 https://bugzilla.suse.com/805804
Bugzilla SUSE Bug 806396 https://bugzilla.suse.com/806396
Bugzilla SUSE Bug 806976 https://bugzilla.suse.com/806976
Bugzilla SUSE Bug 806988 https://bugzilla.suse.com/806988
Bugzilla SUSE Bug 806990 https://bugzilla.suse.com/806990
Bugzilla SUSE Bug 807434 https://bugzilla.suse.com/807434
Bugzilla SUSE Bug 807471 https://bugzilla.suse.com/807471
Bugzilla SUSE Bug 807502 https://bugzilla.suse.com/807502
Bugzilla SUSE Bug 808015 https://bugzilla.suse.com/808015
Bugzilla SUSE Bug 808079 https://bugzilla.suse.com/808079
Bugzilla SUSE Bug 808136 https://bugzilla.suse.com/808136
Bugzilla SUSE Bug 808837 https://bugzilla.suse.com/808837
Bugzilla SUSE Bug 808855 https://bugzilla.suse.com/808855
Bugzilla SUSE Bug 808940 https://bugzilla.suse.com/808940
Bugzilla SUSE Bug 809122 https://bugzilla.suse.com/809122
Bugzilla SUSE Bug 809130 https://bugzilla.suse.com/809130
Bugzilla SUSE Bug 809463 https://bugzilla.suse.com/809463
Bugzilla SUSE Bug 809895 https://bugzilla.suse.com/809895
Bugzilla SUSE Bug 809975 https://bugzilla.suse.com/809975
Bugzilla SUSE Bug 810323 https://bugzilla.suse.com/810323
Bugzilla SUSE Bug 810722 https://bugzilla.suse.com/810722
Bugzilla SUSE Bug 812274 https://bugzilla.suse.com/812274
Bugzilla SUSE Bug 812281 https://bugzilla.suse.com/812281
Bugzilla SUSE Bug 812332 https://bugzilla.suse.com/812332
Bugzilla SUSE Bug 812526 https://bugzilla.suse.com/812526
Bugzilla SUSE Bug 812974 https://bugzilla.suse.com/812974
Bugzilla SUSE Bug 813245 https://bugzilla.suse.com/813245
Bugzilla SUSE Bug 813604 https://bugzilla.suse.com/813604
Bugzilla SUSE Bug 813733 https://bugzilla.suse.com/813733
Bugzilla SUSE Bug 813922 https://bugzilla.suse.com/813922
Bugzilla SUSE Bug 814336 https://bugzilla.suse.com/814336
Bugzilla SUSE Bug 815256 https://bugzilla.suse.com/815256
Bugzilla SUSE Bug 815320 https://bugzilla.suse.com/815320
Bugzilla SUSE Bug 815356 https://bugzilla.suse.com/815356
Bugzilla SUSE Bug 816043 https://bugzilla.suse.com/816043
Bugzilla SUSE Bug 816099 https://bugzilla.suse.com/816099
Bugzilla SUSE Bug 816451 https://bugzilla.suse.com/816451
Bugzilla SUSE Bug 816708 https://bugzilla.suse.com/816708
Bugzilla SUSE Bug 817035 https://bugzilla.suse.com/817035
Bugzilla SUSE Bug 817377 https://bugzilla.suse.com/817377
Bugzilla SUSE Bug 818047 https://bugzilla.suse.com/818047
Bugzilla SUSE Bug 818064 https://bugzilla.suse.com/818064
Bugzilla SUSE Bug 818371 https://bugzilla.suse.com/818371
Bugzilla SUSE Bug 818465 https://bugzilla.suse.com/818465
Bugzilla SUSE Bug 818545 https://bugzilla.suse.com/818545
Bugzilla SUSE Bug 819018 https://bugzilla.suse.com/819018
Bugzilla SUSE Bug 819195 https://bugzilla.suse.com/819195
Bugzilla SUSE Bug 819363 https://bugzilla.suse.com/819363
Bugzilla SUSE Bug 819523 https://bugzilla.suse.com/819523
Bugzilla SUSE Bug 819610 https://bugzilla.suse.com/819610
Bugzilla SUSE Bug 819655 https://bugzilla.suse.com/819655
Bugzilla SUSE Bug 819979 https://bugzilla.suse.com/819979
Bugzilla SUSE Bug 820102 https://bugzilla.suse.com/820102
Bugzilla SUSE Bug 820172 https://bugzilla.suse.com/820172
Bugzilla SUSE Bug 820338 https://bugzilla.suse.com/820338
Bugzilla SUSE Bug 820434 https://bugzilla.suse.com/820434
Bugzilla SUSE Bug 820848 https://bugzilla.suse.com/820848
Bugzilla SUSE Bug 821052 https://bugzilla.suse.com/821052
Bugzilla SUSE Bug 821070 https://bugzilla.suse.com/821070
Bugzilla SUSE Bug 821235 https://bugzilla.suse.com/821235
Bugzilla SUSE Bug 821259 https://bugzilla.suse.com/821259
Bugzilla SUSE Bug 821465 https://bugzilla.suse.com/821465
Bugzilla SUSE Bug 821619 https://bugzilla.suse.com/821619
Bugzilla SUSE Bug 821799 https://bugzilla.suse.com/821799
Bugzilla SUSE Bug 821859 https://bugzilla.suse.com/821859
Bugzilla SUSE Bug 821930 https://bugzilla.suse.com/821930
Bugzilla SUSE Bug 821948 https://bugzilla.suse.com/821948
Bugzilla SUSE Bug 821980 https://bugzilla.suse.com/821980
Bugzilla SUSE Bug 822052 https://bugzilla.suse.com/822052
Bugzilla SUSE Bug 822066 https://bugzilla.suse.com/822066
Bugzilla SUSE Bug 822077 https://bugzilla.suse.com/822077
Bugzilla SUSE Bug 822080 https://bugzilla.suse.com/822080
Bugzilla SUSE Bug 822164 https://bugzilla.suse.com/822164
Bugzilla SUSE Bug 822225 https://bugzilla.suse.com/822225
Bugzilla SUSE Bug 822340 https://bugzilla.suse.com/822340
Bugzilla SUSE Bug 822431 https://bugzilla.suse.com/822431
Bugzilla SUSE Bug 822433 https://bugzilla.suse.com/822433
Bugzilla SUSE Bug 822575 https://bugzilla.suse.com/822575
Bugzilla SUSE Bug 822579 https://bugzilla.suse.com/822579
Bugzilla SUSE Bug 822722 https://bugzilla.suse.com/822722
Bugzilla SUSE Bug 822825 https://bugzilla.suse.com/822825
Bugzilla SUSE Bug 822878 https://bugzilla.suse.com/822878
Bugzilla SUSE Bug 823082 https://bugzilla.suse.com/823082
Bugzilla SUSE Bug 823223 https://bugzilla.suse.com/823223
Bugzilla SUSE Bug 823342 https://bugzilla.suse.com/823342
Bugzilla SUSE Bug 823386 https://bugzilla.suse.com/823386
Bugzilla SUSE Bug 823517 https://bugzilla.suse.com/823517
Bugzilla SUSE Bug 823597 https://bugzilla.suse.com/823597
Bugzilla SUSE Bug 823618 https://bugzilla.suse.com/823618
Bugzilla SUSE Bug 823795 https://bugzilla.suse.com/823795
Bugzilla SUSE Bug 824159 https://bugzilla.suse.com/824159
Bugzilla SUSE Bug 824256 https://bugzilla.suse.com/824256
Bugzilla SUSE Bug 824295 https://bugzilla.suse.com/824295
Bugzilla SUSE Bug 824568 https://bugzilla.suse.com/824568
Bugzilla SUSE Bug 824915 https://bugzilla.suse.com/824915
Bugzilla SUSE Bug 825006 https://bugzilla.suse.com/825006
Bugzilla SUSE Bug 825037 https://bugzilla.suse.com/825037
Bugzilla SUSE Bug 825048 https://bugzilla.suse.com/825048
Bugzilla SUSE Bug 825142 https://bugzilla.suse.com/825142
Bugzilla SUSE Bug 825227 https://bugzilla.suse.com/825227
Bugzilla SUSE Bug 825291 https://bugzilla.suse.com/825291
Bugzilla SUSE Bug 825591 https://bugzilla.suse.com/825591
Bugzilla SUSE Bug 825657 https://bugzilla.suse.com/825657
Bugzilla SUSE Bug 825696 https://bugzilla.suse.com/825696
Bugzilla SUSE Bug 825887 https://bugzilla.suse.com/825887
Bugzilla SUSE Bug 825896 https://bugzilla.suse.com/825896
Bugzilla SUSE Bug 826102 https://bugzilla.suse.com/826102
Bugzilla SUSE Bug 826186 https://bugzilla.suse.com/826186
Bugzilla SUSE Bug 826350 https://bugzilla.suse.com/826350
Bugzilla SUSE Bug 826486 https://bugzilla.suse.com/826486
Bugzilla SUSE Bug 826602 https://bugzilla.suse.com/826602
Bugzilla SUSE Bug 826756 https://bugzilla.suse.com/826756
Bugzilla SUSE Bug 826960 https://bugzilla.suse.com/826960
Bugzilla SUSE Bug 826978 https://bugzilla.suse.com/826978
Bugzilla SUSE Bug 827246 https://bugzilla.suse.com/827246
Bugzilla SUSE Bug 827271 https://bugzilla.suse.com/827271
Bugzilla SUSE Bug 827372 https://bugzilla.suse.com/827372
Bugzilla SUSE Bug 827376 https://bugzilla.suse.com/827376
Bugzilla SUSE Bug 827378 https://bugzilla.suse.com/827378
Bugzilla SUSE Bug 827416 https://bugzilla.suse.com/827416
Bugzilla SUSE Bug 827527 https://bugzilla.suse.com/827527
Bugzilla SUSE Bug 827670 https://bugzilla.suse.com/827670
Bugzilla SUSE Bug 827749 https://bugzilla.suse.com/827749
Bugzilla SUSE Bug 827750 https://bugzilla.suse.com/827750
Bugzilla SUSE Bug 827767 https://bugzilla.suse.com/827767
Bugzilla SUSE Bug 827930 https://bugzilla.suse.com/827930
Bugzilla SUSE Bug 827966 https://bugzilla.suse.com/827966
Bugzilla SUSE Bug 828087 https://bugzilla.suse.com/828087
Bugzilla SUSE Bug 828119 https://bugzilla.suse.com/828119
Bugzilla SUSE Bug 828192 https://bugzilla.suse.com/828192
Bugzilla SUSE Bug 828236 https://bugzilla.suse.com/828236
Bugzilla SUSE Bug 828265 https://bugzilla.suse.com/828265
Bugzilla SUSE Bug 828574 https://bugzilla.suse.com/828574
Bugzilla SUSE Bug 828714 https://bugzilla.suse.com/828714
Bugzilla SUSE Bug 828886 https://bugzilla.suse.com/828886
Bugzilla SUSE Bug 828894 https://bugzilla.suse.com/828894
Bugzilla SUSE Bug 828914 https://bugzilla.suse.com/828914
Bugzilla SUSE Bug 829001 https://bugzilla.suse.com/829001
Bugzilla SUSE Bug 829082 https://bugzilla.suse.com/829082
Bugzilla SUSE Bug 829110 https://bugzilla.suse.com/829110
