openSUSE Security Update : the Linux Kernel (openSUSE-2015-543)

high Nessus Plugin ID 85432
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote openSUSE host is missing a security update.


The openSUSE 13.2 kernel was updated to receive various security and bugfixes.

Following security bugs were fixed :

- CVE-2015-3290: A flaw was found in the way the Linux kernels nested NMI handler and espfix64 functionalities interacted during NMI processing. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system.

- CVE-2015-3212: A race condition flaw was found in the way the Linux kernels SCTP implementation handled Address Configuration lists when performing Address Configuration Change (ASCONF). A local attacker could use this flaw to crash the system via a race condition triggered by setting certain ASCONF options on a socket.

- CVE-2015-5364: A remote denial of service (hang) via UDP flood with incorrect package checksums was fixed.

- CVE-2015-5366: A remote denial of service (unexpected error returns) via UDP flood with incorrect package checksums was fixed. (bsc#936831).

- CVE-2015-4700: A local user could have created a bad instruction in the JIT processed BPF code, leading to a kernel crash (bnc#935705).

- CVE-2015-1420: Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel allowed local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execution of this function (bnc#915517).

- CVE-2015-4692: The kvm_apic_has_events function in arch/x86/kvm/lapic.h in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging /dev/kvm access for an ioctl call (bnc#935542).

- CVE-2015-4167 CVE-2014-9728 CVE-2014-9730 CVE-2014-9729 CVE-2014-9731: Various problems in the UDF filesystem were fixed that could lead to crashes when mounting prepared udf filesystems.

- CVE-2015-4002: drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel did not ensure that certain length values are sufficiently large, which allowed remote attackers to cause a denial of service (system crash or large loop) or possibly execute arbitrary code via a crafted packet, related to the (1) oz_usb_rx and (2) oz_usb_handle_ep_data functions (bnc#933934).

- CVE-2015-4003: The oz_usb_handle_ep_data function in drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel allowed remote attackers to cause a denial of service (divide-by-zero error and system crash) via a crafted packet (bnc#933934).

- CVE-2015-4001: Integer signedness error in the oz_hcd_get_desc_cnf function in drivers/staging/ozwpan/ozhcd.c in the OZWPAN driver in the Linux kernel allowed remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted packet (bnc#933934).

- CVE-2015-4036: A potential memory corruption in vhost/scsi was fixed.

- CVE-2015-2922: The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel allowed remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message (bnc#922583).

- CVE-2015-3636: It was found that the Linux kernels ping socket implementation did not properly handle socket unhashing during spurious disconnects, which could lead to a use-after-free flaw. On x86-64 architecture systems, a local user able to create ping sockets could use this flaw to crash the system. On non-x86-64 architecture systems, a local user able to create ping sockets could use this flaw to escalate their privileges on the system.

- CVE-2015-2041: net/llc/sysctl_net_llc.c in the Linux kernel used an incorrect data type in a sysctl table, which allowed local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry (bnc#919007).

- CVE-2015-3339: Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel allowed local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped.

- CVE-2015-1465: The IPv4 implementation in the Linux kernel did not properly consider the length of the Read-Copy Update (RCU) grace period for redirecting lookups in the absence of caching, which allowed remote attackers to cause a denial of service (memory consumption or system crash) via a flood of packets (bnc#916225).

The following non-security bugs were fixed :

- ALSA: ak411x: Fix stall in work callback (boo#934755).

- ALSA: emu10k1: Emu10k2 32 bit DMA mode (boo#934755).

- ALSA: emu10k1: Fix card shortname string buffer overflow (boo#934755).

- ALSA: emu10k1: do not deadlock in proc-functions (boo#934755).

- ALSA: emux: Fix mutex deadlock at unloading (boo#934755).

- ALSA: emux: Fix mutex deadlock in OSS emulation (boo#934755).

- ALSA: hda - Add AZX_DCAPS_SNOOP_OFF (and refactor snoop setup) (boo#934755).

- ALSA: hda - Add Conexant codecs CX20721, CX20722, CX20723 and CX20724 (boo#934755).

- ALSA: hda - Add common pin macros for ALC269 family (boo#934755).

- ALSA: hda - Add dock support for ThinkPad X