Bugzilla SUSE Bug 829357 https://bugzilla.suse.com/829357
Bugzilla SUSE Bug 829539 https://bugzilla.suse.com/829539
Bugzilla SUSE Bug 829622 https://bugzilla.suse.com/829622
Bugzilla SUSE Bug 829682 https://bugzilla.suse.com/829682
Bugzilla SUSE Bug 830346 https://bugzilla.suse.com/830346
Bugzilla SUSE Bug 830478 https://bugzilla.suse.com/830478
Bugzilla SUSE Bug 830766 https://bugzilla.suse.com/830766
Bugzilla SUSE Bug 830822 https://bugzilla.suse.com/830822
Bugzilla SUSE Bug 830901 https://bugzilla.suse.com/830901
Bugzilla SUSE Bug 830985 https://bugzilla.suse.com/830985
Bugzilla SUSE Bug 831029 https://bugzilla.suse.com/831029
Bugzilla SUSE Bug 831055 https://bugzilla.suse.com/831055
Bugzilla SUSE Bug 831058 https://bugzilla.suse.com/831058
Bugzilla SUSE Bug 831103 https://bugzilla.suse.com/831103
Bugzilla SUSE Bug 831143 https://bugzilla.suse.com/831143
Bugzilla SUSE Bug 831380 https://bugzilla.suse.com/831380
Bugzilla SUSE Bug 831410 https://bugzilla.suse.com/831410
Bugzilla SUSE Bug 831422 https://bugzilla.suse.com/831422
Bugzilla SUSE Bug 831424 https://bugzilla.suse.com/831424
Bugzilla SUSE Bug 831438 https://bugzilla.suse.com/831438
Bugzilla SUSE Bug 831623 https://bugzilla.suse.com/831623
Bugzilla SUSE Bug 831949 https://bugzilla.suse.com/831949
Bugzilla SUSE Bug 832292 https://bugzilla.suse.com/832292
Bugzilla SUSE Bug 832309 https://bugzilla.suse.com/832309
Bugzilla SUSE Bug 832318 https://bugzilla.suse.com/832318
Bugzilla SUSE Bug 832710 https://bugzilla.suse.com/832710
Bugzilla SUSE Bug 833073 https://bugzilla.suse.com/833073
Bugzilla SUSE Bug 833097 https://bugzilla.suse.com/833097
Bugzilla SUSE Bug 833148 https://bugzilla.suse.com/833148
Bugzilla SUSE Bug 833151 https://bugzilla.suse.com/833151
Bugzilla SUSE Bug 833321 https://bugzilla.suse.com/833321
Bugzilla SUSE Bug 833588 https://bugzilla.suse.com/833588
Bugzilla SUSE Bug 833635 https://bugzilla.suse.com/833635
Bugzilla SUSE Bug 833820 https://bugzilla.suse.com/833820
Bugzilla SUSE Bug 833858 https://bugzilla.suse.com/833858
Bugzilla SUSE Bug 833968 https://bugzilla.suse.com/833968
Bugzilla SUSE Bug 834116 https://bugzilla.suse.com/834116
Bugzilla SUSE Bug 834204 https://bugzilla.suse.com/834204
Bugzilla SUSE Bug 834473 https://bugzilla.suse.com/834473
Bugzilla SUSE Bug 834600 https://bugzilla.suse.com/834600
Bugzilla SUSE Bug 834647 https://bugzilla.suse.com/834647
Bugzilla SUSE Bug 834708 https://bugzilla.suse.com/834708
Bugzilla SUSE Bug 834742 https://bugzilla.suse.com/834742
Bugzilla SUSE Bug 834808 https://bugzilla.suse.com/834808
Bugzilla SUSE Bug 834905 https://bugzilla.suse.com/834905
Bugzilla SUSE Bug 835074 https://bugzilla.suse.com/835074
Bugzilla SUSE Bug 835094 https://bugzilla.suse.com/835094
Bugzilla SUSE Bug 835175 https://bugzilla.suse.com/835175
Bugzilla SUSE Bug 835186 https://bugzilla.suse.com/835186
Bugzilla SUSE Bug 835189 https://bugzilla.suse.com/835189
Bugzilla SUSE Bug 835684 https://bugzilla.suse.com/835684
Bugzilla SUSE Bug 835839 https://bugzilla.suse.com/835839
Bugzilla SUSE Bug 835930 https://bugzilla.suse.com/835930
Bugzilla SUSE Bug 836218 https://bugzilla.suse.com/836218
Bugzilla SUSE Bug 836347 https://bugzilla.suse.com/836347
Bugzilla SUSE Bug 836718 https://bugzilla.suse.com/836718
Bugzilla SUSE Bug 836801 https://bugzilla.suse.com/836801
Bugzilla SUSE Bug 837206 https://bugzilla.suse.com/837206
Bugzilla SUSE Bug 837372 https://bugzilla.suse.com/837372
Bugzilla SUSE Bug 837563 https://bugzilla.suse.com/837563
Bugzilla SUSE Bug 837596 https://bugzilla.suse.com/837596
Bugzilla SUSE Bug 837739 https://bugzilla.suse.com/837739
Bugzilla SUSE Bug 837741 https://bugzilla.suse.com/837741
Bugzilla SUSE Bug 837803 https://bugzilla.suse.com/837803
Bugzilla SUSE Bug 838346 https://bugzilla.suse.com/838346
Bugzilla SUSE Bug 838448 https://bugzilla.suse.com/838448
Bugzilla SUSE Bug 838623 https://bugzilla.suse.com/838623
Bugzilla SUSE Bug 839407 https://bugzilla.suse.com/839407
Bugzilla SUSE Bug 839973 https://bugzilla.suse.com/839973
Bugzilla SUSE Bug 840116 https://bugzilla.suse.com/840116
Bugzilla SUSE Bug 840226 https://bugzilla.suse.com/840226
Bugzilla SUSE Bug 840524 https://bugzilla.suse.com/840524
Bugzilla SUSE Bug 840830 https://bugzilla.suse.com/840830
Bugzilla SUSE Bug 841050 https://bugzilla.suse.com/841050
Bugzilla SUSE Bug 841094 https://bugzilla.suse.com/841094
Bugzilla SUSE Bug 841402 https://bugzilla.suse.com/841402
Bugzilla SUSE Bug 841445 https://bugzilla.suse.com/841445
Bugzilla SUSE Bug 841498 https://bugzilla.suse.com/841498
Bugzilla SUSE Bug 841654 https://bugzilla.suse.com/841654
Bugzilla SUSE Bug 841656 https://bugzilla.suse.com/841656
Bugzilla SUSE Bug 842057 https://bugzilla.suse.com/842057
Bugzilla SUSE Bug 842063 https://bugzilla.suse.com/842063
Bugzilla SUSE Bug 842239 https://bugzilla.suse.com/842239
Bugzilla SUSE Bug 842604 https://bugzilla.suse.com/842604
Bugzilla SUSE Bug 842820 https://bugzilla.suse.com/842820
Bugzilla SUSE Bug 843185 https://bugzilla.suse.com/843185
Bugzilla SUSE Bug 843419 https://bugzilla.suse.com/843419
Bugzilla SUSE Bug 843429 https://bugzilla.suse.com/843429
Bugzilla SUSE Bug 843445 https://bugzilla.suse.com/843445
Bugzilla SUSE Bug 843642 https://bugzilla.suse.com/843642
Bugzilla SUSE Bug 843645 https://bugzilla.suse.com/843645
Bugzilla SUSE Bug 843654 https://bugzilla.suse.com/843654
Bugzilla SUSE Bug 843732 https://bugzilla.suse.com/843732
Bugzilla SUSE Bug 843753 https://bugzilla.suse.com/843753
Bugzilla SUSE Bug 843950 https://bugzilla.suse.com/843950
Bugzilla SUSE Bug 844513 https://bugzilla.suse.com/844513
Bugzilla SUSE Bug 845352 https://bugzilla.suse.com/845352
Bugzilla SUSE Bug 845378 https://bugzilla.suse.com/845378
Bugzilla SUSE Bug 845621 https://bugzilla.suse.com/845621
Bugzilla SUSE Bug 845729 https://bugzilla.suse.com/845729
Bugzilla SUSE Bug 846036 https://bugzilla.suse.com/846036
Bugzilla SUSE Bug 846298 https://bugzilla.suse.com/846298
Bugzilla SUSE Bug 846404 https://bugzilla.suse.com/846404
Bugzilla SUSE Bug 846654 https://bugzilla.suse.com/846654
Bugzilla SUSE Bug 846656 https://bugzilla.suse.com/846656
Bugzilla SUSE Bug 846690 https://bugzilla.suse.com/846690
Bugzilla SUSE Bug 846790 https://bugzilla.suse.com/846790
Bugzilla SUSE Bug 846984 https://bugzilla.suse.com/846984
Bugzilla SUSE Bug 846989 https://bugzilla.suse.com/846989
Bugzilla SUSE Bug 847261 https://bugzilla.suse.com/847261
Bugzilla SUSE Bug 847319 https://bugzilla.suse.com/847319
Bugzilla SUSE Bug 847652 https://bugzilla.suse.com/847652
Bugzilla SUSE Bug 847660 https://bugzilla.suse.com/847660
Bugzilla SUSE Bug 847672 https://bugzilla.suse.com/847672
Bugzilla SUSE Bug 847721 https://bugzilla.suse.com/847721
Bugzilla SUSE Bug 847842 https://bugzilla.suse.com/847842
Bugzilla SUSE Bug 848055 https://bugzilla.suse.com/848055
Bugzilla SUSE Bug 848317 https://bugzilla.suse.com/848317
Bugzilla SUSE Bug 848321 https://bugzilla.suse.com/848321
Bugzilla SUSE Bug 848335 https://bugzilla.suse.com/848335
Bugzilla SUSE Bug 848336 https://bugzilla.suse.com/848336
Bugzilla SUSE Bug 848544 https://bugzilla.suse.com/848544
Bugzilla SUSE Bug 848652 https://bugzilla.suse.com/848652
Bugzilla SUSE Bug 848864 https://bugzilla.suse.com/848864
Bugzilla SUSE Bug 849021 https://bugzilla.suse.com/849021
Bugzilla SUSE Bug 849029 https://bugzilla.suse.com/849029
Bugzilla SUSE Bug 849034 https://bugzilla.suse.com/849034
Bugzilla SUSE Bug 849123 https://bugzilla.suse.com/849123
Bugzilla SUSE Bug 849256 https://bugzilla.suse.com/849256
Bugzilla SUSE Bug 849362 https://bugzilla.suse.com/849362
Bugzilla SUSE Bug 849364 https://bugzilla.suse.com/849364
Bugzilla SUSE Bug 849404 https://bugzilla.suse.com/849404
Bugzilla SUSE Bug 849675 https://bugzilla.suse.com/849675
Bugzilla SUSE Bug 849809 https://bugzilla.suse.com/849809
Bugzilla SUSE Bug 849855 https://bugzilla.suse.com/849855
Bugzilla SUSE Bug 849950 https://bugzilla.suse.com/849950
Bugzilla SUSE Bug 850072 https://bugzilla.suse.com/850072
Bugzilla SUSE Bug 850103 https://bugzilla.suse.com/850103
Bugzilla SUSE Bug 850324 https://bugzilla.suse.com/850324
Bugzilla SUSE Bug 850493 https://bugzilla.suse.com/850493
Bugzilla SUSE Bug 850640 https://bugzilla.suse.com/850640
Bugzilla SUSE Bug 850915 https://bugzilla.suse.com/850915
Bugzilla SUSE Bug 851066 https://bugzilla.suse.com/851066
Bugzilla SUSE Bug 851101 https://bugzilla.suse.com/851101
Bugzilla SUSE Bug 851290 https://bugzilla.suse.com/851290
Bugzilla SUSE Bug 851314 https://bugzilla.suse.com/851314
Bugzilla SUSE Bug 851426 https://bugzilla.suse.com/851426
Bugzilla SUSE Bug 851603 https://bugzilla.suse.com/851603
Bugzilla SUSE Bug 851879 https://bugzilla.suse.com/851879
Bugzilla SUSE Bug 852153 https://bugzilla.suse.com/852153
Bugzilla SUSE Bug 852373 https://bugzilla.suse.com/852373
Bugzilla SUSE Bug 852488 https://bugzilla.suse.com/852488
Bugzilla SUSE Bug 852553 https://bugzilla.suse.com/852553
Bugzilla SUSE Bug 852558 https://bugzilla.suse.com/852558
Bugzilla SUSE Bug 852559 https://bugzilla.suse.com/852559
Bugzilla SUSE Bug 852624 https://bugzilla.suse.com/852624
Bugzilla SUSE Bug 852652 https://bugzilla.suse.com/852652
Bugzilla SUSE Bug 852761 https://bugzilla.suse.com/852761
Bugzilla SUSE Bug 852967 https://bugzilla.suse.com/852967
Bugzilla SUSE Bug 853040 https://bugzilla.suse.com/853040
Bugzilla SUSE Bug 853050 https://bugzilla.suse.com/853050
Bugzilla SUSE Bug 853051 https://bugzilla.suse.com/853051
Bugzilla SUSE Bug 853052 https://bugzilla.suse.com/853052
Bugzilla SUSE Bug 853053 https://bugzilla.suse.com/853053
Bugzilla SUSE Bug 853162 https://bugzilla.suse.com/853162
Bugzilla SUSE Bug 853166 https://bugzilla.suse.com/853166
Bugzilla SUSE Bug 853428 https://bugzilla.suse.com/853428
Bugzilla SUSE Bug 853455 https://bugzilla.suse.com/853455
Bugzilla SUSE Bug 853465 https://bugzilla.suse.com/853465
Bugzilla SUSE Bug 854025 https://bugzilla.suse.com/854025
Bugzilla SUSE Bug 854445 https://bugzilla.suse.com/854445
Bugzilla SUSE Bug 854516 https://bugzilla.suse.com/854516
Bugzilla SUSE Bug 854546 https://bugzilla.suse.com/854546
Bugzilla SUSE Bug 854634 https://bugzilla.suse.com/854634
Bugzilla SUSE Bug 854722 https://bugzilla.suse.com/854722
Bugzilla SUSE Bug 855126 https://bugzilla.suse.com/855126
Bugzilla SUSE Bug 855657 https://bugzilla.suse.com/855657
Bugzilla SUSE Bug 855825 https://bugzilla.suse.com/855825
Bugzilla SUSE Bug 856307 https://bugzilla.suse.com/856307
Bugzilla SUSE Bug 856481 https://bugzilla.suse.com/856481
Bugzilla SUSE Bug 856760 https://bugzilla.suse.com/856760
Bugzilla SUSE Bug 856848 https://bugzilla.suse.com/856848
Bugzilla SUSE Bug 857358 https://bugzilla.suse.com/857358
Bugzilla SUSE Bug 857643 https://bugzilla.suse.com/857643
Bugzilla SUSE Bug 857926 https://bugzilla.suse.com/857926
Bugzilla SUSE Bug 858534 https://bugzilla.suse.com/858534
Bugzilla SUSE Bug 858604 https://bugzilla.suse.com/858604
Bugzilla SUSE Bug 858831 https://bugzilla.suse.com/858831
Bugzilla SUSE Bug 858869 https://bugzilla.suse.com/858869
Bugzilla SUSE Bug 858870 https://bugzilla.suse.com/858870
Bugzilla SUSE Bug 858872 https://bugzilla.suse.com/858872
Bugzilla SUSE Bug 859225 https://bugzilla.suse.com/859225
Bugzilla SUSE Bug 859342 https://bugzilla.suse.com/859342
Bugzilla SUSE Bug 859840 https://bugzilla.suse.com/859840
Bugzilla SUSE Bug 860441 https://bugzilla.suse.com/860441
Bugzilla SUSE Bug 860593 https://bugzilla.suse.com/860593
Bugzilla SUSE Bug 861093 https://bugzilla.suse.com/861093
Bugzilla SUSE Bug 861636 https://bugzilla.suse.com/861636
Bugzilla SUSE Bug 861980 https://bugzilla.suse.com/861980
Bugzilla SUSE Bug 862429 https://bugzilla.suse.com/862429
Bugzilla SUSE Bug 862796 https://bugzilla.suse.com/862796
Bugzilla SUSE Bug 862934 https://bugzilla.suse.com/862934
Bugzilla SUSE Bug 862957 https://bugzilla.suse.com/862957
Bugzilla SUSE Bug 863178 https://bugzilla.suse.com/863178
Bugzilla SUSE Bug 863300 https://bugzilla.suse.com/863300
Bugzilla SUSE Bug 863335 https://bugzilla.suse.com/863335
Bugzilla SUSE Bug 863410 https://bugzilla.suse.com/863410
Bugzilla SUSE Bug 863526 https://bugzilla.suse.com/863526
Bugzilla SUSE Bug 863586 https://bugzilla.suse.com/863586
Bugzilla SUSE Bug 863873 https://bugzilla.suse.com/863873
Bugzilla SUSE Bug 864025 https://bugzilla.suse.com/864025
Bugzilla SUSE Bug 864058 https://bugzilla.suse.com/864058
Bugzilla SUSE Bug 864401 https://bugzilla.suse.com/864401
Bugzilla SUSE Bug 864404 https://bugzilla.suse.com/864404
Bugzilla SUSE Bug 864409 https://bugzilla.suse.com/864409
Bugzilla SUSE Bug 864411 https://bugzilla.suse.com/864411
Bugzilla SUSE Bug 864464 https://bugzilla.suse.com/864464
Bugzilla SUSE Bug 864833 https://bugzilla.suse.com/864833
Bugzilla SUSE Bug 864880 https://bugzilla.suse.com/864880
Bugzilla SUSE Bug 865310 https://bugzilla.suse.com/865310
Bugzilla SUSE Bug 865330 https://bugzilla.suse.com/865330
Bugzilla SUSE Bug 865342 https://bugzilla.suse.com/865342
Bugzilla SUSE Bug 865419 https://bugzilla.suse.com/865419
Bugzilla SUSE Bug 865783 https://bugzilla.suse.com/865783
Bugzilla SUSE Bug 865882 https://bugzilla.suse.com/865882
Bugzilla SUSE Bug 866081 https://bugzilla.suse.com/866081
Bugzilla SUSE Bug 866102 https://bugzilla.suse.com/866102
Bugzilla SUSE Bug 866130 https://bugzilla.suse.com/866130
Bugzilla SUSE Bug 866253 https://bugzilla.suse.com/866253
Bugzilla SUSE Bug 866428 https://bugzilla.suse.com/866428
Bugzilla SUSE Bug 866615 https://bugzilla.suse.com/866615
Bugzilla SUSE Bug 866800 https://bugzilla.suse.com/866800
Bugzilla SUSE Bug 866864 https://bugzilla.suse.com/866864
Bugzilla SUSE Bug 866911 https://bugzilla.suse.com/866911
Bugzilla SUSE Bug 867362 https://bugzilla.suse.com/867362
Bugzilla SUSE Bug 867517 https://bugzilla.suse.com/867517
Bugzilla SUSE Bug 867531 https://bugzilla.suse.com/867531
Bugzilla SUSE Bug 867723 https://bugzilla.suse.com/867723
Bugzilla SUSE Bug 867953 https://bugzilla.suse.com/867953
Bugzilla SUSE Bug 868049 https://bugzilla.suse.com/868049
Bugzilla SUSE Bug 868488 https://bugzilla.suse.com/868488
Bugzilla SUSE Bug 868528 https://bugzilla.suse.com/868528
Bugzilla SUSE Bug 868653 https://bugzilla.suse.com/868653
Bugzilla SUSE Bug 868748 https://bugzilla.suse.com/868748
Bugzilla SUSE Bug 869033 https://bugzilla.suse.com/869033
Bugzilla SUSE Bug 869055 https://bugzilla.suse.com/869055
Bugzilla SUSE Bug 869414 https://bugzilla.suse.com/869414
Bugzilla SUSE Bug 869563 https://bugzilla.suse.com/869563
Bugzilla SUSE Bug 869934 https://bugzilla.suse.com/869934
Bugzilla SUSE Bug 870161 https://bugzilla.suse.com/870161
Bugzilla SUSE Bug 870173 https://bugzilla.suse.com/870173
Bugzilla SUSE Bug 870335 https://bugzilla.suse.com/870335
Bugzilla SUSE Bug 870450 https://bugzilla.suse.com/870450
Bugzilla SUSE Bug 870496 https://bugzilla.suse.com/870496
Bugzilla SUSE Bug 870498 https://bugzilla.suse.com/870498
Bugzilla SUSE Bug 870576 https://bugzilla.suse.com/870576
Bugzilla SUSE Bug 870591 https://bugzilla.suse.com/870591
Bugzilla SUSE Bug 870618 https://bugzilla.suse.com/870618
Bugzilla SUSE Bug 870801 https://bugzilla.suse.com/870801
Bugzilla SUSE Bug 870877 https://bugzilla.suse.com/870877
Bugzilla SUSE Bug 870958 https://bugzilla.suse.com/870958
Bugzilla SUSE Bug 871134 https://bugzilla.suse.com/871134
Bugzilla SUSE Bug 871561 https://bugzilla.suse.com/871561
Bugzilla SUSE Bug 871634 https://bugzilla.suse.com/871634
Bugzilla SUSE Bug 871676 https://bugzilla.suse.com/871676
Bugzilla SUSE Bug 871728 https://bugzilla.suse.com/871728
Bugzilla SUSE Bug 871797 https://bugzilla.suse.com/871797
Bugzilla SUSE Bug 871854 https://bugzilla.suse.com/871854
Bugzilla SUSE Bug 871861 https://bugzilla.suse.com/871861
Bugzilla SUSE Bug 871899 https://bugzilla.suse.com/871899
Bugzilla SUSE Bug 872188 https://bugzilla.suse.com/872188
Bugzilla SUSE Bug 872540 https://bugzilla.suse.com/872540
Bugzilla SUSE Bug 872634 https://bugzilla.suse.com/872634
Bugzilla SUSE Bug 873061 https://bugzilla.suse.com/873061
Bugzilla SUSE Bug 873228 https://bugzilla.suse.com/873228
Bugzilla SUSE Bug 873374 https://bugzilla.suse.com/873374
Bugzilla SUSE Bug 873463 https://bugzilla.suse.com/873463
Bugzilla SUSE Bug 874108 https://bugzilla.suse.com/874108
Bugzilla SUSE Bug 874145 https://bugzilla.suse.com/874145
Bugzilla SUSE Bug 874440 https://bugzilla.suse.com/874440
Bugzilla SUSE Bug 874577 https://bugzilla.suse.com/874577
Bugzilla SUSE Bug 875051 https://bugzilla.suse.com/875051
Bugzilla SUSE Bug 875386 https://bugzilla.suse.com/875386
Bugzilla SUSE Bug 875690 https://bugzilla.suse.com/875690
Bugzilla SUSE Bug 875798 https://bugzilla.suse.com/875798
Bugzilla SUSE Bug 876017 https://bugzilla.suse.com/876017
Bugzilla SUSE Bug 876055 https://bugzilla.suse.com/876055
Bugzilla SUSE Bug 876086 https://bugzilla.suse.com/876086
Bugzilla SUSE Bug 876102 https://bugzilla.suse.com/876102
Bugzilla SUSE Bug 876114 https://bugzilla.suse.com/876114
Bugzilla SUSE Bug 876176 https://bugzilla.suse.com/876176
Bugzilla SUSE Bug 876463 https://bugzilla.suse.com/876463
Bugzilla SUSE Bug 876590 https://bugzilla.suse.com/876590
Bugzilla SUSE Bug 876594 https://bugzilla.suse.com/876594
Bugzilla SUSE Bug 876633 https://bugzilla.suse.com/876633
Bugzilla SUSE Bug 877013 https://bugzilla.suse.com/877013
Bugzilla SUSE Bug 877257 https://bugzilla.suse.com/877257
Bugzilla SUSE Bug 877456 https://bugzilla.suse.com/877456
Bugzilla SUSE Bug 877497 https://bugzilla.suse.com/877497
Bugzilla SUSE Bug 877593 https://bugzilla.suse.com/877593
Bugzilla SUSE Bug 877775 https://bugzilla.suse.com/877775
Bugzilla SUSE Bug 878115 https://bugzilla.suse.com/878115
Bugzilla SUSE Bug 878123 https://bugzilla.suse.com/878123
Bugzilla SUSE Bug 878274 https://bugzilla.suse.com/878274
Bugzilla SUSE Bug 878407 https://bugzilla.suse.com/878407
Bugzilla SUSE Bug 878509 https://bugzilla.suse.com/878509
Bugzilla SUSE Bug 879304 https://bugzilla.suse.com/879304
Bugzilla SUSE Bug 879921 https://bugzilla.suse.com/879921
Bugzilla SUSE Bug 879957 https://bugzilla.suse.com/879957
Bugzilla SUSE Bug 880007 https://bugzilla.suse.com/880007
Bugzilla SUSE Bug 880344 https://bugzilla.suse.com/880344
Bugzilla SUSE Bug 880357 https://bugzilla.suse.com/880357
Bugzilla SUSE Bug 880370 https://bugzilla.suse.com/880370
Bugzilla SUSE Bug 880437 https://bugzilla.suse.com/880437
Bugzilla SUSE Bug 880484 https://bugzilla.suse.com/880484
Bugzilla SUSE Bug 880892 https://bugzilla.suse.com/880892
Bugzilla SUSE Bug 881051 https://bugzilla.suse.com/881051
Bugzilla SUSE Bug 881571 https://bugzilla.suse.com/881571
Bugzilla SUSE Bug 881759 https://bugzilla.suse.com/881759
Bugzilla SUSE Bug 881761 https://bugzilla.suse.com/881761
Bugzilla SUSE Bug 881939 https://bugzilla.suse.com/881939
Bugzilla SUSE Bug 882317 https://bugzilla.suse.com/882317
Bugzilla SUSE Bug 882324 https://bugzilla.suse.com/882324
Bugzilla SUSE Bug 882470 https://bugzilla.suse.com/882470
Bugzilla SUSE Bug 882639 https://bugzilla.suse.com/882639
Bugzilla SUSE Bug 882804 https://bugzilla.suse.com/882804
Bugzilla SUSE Bug 882900 https://bugzilla.suse.com/882900
Bugzilla SUSE Bug 883096 https://bugzilla.suse.com/883096
Bugzilla SUSE Bug 883376 https://bugzilla.suse.com/883376
Bugzilla SUSE Bug 883380 https://bugzilla.suse.com/883380
Bugzilla SUSE Bug 883518 https://bugzilla.suse.com/883518
Bugzilla SUSE Bug 883724 https://bugzilla.suse.com/883724
Bugzilla SUSE Bug 883795 https://bugzilla.suse.com/883795
Bugzilla SUSE Bug 883948 https://bugzilla.suse.com/883948
Bugzilla SUSE Bug 884333 https://bugzilla.suse.com/884333
Bugzilla SUSE Bug 884582 https://bugzilla.suse.com/884582
Bugzilla SUSE Bug 884725 https://bugzilla.suse.com/884725
Bugzilla SUSE Bug 884767 https://bugzilla.suse.com/884767
Bugzilla SUSE Bug 884817 https://bugzilla.suse.com/884817
Bugzilla SUSE Bug 885077 https://bugzilla.suse.com/885077
Bugzilla SUSE Bug 885262 https://bugzilla.suse.com/885262
Bugzilla SUSE Bug 885382 https://bugzilla.suse.com/885382
Bugzilla SUSE Bug 885422 https://bugzilla.suse.com/885422
Bugzilla SUSE Bug 885509 https://bugzilla.suse.com/885509
Bugzilla SUSE Bug 885725 https://bugzilla.suse.com/885725
Bugzilla SUSE Bug 886840 https://bugzilla.suse.com/886840
Bugzilla SUSE Bug 887082 https://bugzilla.suse.com/887082
Bugzilla SUSE Bug 887418 https://bugzilla.suse.com/887418
Bugzilla SUSE Bug 887503 https://bugzilla.suse.com/887503
Bugzilla SUSE Bug 887597 https://bugzilla.suse.com/887597
Bugzilla SUSE Bug 887608 https://bugzilla.suse.com/887608
Bugzilla SUSE Bug 887645 https://bugzilla.suse.com/887645
Bugzilla SUSE Bug 887680 https://bugzilla.suse.com/887680
Bugzilla SUSE Bug 888058 https://bugzilla.suse.com/888058
Bugzilla SUSE Bug 888105 https://bugzilla.suse.com/888105
Bugzilla SUSE Bug 888591 https://bugzilla.suse.com/888591
Bugzilla SUSE Bug 888607 https://bugzilla.suse.com/888607
Bugzilla SUSE Bug 888847 https://bugzilla.suse.com/888847
Bugzilla SUSE Bug 888849 https://bugzilla.suse.com/888849
Bugzilla SUSE Bug 888968 https://bugzilla.suse.com/888968
Bugzilla SUSE Bug 889061 https://bugzilla.suse.com/889061
Bugzilla SUSE Bug 889173 https://bugzilla.suse.com/889173
Bugzilla SUSE Bug 889221 https://bugzilla.suse.com/889221
Bugzilla SUSE Bug 889451 https://bugzilla.suse.com/889451
Bugzilla SUSE Bug 889614 https://bugzilla.suse.com/889614
Bugzilla SUSE Bug 889727 https://bugzilla.suse.com/889727
Bugzilla SUSE Bug 890297 https://bugzilla.suse.com/890297
Bugzilla SUSE Bug 890426 https://bugzilla.suse.com/890426
Bugzilla SUSE Bug 890513 https://bugzilla.suse.com/890513
Bugzilla SUSE Bug 890526 https://bugzilla.suse.com/890526
Bugzilla SUSE Bug 891087 https://bugzilla.suse.com/891087
Bugzilla SUSE Bug 891211 https://bugzilla.suse.com/891211
Bugzilla SUSE Bug 891212 https://bugzilla.suse.com/891212
Bugzilla SUSE Bug 891259 https://bugzilla.suse.com/891259
Bugzilla SUSE Bug 891277 https://bugzilla.suse.com/891277
Bugzilla SUSE Bug 891281 https://bugzilla.suse.com/891281
Bugzilla SUSE Bug 891368 https://bugzilla.suse.com/891368
Bugzilla SUSE Bug 891619 https://bugzilla.suse.com/891619
Bugzilla SUSE Bug 891641 https://bugzilla.suse.com/891641
Bugzilla SUSE Bug 891746 https://bugzilla.suse.com/891746
Bugzilla SUSE Bug 891790 https://bugzilla.suse.com/891790
Bugzilla SUSE Bug 892200 https://bugzilla.suse.com/892200
Bugzilla SUSE Bug 892490 https://bugzilla.suse.com/892490
Bugzilla SUSE Bug 892723 https://bugzilla.suse.com/892723
Bugzilla SUSE Bug 892782 https://bugzilla.suse.com/892782
Bugzilla SUSE Bug 893064 https://bugzilla.suse.com/893064
Bugzilla SUSE Bug 893496 https://bugzilla.suse.com/893496
Bugzilla SUSE Bug 893596 https://bugzilla.suse.com/893596
Bugzilla SUSE Bug 893758 https://bugzilla.suse.com/893758
Bugzilla SUSE Bug 894058 https://bugzilla.suse.com/894058
Bugzilla SUSE Bug 894200 https://bugzilla.suse.com/894200
Bugzilla SUSE Bug 894213 https://bugzilla.suse.com/894213
Bugzilla SUSE Bug 894895 https://bugzilla.suse.com/894895
Bugzilla SUSE Bug 895221 https://bugzilla.suse.com/895221
Bugzilla SUSE Bug 895387 https://bugzilla.suse.com/895387
Bugzilla SUSE Bug 895468 https://bugzilla.suse.com/895468
Bugzilla SUSE Bug 895608 https://bugzilla.suse.com/895608
Bugzilla SUSE Bug 895680 https://bugzilla.suse.com/895680
Bugzilla SUSE Bug 895841 https://bugzilla.suse.com/895841
Bugzilla SUSE Bug 895983 https://bugzilla.suse.com/895983
Bugzilla SUSE Bug 896382 https://bugzilla.suse.com/896382
Bugzilla SUSE Bug 896390 https://bugzilla.suse.com/896390
Bugzilla SUSE Bug 896391 https://bugzilla.suse.com/896391
Bugzilla SUSE Bug 896392 https://bugzilla.suse.com/896392
Bugzilla SUSE Bug 896415 https://bugzilla.suse.com/896415
Bugzilla SUSE Bug 896484 https://bugzilla.suse.com/896484
Bugzilla SUSE Bug 896689 https://bugzilla.suse.com/896689
Bugzilla SUSE Bug 897502 https://bugzilla.suse.com/897502
Bugzilla SUSE Bug 897694 https://bugzilla.suse.com/897694
Bugzilla SUSE Bug 897708 https://bugzilla.suse.com/897708
Bugzilla SUSE Bug 898295 https://bugzilla.suse.com/898295
Bugzilla SUSE Bug 898375 https://bugzilla.suse.com/898375
Bugzilla SUSE Bug 898554 https://bugzilla.suse.com/898554
Bugzilla SUSE Bug 899192 https://bugzilla.suse.com/899192
Bugzilla SUSE Bug 899574 https://bugzilla.suse.com/899574
Bugzilla SUSE Bug 899843 https://bugzilla.suse.com/899843
Bugzilla SUSE Bug 900279 https://bugzilla.suse.com/900279
Bugzilla SUSE Bug 900644 https://bugzilla.suse.com/900644
Bugzilla SUSE Bug 900881 https://bugzilla.suse.com/900881
Bugzilla SUSE Bug 901638 https://bugzilla.suse.com/901638
Bugzilla SUSE Bug 902232 https://bugzilla.suse.com/902232
Bugzilla SUSE Bug 902286 https://bugzilla.suse.com/902286
Bugzilla SUSE Bug 902346 https://bugzilla.suse.com/902346
Bugzilla SUSE Bug 902349 https://bugzilla.suse.com/902349
Bugzilla SUSE Bug 902351 https://bugzilla.suse.com/902351
Bugzilla SUSE Bug 902675 https://bugzilla.suse.com/902675
Bugzilla SUSE Bug 903096 https://bugzilla.suse.com/903096
Bugzilla SUSE Bug 903331 https://bugzilla.suse.com/903331
Bugzilla SUSE Bug 903640 https://bugzilla.suse.com/903640
Bugzilla SUSE Bug 903653 https://bugzilla.suse.com/903653
Bugzilla SUSE Bug 904013 https://bugzilla.suse.com/904013
Bugzilla SUSE Bug 904053 https://bugzilla.suse.com/904053
Bugzilla SUSE Bug 904242 https://bugzilla.suse.com/904242
Bugzilla SUSE Bug 904358 https://bugzilla.suse.com/904358
Bugzilla SUSE Bug 904659 https://bugzilla.suse.com/904659
Bugzilla SUSE Bug 904671 https://bugzilla.suse.com/904671
Bugzilla SUSE Bug 904700 https://bugzilla.suse.com/904700
Bugzilla SUSE Bug 904883 https://bugzilla.suse.com/904883
Bugzilla SUSE Bug 904901 https://bugzilla.suse.com/904901
Bugzilla SUSE Bug 905100 https://bugzilla.suse.com/905100
Bugzilla SUSE Bug 905304 https://bugzilla.suse.com/905304
Bugzilla SUSE Bug 905312 https://bugzilla.suse.com/905312
Bugzilla SUSE Bug 905522 https://bugzilla.suse.com/905522
Bugzilla SUSE Bug 905799 https://bugzilla.suse.com/905799
Bugzilla SUSE Bug 906027 https://bugzilla.suse.com/906027
Bugzilla SUSE Bug 906586 https://bugzilla.suse.com/906586
Bugzilla SUSE Bug 907196 https://bugzilla.suse.com/907196
Bugzilla SUSE Bug 907338 https://bugzilla.suse.com/907338
Bugzilla SUSE Bug 907551 https://bugzilla.suse.com/907551
Bugzilla SUSE Bug 907611 https://bugzilla.suse.com/907611
Bugzilla SUSE Bug 907818 https://bugzilla.suse.com/907818
Bugzilla SUSE Bug 908069 https://bugzilla.suse.com/908069
Bugzilla SUSE Bug 908163 https://bugzilla.suse.com/908163
Bugzilla SUSE Bug 908393 https://bugzilla.suse.com/908393
Bugzilla SUSE Bug 908550 https://bugzilla.suse.com/908550
Bugzilla SUSE Bug 908551 https://bugzilla.suse.com/908551
Bugzilla SUSE Bug 908572 https://bugzilla.suse.com/908572
Bugzilla SUSE Bug 908706 https://bugzilla.suse.com/908706
Bugzilla SUSE Bug 908825 https://bugzilla.suse.com/908825
Bugzilla SUSE Bug 909077 https://bugzilla.suse.com/909077
Bugzilla SUSE Bug 909078 https://bugzilla.suse.com/909078
Bugzilla SUSE Bug 909088 https://bugzilla.suse.com/909088
Bugzilla SUSE Bug 909092 https://bugzilla.suse.com/909092
Bugzilla SUSE Bug 909093 https://bugzilla.suse.com/909093
Bugzilla SUSE Bug 909095 https://bugzilla.suse.com/909095
Bugzilla SUSE Bug 909264 https://bugzilla.suse.com/909264
Bugzilla SUSE Bug 909309 https://bugzilla.suse.com/909309
Bugzilla SUSE Bug 909312 https://bugzilla.suse.com/909312
Bugzilla SUSE Bug 909477 https://bugzilla.suse.com/909477
Bugzilla SUSE Bug 909565 https://bugzilla.suse.com/909565
Bugzilla SUSE Bug 909684 https://bugzilla.suse.com/909684
Bugzilla SUSE Bug 909740 https://bugzilla.suse.com/909740
Bugzilla SUSE Bug 909846 https://bugzilla.suse.com/909846
Bugzilla SUSE Bug 910013 https://bugzilla.suse.com/910013
Bugzilla SUSE Bug 910150 https://bugzilla.suse.com/910150
Bugzilla SUSE Bug 910159 https://bugzilla.suse.com/910159
Bugzilla SUSE Bug 910251 https://bugzilla.suse.com/910251
Bugzilla SUSE Bug 910321 https://bugzilla.suse.com/910321
Bugzilla SUSE Bug 910322 https://bugzilla.suse.com/910322
Bugzilla SUSE Bug 910517 https://bugzilla.suse.com/910517
Bugzilla SUSE Bug 911181 https://bugzilla.suse.com/911181
Bugzilla SUSE Bug 911325 https://bugzilla.suse.com/911325
Bugzilla SUSE Bug 911326 https://bugzilla.suse.com/911326
Bugzilla SUSE Bug 912171 https://bugzilla.suse.com/912171
Bugzilla SUSE Bug 912202 https://bugzilla.suse.com/912202
Bugzilla SUSE Bug 912705 https://bugzilla.suse.com/912705
Bugzilla SUSE Bug 912741 https://bugzilla.suse.com/912741
Bugzilla SUSE Bug 913059 https://bugzilla.suse.com/913059
Bugzilla SUSE Bug 913080 https://bugzilla.suse.com/913080
Bugzilla SUSE Bug 913598 https://bugzilla.suse.com/913598
Bugzilla SUSE Bug 914355 https://bugzilla.suse.com/914355
Bugzilla SUSE Bug 914423 https://bugzilla.suse.com/914423
Bugzilla SUSE Bug 914726 https://bugzilla.suse.com/914726
Bugzilla SUSE Bug 914742 https://bugzilla.suse.com/914742
Bugzilla SUSE Bug 914818 https://bugzilla.suse.com/914818
Bugzilla SUSE Bug 914987 https://bugzilla.suse.com/914987
Bugzilla SUSE Bug 915045 https://bugzilla.suse.com/915045
Bugzilla SUSE Bug 915200 https://bugzilla.suse.com/915200
Bugzilla SUSE Bug 915209 https://bugzilla.suse.com/915209
Bugzilla SUSE Bug 915322 https://bugzilla.suse.com/915322
Bugzilla SUSE Bug 915335 https://bugzilla.suse.com/915335
Bugzilla SUSE Bug 915577 https://bugzilla.suse.com/915577
Bugzilla SUSE Bug 915791 https://bugzilla.suse.com/915791
Bugzilla SUSE Bug 915826 https://bugzilla.suse.com/915826
Bugzilla SUSE Bug 916515 https://bugzilla.suse.com/916515
Bugzilla SUSE Bug 916521 https://bugzilla.suse.com/916521
Bugzilla SUSE Bug 916848 https://bugzilla.suse.com/916848
Bugzilla SUSE Bug 916982 https://bugzilla.suse.com/916982
Bugzilla SUSE Bug 917093 https://bugzilla.suse.com/917093
Bugzilla SUSE Bug 917120 https://bugzilla.suse.com/917120
Bugzilla SUSE Bug 917648 https://bugzilla.suse.com/917648
Bugzilla SUSE Bug 917684 https://bugzilla.suse.com/917684
Bugzilla SUSE Bug 917830 https://bugzilla.suse.com/917830
Bugzilla SUSE Bug 917839 https://bugzilla.suse.com/917839
Bugzilla SUSE Bug 917884 https://bugzilla.suse.com/917884
Bugzilla SUSE Bug 918333 https://bugzilla.suse.com/918333
Bugzilla SUSE Bug 919007 https://bugzilla.suse.com/919007
Bugzilla SUSE Bug 919018 https://bugzilla.suse.com/919018
Bugzilla SUSE Bug 919357 https://bugzilla.suse.com/919357
Bugzilla SUSE Bug 919463 https://bugzilla.suse.com/919463
Bugzilla SUSE Bug 919589 https://bugzilla.suse.com/919589
Bugzilla SUSE Bug 919682 https://bugzilla.suse.com/919682
Bugzilla SUSE Bug 919808 https://bugzilla.suse.com/919808
Bugzilla SUSE Bug 920250 https://bugzilla.suse.com/920250
Bugzilla SUSE Bug 921769 https://bugzilla.suse.com/921769
Bugzilla SUSE Bug 922583 https://bugzilla.suse.com/922583
Bugzilla SUSE Bug 923344 https://bugzilla.suse.com/923344
Bugzilla SUSE Bug 924142 https://bugzilla.suse.com/924142
Bugzilla SUSE Bug 924271 https://bugzilla.suse.com/924271
Bugzilla SUSE Bug 924282 https://bugzilla.suse.com/924282
Bugzilla SUSE Bug 924333 https://bugzilla.suse.com/924333
Bugzilla SUSE Bug 924340 https://bugzilla.suse.com/924340
Bugzilla SUSE Bug 925012 https://bugzilla.suse.com/925012
Bugzilla SUSE Bug 925370 https://bugzilla.suse.com/925370
Bugzilla SUSE Bug 925443 https://bugzilla.suse.com/925443
Bugzilla SUSE Bug 925567 https://bugzilla.suse.com/925567
Bugzilla SUSE Bug 925729 https://bugzilla.suse.com/925729
Bugzilla SUSE Bug 926016 https://bugzilla.suse.com/926016
Bugzilla SUSE Bug 926240 https://bugzilla.suse.com/926240
Bugzilla SUSE Bug 926439 https://bugzilla.suse.com/926439
Bugzilla SUSE Bug 926767 https://bugzilla.suse.com/926767
Bugzilla SUSE Bug 927190 https://bugzilla.suse.com/927190
Bugzilla SUSE Bug 927257 https://bugzilla.suse.com/927257
Bugzilla SUSE Bug 927262 https://bugzilla.suse.com/927262
Bugzilla SUSE Bug 927338 https://bugzilla.suse.com/927338
Bugzilla SUSE Bug 928122 https://bugzilla.suse.com/928122
Bugzilla SUSE Bug 928130 https://bugzilla.suse.com/928130
Bugzilla SUSE Bug 928142 https://bugzilla.suse.com/928142
Bugzilla SUSE Bug 928333 https://bugzilla.suse.com/928333
Bugzilla SUSE Bug 928970 https://bugzilla.suse.com/928970
Bugzilla SUSE Bug 929145 https://bugzilla.suse.com/929145
Bugzilla SUSE Bug 929148 https://bugzilla.suse.com/929148
Bugzilla SUSE Bug 929283 https://bugzilla.suse.com/929283
Bugzilla SUSE Bug 929525 https://bugzilla.suse.com/929525
Bugzilla SUSE Bug 929647 https://bugzilla.suse.com/929647
Bugzilla SUSE Bug 930145 https://bugzilla.suse.com/930145
Bugzilla SUSE Bug 930171 https://bugzilla.suse.com/930171
Bugzilla SUSE Bug 930226 https://bugzilla.suse.com/930226
Bugzilla SUSE Bug 930284 https://bugzilla.suse.com/930284
Bugzilla SUSE Bug 930401 https://bugzilla.suse.com/930401
Bugzilla SUSE Bug 930669 https://bugzilla.suse.com/930669
Bugzilla SUSE Bug 930786 https://bugzilla.suse.com/930786
Bugzilla SUSE Bug 930788 https://bugzilla.suse.com/930788
Bugzilla SUSE Bug 931014 https://bugzilla.suse.com/931014
Bugzilla SUSE Bug 931015 https://bugzilla.suse.com/931015
Bugzilla SUSE Bug 931850 https://bugzilla.suse.com/931850
CVE SUSE CVE CVE-2012-2372 page https://www.suse.com/security/cve/CVE-2012-2372/
CVE SUSE CVE CVE-2012-4398 page https://www.suse.com/security/cve/CVE-2012-4398/
CVE SUSE CVE CVE-2013-0160 page https://www.suse.com/security/cve/CVE-2013-0160/
CVE SUSE CVE CVE-2013-1059 page https://www.suse.com/security/cve/CVE-2013-1059/
CVE SUSE CVE CVE-2013-1774 page https://www.suse.com/security/cve/CVE-2013-1774/
CVE SUSE CVE CVE-2013-1819 page https://www.suse.com/security/cve/CVE-2013-1819/
CVE SUSE CVE CVE-2013-1929 page https://www.suse.com/security/cve/CVE-2013-1929/
CVE SUSE CVE CVE-2013-1979 page https://www.suse.com/security/cve/CVE-2013-1979/
CVE SUSE CVE CVE-2013-2146 page https://www.suse.com/security/cve/CVE-2013-2146/
CVE SUSE CVE CVE-2013-2148 page https://www.suse.com/security/cve/CVE-2013-2148/
CVE SUSE CVE CVE-2013-2164 page https://www.suse.com/security/cve/CVE-2013-2164/
CVE SUSE CVE CVE-2013-2206 page https://www.suse.com/security/cve/CVE-2013-2206/
CVE SUSE CVE CVE-2013-2232 page https://www.suse.com/security/cve/CVE-2013-2232/
CVE SUSE CVE CVE-2013-2234 page https://www.suse.com/security/cve/CVE-2013-2234/
CVE SUSE CVE CVE-2013-2237 page https://www.suse.com/security/cve/CVE-2013-2237/
CVE SUSE CVE CVE-2013-2851 page https://www.suse.com/security/cve/CVE-2013-2851/
CVE SUSE CVE CVE-2013-2852 page https://www.suse.com/security/cve/CVE-2013-2852/
CVE SUSE CVE CVE-2013-2889 page https://www.suse.com/security/cve/CVE-2013-2889/
CVE SUSE CVE CVE-2013-2893 page https://www.suse.com/security/cve/CVE-2013-2893/
CVE SUSE CVE CVE-2013-2897 page https://www.suse.com/security/cve/CVE-2013-2897/
CVE SUSE CVE CVE-2013-2899 page https://www.suse.com/security/cve/CVE-2013-2899/
CVE SUSE CVE CVE-2013-2929 page https://www.suse.com/security/cve/CVE-2013-2929/
CVE SUSE CVE CVE-2013-2930 page https://www.suse.com/security/cve/CVE-2013-2930/
CVE SUSE CVE CVE-2013-3076 page https://www.suse.com/security/cve/CVE-2013-3076/
CVE SUSE CVE CVE-2013-3222 page https://www.suse.com/security/cve/CVE-2013-3222/
CVE SUSE CVE CVE-2013-3223 page https://www.suse.com/security/cve/CVE-2013-3223/
CVE SUSE CVE CVE-2013-3224 page https://www.suse.com/security/cve/CVE-2013-3224/
CVE SUSE CVE CVE-2013-3225 page https://www.suse.com/security/cve/CVE-2013-3225/
CVE SUSE CVE CVE-2013-3227 page https://www.suse.com/security/cve/CVE-2013-3227/
CVE SUSE CVE CVE-2013-3228 page https://www.suse.com/security/cve/CVE-2013-3228/
CVE SUSE CVE CVE-2013-3229 page https://www.suse.com/security/cve/CVE-2013-3229/
CVE SUSE CVE CVE-2013-3231 page https://www.suse.com/security/cve/CVE-2013-3231/
CVE SUSE CVE CVE-2013-3232 page https://www.suse.com/security/cve/CVE-2013-3232/
CVE SUSE CVE CVE-2013-3234 page https://www.suse.com/security/cve/CVE-2013-3234/
CVE SUSE CVE CVE-2013-3235 page https://www.suse.com/security/cve/CVE-2013-3235/
CVE SUSE CVE CVE-2013-3301 page https://www.suse.com/security/cve/CVE-2013-3301/
CVE SUSE CVE CVE-2013-4162 page https://www.suse.com/security/cve/CVE-2013-4162/
CVE SUSE CVE CVE-2013-4163 page https://www.suse.com/security/cve/CVE-2013-4163/
CVE SUSE CVE CVE-2013-4299 page https://www.suse.com/security/cve/CVE-2013-4299/
CVE SUSE CVE CVE-2013-4345 page https://www.suse.com/security/cve/CVE-2013-4345/
CVE SUSE CVE CVE-2013-4470 page https://www.suse.com/security/cve/CVE-2013-4470/
CVE SUSE CVE CVE-2013-4483 page https://www.suse.com/security/cve/CVE-2013-4483/
CVE SUSE CVE CVE-2013-4511 page https://www.suse.com/security/cve/CVE-2013-4511/
CVE SUSE CVE CVE-2013-4514 page https://www.suse.com/security/cve/CVE-2013-4514/
CVE SUSE CVE CVE-2013-4515 page https://www.suse.com/security/cve/CVE-2013-4515/
CVE SUSE CVE CVE-2013-4579 page https://www.suse.com/security/cve/CVE-2013-4579/
CVE SUSE CVE CVE-2013-4587 page https://www.suse.com/security/cve/CVE-2013-4587/
CVE SUSE CVE CVE-2013-4592 page https://www.suse.com/security/cve/CVE-2013-4592/
CVE SUSE CVE CVE-2013-6367 page https://www.suse.com/security/cve/CVE-2013-6367/
CVE SUSE CVE CVE-2013-6368 page https://www.suse.com/security/cve/CVE-2013-6368/
CVE SUSE CVE CVE-2013-6376 page https://www.suse.com/security/cve/CVE-2013-6376/
CVE SUSE CVE CVE-2013-6378 page https://www.suse.com/security/cve/CVE-2013-6378/
CVE SUSE CVE CVE-2013-6380 page https://www.suse.com/security/cve/CVE-2013-6380/
CVE SUSE CVE CVE-2013-6382 page https://www.suse.com/security/cve/CVE-2013-6382/
CVE SUSE CVE CVE-2013-6383 page https://www.suse.com/security/cve/CVE-2013-6383/
CVE SUSE CVE CVE-2013-6463 page https://www.suse.com/security/cve/CVE-2013-6463/
CVE SUSE CVE CVE-2013-6885 page https://www.suse.com/security/cve/CVE-2013-6885/
CVE SUSE CVE CVE-2013-7027 page https://www.suse.com/security/cve/CVE-2013-7027/
CVE SUSE CVE CVE-2013-7263 page https://www.suse.com/security/cve/CVE-2013-7263/
CVE SUSE CVE CVE-2013-7264 page https://www.suse.com/security/cve/CVE-2013-7264/
CVE SUSE CVE CVE-2013-7265 page https://www.suse.com/security/cve/CVE-2013-7265/
CVE SUSE CVE CVE-2013-7339 page https://www.suse.com/security/cve/CVE-2013-7339/
CVE SUSE CVE CVE-2014-0055 page https://www.suse.com/security/cve/CVE-2014-0055/
CVE SUSE CVE CVE-2014-0069 page https://www.suse.com/security/cve/CVE-2014-0069/
CVE SUSE CVE CVE-2014-0077 page https://www.suse.com/security/cve/CVE-2014-0077/
CVE SUSE CVE CVE-2014-0101 page https://www.suse.com/security/cve/CVE-2014-0101/
CVE SUSE CVE CVE-2014-0131 page https://www.suse.com/security/cve/CVE-2014-0131/
CVE SUSE CVE CVE-2014-0155 page https://www.suse.com/security/cve/CVE-2014-0155/
CVE SUSE CVE CVE-2014-0181 page https://www.suse.com/security/cve/CVE-2014-0181/
CVE SUSE CVE CVE-2014-0196 page https://www.suse.com/security/cve/CVE-2014-0196/
CVE SUSE CVE CVE-2014-1444 page https://www.suse.com/security/cve/CVE-2014-1444/
CVE SUSE CVE CVE-2014-1445 page https://www.suse.com/security/cve/CVE-2014-1445/
CVE SUSE CVE CVE-2014-1446 page https://www.suse.com/security/cve/CVE-2014-1446/
CVE SUSE CVE CVE-2014-1737 page https://www.suse.com/security/cve/CVE-2014-1737/
CVE SUSE CVE CVE-2014-1738 page https://www.suse.com/security/cve/CVE-2014-1738/
CVE SUSE CVE CVE-2014-1739 page https://www.suse.com/security/cve/CVE-2014-1739/
CVE SUSE CVE CVE-2014-1874 page https://www.suse.com/security/cve/CVE-2014-1874/
CVE SUSE CVE CVE-2014-2309 page https://www.suse.com/security/cve/CVE-2014-2309/
CVE SUSE CVE CVE-2014-2523 page https://www.suse.com/security/cve/CVE-2014-2523/
CVE SUSE CVE CVE-2014-2678 page https://www.suse.com/security/cve/CVE-2014-2678/
CVE SUSE CVE CVE-2014-2706 page https://www.suse.com/security/cve/CVE-2014-2706/
CVE SUSE CVE CVE-2014-2851 page https://www.suse.com/security/cve/CVE-2014-2851/
CVE SUSE CVE CVE-2014-3122 page https://www.suse.com/security/cve/CVE-2014-3122/
CVE SUSE CVE CVE-2014-3144 page https://www.suse.com/security/cve/CVE-2014-3144/
CVE SUSE CVE CVE-2014-3145 page https://www.suse.com/security/cve/CVE-2014-3145/
CVE SUSE CVE CVE-2014-3153 page https://www.suse.com/security/cve/CVE-2014-3153/
CVE SUSE CVE CVE-2014-3181 page https://www.suse.com/security/cve/CVE-2014-3181/
CVE SUSE CVE CVE-2014-3184 page https://www.suse.com/security/cve/CVE-2014-3184/
CVE SUSE CVE CVE-2014-3185 page https://www.suse.com/security/cve/CVE-2014-3185/
CVE SUSE CVE CVE-2014-3186 page https://www.suse.com/security/cve/CVE-2014-3186/
CVE SUSE CVE CVE-2014-3601 page https://www.suse.com/security/cve/CVE-2014-3601/
CVE SUSE CVE CVE-2014-3610 page https://www.suse.com/security/cve/CVE-2014-3610/
CVE SUSE CVE CVE-2014-3646 page https://www.suse.com/security/cve/CVE-2014-3646/
CVE SUSE CVE CVE-2014-3647 page https://www.suse.com/security/cve/CVE-2014-3647/
CVE SUSE CVE CVE-2014-3673 page https://www.suse.com/security/cve/CVE-2014-3673/
CVE SUSE CVE CVE-2014-3687 page https://www.suse.com/security/cve/CVE-2014-3687/
CVE SUSE CVE CVE-2014-3688 page https://www.suse.com/security/cve/CVE-2014-3688/
CVE SUSE CVE CVE-2014-3690 page https://www.suse.com/security/cve/CVE-2014-3690/
CVE SUSE CVE CVE-2014-3917 page https://www.suse.com/security/cve/CVE-2014-3917/
CVE SUSE CVE CVE-2014-4027 page https://www.suse.com/security/cve/CVE-2014-4027/
CVE SUSE CVE CVE-2014-4171 page https://www.suse.com/security/cve/CVE-2014-4171/
CVE SUSE CVE CVE-2014-4508 page https://www.suse.com/security/cve/CVE-2014-4508/
CVE SUSE CVE CVE-2014-4608 page https://www.suse.com/security/cve/CVE-2014-4608/
CVE SUSE CVE CVE-2014-4652 page https://www.suse.com/security/cve/CVE-2014-4652/
CVE SUSE CVE CVE-2014-4653 page https://www.suse.com/security/cve/CVE-2014-4653/
CVE SUSE CVE CVE-2014-4654 page https://www.suse.com/security/cve/CVE-2014-4654/
CVE SUSE CVE CVE-2014-4655 page https://www.suse.com/security/cve/CVE-2014-4655/
CVE SUSE CVE CVE-2014-4656 page https://www.suse.com/security/cve/CVE-2014-4656/
CVE SUSE CVE CVE-2014-4667 page https://www.suse.com/security/cve/CVE-2014-4667/
CVE SUSE CVE CVE-2014-4699 page https://www.suse.com/security/cve/CVE-2014-4699/
CVE SUSE CVE CVE-2014-4943 page https://www.suse.com/security/cve/CVE-2014-4943/
CVE SUSE CVE CVE-2014-5077 page https://www.suse.com/security/cve/CVE-2014-5077/
CVE SUSE CVE CVE-2014-5471 page https://www.suse.com/security/cve/CVE-2014-5471/
CVE SUSE CVE CVE-2014-5472 page https://www.suse.com/security/cve/CVE-2014-5472/
CVE SUSE CVE CVE-2014-6410 page https://www.suse.com/security/cve/CVE-2014-6410/
CVE SUSE CVE CVE-2014-7822 page https://www.suse.com/security/cve/CVE-2014-7822/
CVE SUSE CVE CVE-2014-7826 page https://www.suse.com/security/cve/CVE-2014-7826/
CVE SUSE CVE CVE-2014-7841 page https://www.suse.com/security/cve/CVE-2014-7841/
CVE SUSE CVE CVE-2014-7842 page https://www.suse.com/security/cve/CVE-2014-7842/
CVE SUSE CVE CVE-2014-7970 page https://www.suse.com/security/cve/CVE-2014-7970/
CVE SUSE CVE CVE-2014-8086 page https://www.suse.com/security/cve/CVE-2014-8086/
CVE SUSE CVE CVE-2014-8133 page https://www.suse.com/security/cve/CVE-2014-8133/
CVE SUSE CVE CVE-2014-8134 page https://www.suse.com/security/cve/CVE-2014-8134/
CVE SUSE CVE CVE-2014-8159 page https://www.suse.com/security/cve/CVE-2014-8159/
CVE SUSE CVE CVE-2014-8160 page https://www.suse.com/security/cve/CVE-2014-8160/
CVE SUSE CVE CVE-2014-8369 page https://www.suse.com/security/cve/CVE-2014-8369/
CVE SUSE CVE CVE-2014-8559 page https://www.suse.com/security/cve/CVE-2014-8559/
CVE SUSE CVE CVE-2014-8709 page https://www.suse.com/security/cve/CVE-2014-8709/
CVE SUSE CVE CVE-2014-8884 page https://www.suse.com/security/cve/CVE-2014-8884/
CVE SUSE CVE CVE-2014-9090 page https://www.suse.com/security/cve/CVE-2014-9090/
CVE SUSE CVE CVE-2014-9322 page https://www.suse.com/security/cve/CVE-2014-9322/
CVE SUSE CVE CVE-2014-9419 page https://www.suse.com/security/cve/CVE-2014-9419/
CVE SUSE CVE CVE-2014-9420 page https://www.suse.com/security/cve/CVE-2014-9420/
CVE SUSE CVE CVE-2014-9529 page https://www.suse.com/security/cve/CVE-2014-9529/
CVE SUSE CVE CVE-2014-9584 page https://www.suse.com/security/cve/CVE-2014-9584/
CVE SUSE CVE CVE-2014-9585 page https://www.suse.com/security/cve/CVE-2014-9585/
CVE SUSE CVE CVE-2014-9683 page https://www.suse.com/security/cve/CVE-2014-9683/
CVE SUSE CVE CVE-2015-0777 page https://www.suse.com/security/cve/CVE-2015-0777/
CVE SUSE CVE CVE-2015-1421 page https://www.suse.com/security/cve/CVE-2015-1421/
CVE SUSE CVE CVE-2015-1593 page https://www.suse.com/security/cve/CVE-2015-1593/
CVE SUSE CVE CVE-2015-2041 page https://www.suse.com/security/cve/CVE-2015-2041/
CVE SUSE CVE CVE-2015-2042 page https://www.suse.com/security/cve/CVE-2015-2042/
CVE SUSE CVE CVE-2015-2150 page https://www.suse.com/security/cve/CVE-2015-2150/
CVE SUSE CVE CVE-2015-2830 page https://www.suse.com/security/cve/CVE-2015-2830/
CVE SUSE CVE CVE-2015-2922 page https://www.suse.com/security/cve/CVE-2015-2922/
CVE SUSE CVE CVE-2015-3331 page https://www.suse.com/security/cve/CVE-2015-3331/
CVE SUSE CVE CVE-2015-3339 page https://www.suse.com/security/cve/CVE-2015-3339/
CVE SUSE CVE CVE-2015-3636 page https://www.suse.com/security/cve/CVE-2015-3636/
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/suse/xen-kmp-pae?arch=i586&distro=sles-11&sp=3 suse xen-kmp-pae < 4.2.4_04_3.0.101_0.40-0.7.3 sles-11 i586
Affected pkg:rpm/suse/xen-kmp-pae?arch=i586&distro=sled-11&sp=3 suse xen-kmp-pae < 4.2.4_04_3.0.101_0.40-0.7.3 sled-11 i586
Affected pkg:rpm/suse/xen-kmp-default?arch=x86_64&distro=sles-11&sp=3 suse xen-kmp-default < 4.2.4_04_3.0.101_0.40-0.7.3 sles-11 x86_64
Affected pkg:rpm/suse/xen-kmp-default?arch=x86_64&distro=sled-11&sp=3 suse xen-kmp-default < 4.2.4_04_3.0.101_0.40-0.7.3 sled-11 x86_64
Affected pkg:rpm/suse/xen-kmp-default?arch=i586&distro=sles-11&sp=3 suse xen-kmp-default < 4.2.4_04_3.0.101_0.40-0.7.3 sles-11 i586
Affected pkg:rpm/suse/xen-kmp-default?arch=i586&distro=sled-11&sp=3 suse xen-kmp-default < 4.2.4_04_3.0.101_0.40-0.7.3 sled-11 i586
Affected pkg:rpm/suse/kernel-xen?arch=x86_64&distro=sles-11&sp=3 suse kernel-xen < 3.0.101-0.40.1 sles-11 x86_64
Affected pkg:rpm/suse/kernel-xen?arch=x86_64&distro=sled-11&sp=3 suse kernel-xen < 3.0.101-0.40.1 sled-11 x86_64
Affected pkg:rpm/suse/kernel-xen?arch=i586&distro=sles-11&sp=3 suse kernel-xen < 3.0.101-0.40.1 sles-11 i586
Affected pkg:rpm/suse/kernel-xen?arch=i586&distro=sled-11&sp=3 suse kernel-xen < 3.0.101-0.40.1 sled-11 i586
Affected pkg:rpm/suse/kernel-xen-extra?arch=x86_64&distro=sled-11&sp=3 suse kernel-xen-extra < 3.0.101-0.40.1 sled-11 x86_64
Affected pkg:rpm/suse/kernel-xen-extra?arch=i586&distro=sled-11&sp=3 suse kernel-xen-extra < 3.0.101-0.40.1 sled-11 i586
Affected pkg:rpm/suse/kernel-xen-devel?arch=x86_64&distro=sles-11&sp=3 suse kernel-xen-devel < 3.0.101-0.40.1 sles-11 x86_64
Affected pkg:rpm/suse/kernel-xen-devel?arch=x86_64&distro=sled-11&sp=3 suse kernel-xen-devel < 3.0.101-0.40.1 sled-11 x86_64
Affected pkg:rpm/suse/kernel-xen-devel?arch=i586&distro=sles-11&sp=3 suse kernel-xen-devel < 3.0.101-0.40.1 sles-11 i586
Affected pkg:rpm/suse/kernel-xen-devel?arch=i586&distro=sled-11&sp=3 suse kernel-xen-devel < 3.0.101-0.40.1 sled-11 i586
Affected pkg:rpm/suse/kernel-xen-base?arch=x86_64&distro=sles-11&sp=3 suse kernel-xen-base < 3.0.101-0.40.1 sles-11 x86_64
Affected pkg:rpm/suse/kernel-xen-base?arch=x86_64&distro=sled-11&sp=3 suse kernel-xen-base < 3.0.101-0.40.1 sled-11 x86_64
Affected pkg:rpm/suse/kernel-xen-base?arch=i586&distro=sles-11&sp=3 suse kernel-xen-base < 3.0.101-0.40.1 sles-11 i586
Affected pkg:rpm/suse/kernel-xen-base?arch=i586&distro=sled-11&sp=3 suse kernel-xen-base < 3.0.101-0.40.1 sled-11 i586
Affected pkg:rpm/suse/kernel-trace?arch=x86_64&distro=sles-11&sp=3 suse kernel-trace < 3.0.101-0.40.1 sles-11 x86_64
Affected pkg:rpm/suse/kernel-trace?arch=s390x&distro=sles-11&sp=3 suse kernel-trace < 3.0.101-0.40.1 sles-11 s390x
Affected pkg:rpm/suse/kernel-trace?arch=ppc64&distro=sles-11&sp=3 suse kernel-trace < 3.0.101-0.40.1 sles-11 ppc64
Affected pkg:rpm/suse/kernel-trace?arch=ia64&distro=sles-11&sp=3 suse kernel-trace < 3.0.101-0.40.1 sles-11 ia64
Affected pkg:rpm/suse/kernel-trace?arch=i586&distro=sles-11&sp=3 suse kernel-trace < 3.0.101-0.40.1 sles-11 i586
Affected pkg:rpm/suse/kernel-trace-devel?arch=x86_64&distro=sles-11&sp=3 suse kernel-trace-devel < 3.0.101-0.40.1 sles-11 x86_64
Affected pkg:rpm/suse/kernel-trace-devel?arch=x86_64&distro=sled-11&sp=3 suse kernel-trace-devel < 3.0.101-0.40.1 sled-11 x86_64
Affected pkg:rpm/suse/kernel-trace-devel?arch=s390x&distro=sles-11&sp=3 suse kernel-trace-devel < 3.0.101-0.40.1 sles-11 s390x
Affected pkg:rpm/suse/kernel-trace-devel?arch=ppc64&distro=sles-11&sp=3 suse kernel-trace-devel < 3.0.101-0.40.1 sles-11 ppc64
Affected pkg:rpm/suse/kernel-trace-devel?arch=ia64&distro=sles-11&sp=3 suse kernel-trace-devel < 3.0.101-0.40.1 sles-11 ia64
Affected pkg:rpm/suse/kernel-trace-devel?arch=i586&distro=sles-11&sp=3 suse kernel-trace-devel < 3.0.101-0.40.1 sles-11 i586
Affected pkg:rpm/suse/kernel-trace-devel?arch=i586&distro=sled-11&sp=3 suse kernel-trace-devel < 3.0.101-0.40.1 sled-11 i586
Affected pkg:rpm/suse/kernel-trace-base?arch=x86_64&distro=sles-11&sp=3 suse kernel-trace-base < 3.0.101-0.40.1 sles-11 x86_64
Affected pkg:rpm/suse/kernel-trace-base?arch=s390x&distro=sles-11&sp=3 suse kernel-trace-base < 3.0.101-0.40.1 sles-11 s390x
Affected pkg:rpm/suse/kernel-trace-base?arch=ppc64&distro=sles-11&sp=3 suse kernel-trace-base < 3.0.101-0.40.1 sles-11 ppc64
Affected pkg:rpm/suse/kernel-trace-base?arch=ia64&distro=sles-11&sp=3 suse kernel-trace-base < 3.0.101-0.40.1 sles-11 ia64
Affected pkg:rpm/suse/kernel-trace-base?arch=i586&distro=sles-11&sp=3 suse kernel-trace-base < 3.0.101-0.40.1 sles-11 i586
Affected pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-11&sp=3 suse kernel-syms < 3.0.101-0.40.1 sles-11 x86_64
Affected pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sled-11&sp=3 suse kernel-syms < 3.0.101-0.40.1 sled-11 x86_64
Affected pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-11&sp=3 suse kernel-syms < 3.0.101-0.40.1 sles-11 s390x
Affected pkg:rpm/suse/kernel-syms?arch=ppc64&distro=sles-11&sp=3 suse kernel-syms < 3.0.101-0.40.1 sles-11 ppc64
Affected pkg:rpm/suse/kernel-syms?arch=ia64&distro=sles-11&sp=3 suse kernel-syms < 3.0.101-0.40.1 sles-11 ia64
Affected pkg:rpm/suse/kernel-syms?arch=i586&distro=sles-11&sp=3 suse kernel-syms < 3.0.101-0.40.1 sles-11 i586
Affected pkg:rpm/suse/kernel-syms?arch=i586&distro=sled-11&sp=3 suse kernel-syms < 3.0.101-0.40.1 sled-11 i586
Affected pkg:rpm/suse/kernel-source?arch=x86_64&distro=sles-11&sp=3 suse kernel-source < 3.0.101-0.40.1 sles-11 x86_64
Affected pkg:rpm/suse/kernel-source?arch=x86_64&distro=sled-11&sp=3 suse kernel-source < 3.0.101-0.40.1 sled-11 x86_64
Affected pkg:rpm/suse/kernel-source?arch=s390x&distro=sles-11&sp=3 suse kernel-source < 3.0.101-0.40.1 sles-11 s390x
Affected pkg:rpm/suse/kernel-source?arch=ppc64&distro=sles-11&sp=3 suse kernel-source < 3.0.101-0.40.1 sles-11 ppc64
Affected pkg:rpm/suse/kernel-source?arch=ia64&distro=sles-11&sp=3 suse kernel-source < 3.0.101-0.40.1 sles-11 ia64
Affected pkg:rpm/suse/kernel-source?arch=i586&distro=sles-11&sp=3 suse kernel-source < 3.0.101-0.40.1 sles-11 i586
Affected pkg:rpm/suse/kernel-source?arch=i586&distro=sled-11&sp=3 suse kernel-source < 3.0.101-0.40.1 sled-11 i586
Affected pkg:rpm/suse/kernel-ppc64?arch=ppc64&distro=sles-11&sp=3 suse kernel-ppc64 < 3.0.101-0.40.1 sles-11 ppc64
Affected pkg:rpm/suse/kernel-ppc64-devel?arch=ppc64&distro=sles-11&sp=3 suse kernel-ppc64-devel < 3.0.101-0.40.1 sles-11 ppc64
Affected pkg:rpm/suse/kernel-ppc64-base?arch=ppc64&distro=sles-11&sp=3 suse kernel-ppc64-base < 3.0.101-0.40.1 sles-11 ppc64
Affected pkg:rpm/suse/kernel-pae?arch=i586&distro=sles-11&sp=3 suse kernel-pae < 3.0.101-0.40.1 sles-11 i586
Affected pkg:rpm/suse/kernel-pae?arch=i586&distro=sled-11&sp=3 suse kernel-pae < 3.0.101-0.40.1 sled-11 i586
Affected pkg:rpm/suse/kernel-pae-extra?arch=i586&distro=sled-11&sp=3 suse kernel-pae-extra < 3.0.101-0.40.1 sled-11 i586
Affected pkg:rpm/suse/kernel-pae-devel?arch=i586&distro=sles-11&sp=3 suse kernel-pae-devel < 3.0.101-0.40.1 sles-11 i586
Affected pkg:rpm/suse/kernel-pae-devel?arch=i586&distro=sled-11&sp=3 suse kernel-pae-devel < 3.0.101-0.40.1 sled-11 i586
Affected pkg:rpm/suse/kernel-pae-base?arch=i586&distro=sles-11&sp=3 suse kernel-pae-base < 3.0.101-0.40.1 sles-11 i586
Affected pkg:rpm/suse/kernel-pae-base?arch=i586&distro=sled-11&sp=3 suse kernel-pae-base < 3.0.101-0.40.1 sled-11 i586
Affected pkg:rpm/suse/kernel-ec2?arch=x86_64&distro=sles-11&sp=3 suse kernel-ec2 < 3.0.101-0.40.1 sles-11 x86_64
Affected pkg:rpm/suse/kernel-ec2?arch=i586&distro=sles-11&sp=3 suse kernel-ec2 < 3.0.101-0.40.1 sles-11 i586
Affected pkg:rpm/suse/kernel-ec2-devel?arch=x86_64&distro=sles-11&sp=3 suse kernel-ec2-devel < 3.0.101-0.40.1 sles-11 x86_64
Affected pkg:rpm/suse/kernel-ec2-devel?arch=i586&distro=sles-11&sp=3 suse kernel-ec2-devel < 3.0.101-0.40.1 sles-11 i586
Affected pkg:rpm/suse/kernel-ec2-base?arch=x86_64&distro=sles-11&sp=3 suse kernel-ec2-base < 3.0.101-0.40.1 sles-11 x86_64
Affected pkg:rpm/suse/kernel-ec2-base?arch=i586&distro=sles-11&sp=3 suse kernel-ec2-base < 3.0.101-0.40.1 sles-11 i586
Affected pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-11&sp=3 suse kernel-default < 3.0.101-0.40.1 sles-11 x86_64
Affected pkg:rpm/suse/kernel-default?arch=x86_64&distro=sled-11&sp=3 suse kernel-default < 3.0.101-0.40.1 sled-11 x86_64
Affected pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-11&sp=3 suse kernel-default < 3.0.101-0.40.1 sles-11 s390x
Affected pkg:rpm/suse/kernel-default?arch=ppc64&distro=sles-11&sp=3 suse kernel-default < 3.0.101-0.40.1 sles-11 ppc64
Affected pkg:rpm/suse/kernel-default?arch=ia64&distro=sles-11&sp=3 suse kernel-default < 3.0.101-0.40.1 sles-11 ia64
Affected pkg:rpm/suse/kernel-default?arch=i586&distro=sles-11&sp=3 suse kernel-default < 3.0.101-0.40.1 sles-11 i586
Affected pkg:rpm/suse/kernel-default?arch=i586&distro=sled-11&sp=3 suse kernel-default < 3.0.101-0.40.1 sled-11 i586
Affected pkg:rpm/suse/kernel-default-man?arch=s390x&distro=sles-11&sp=3 suse kernel-default-man < 3.0.101-0.40.1 sles-11 s390x
Affected pkg:rpm/suse/kernel-default-extra?arch=x86_64&distro=sled-11&sp=3 suse kernel-default-extra < 3.0.101-0.40.1 sled-11 x86_64
Affected pkg:rpm/suse/kernel-default-extra?arch=i586&distro=sled-11&sp=3 suse kernel-default-extra < 3.0.101-0.40.1 sled-11 i586
Affected pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-11&sp=3 suse kernel-default-devel < 3.0.101-0.40.1 sles-11 x86_64
Affected pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sled-11&sp=3 suse kernel-default-devel < 3.0.101-0.40.1 sled-11 x86_64
Affected pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-11&sp=3 suse kernel-default-devel < 3.0.101-0.40.1 sles-11 s390x
Affected pkg:rpm/suse/kernel-default-devel?arch=ppc64&distro=sles-11&sp=3 suse kernel-default-devel < 3.0.101-0.40.1 sles-11 ppc64
Affected pkg:rpm/suse/kernel-default-devel?arch=ia64&distro=sles-11&sp=3 suse kernel-default-devel < 3.0.101-0.40.1 sles-11 ia64
Affected pkg:rpm/suse/kernel-default-devel?arch=i586&distro=sles-11&sp=3 suse kernel-default-devel < 3.0.101-0.40.1 sles-11 i586
Affected pkg:rpm/suse/kernel-default-devel?arch=i586&distro=sled-11&sp=3 suse kernel-default-devel < 3.0.101-0.40.1 sled-11 i586
Affected pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-11&sp=3 suse kernel-default-base < 3.0.101-0.40.1 sles-11 x86_64
Affected pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sled-11&sp=3 suse kernel-default-base < 3.0.101-0.40.1 sled-11 x86_64
Affected pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-11&sp=3 suse kernel-default-base < 3.0.101-0.40.1 sles-11 s390x
Affected pkg:rpm/suse/kernel-default-base?arch=ppc64&distro=sles-11&sp=3 suse kernel-default-base < 3.0.101-0.40.1 sles-11 ppc64
Affected pkg:rpm/suse/kernel-default-base?arch=ia64&distro=sles-11&sp=3 suse kernel-default-base < 3.0.101-0.40.1 sles-11 ia64
Affected pkg:rpm/suse/kernel-default-base?arch=i586&distro=sles-11&sp=3 suse kernel-default-base < 3.0.101-0.40.1 sles-11 i586
Affected pkg:rpm/suse/kernel-default-base?arch=i586&distro=sled-11&sp=3 suse kernel-default-base < 3.0.101-0.40.1 sled-11 i586
Affected pkg:rpm/suse/kernel-bigsmp?arch=x86_64&distro=sles-11&sp=3 suse kernel-bigsmp < 3.0.101-0.47.55.1 sles-11 x86_64
Affected pkg:rpm/suse/kernel-bigsmp-devel?arch=x86_64&distro=sles-11&sp=3 suse kernel-bigsmp-devel < 3.0.101-0.47.55.1 sles-11 x86_64
Affected pkg:rpm/suse/kernel-bigsmp-devel?arch=x86_64&distro=sled-11&sp=3 suse kernel-bigsmp-devel < 3.0.101-0.47.55.1 sled-11 x86_64
Affected pkg:rpm/suse/kernel-bigsmp-base?arch=x86_64&distro=sles-11&sp=3 suse kernel-bigsmp-base < 3.0.101-0.47.55.1 sles-11 x86_64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...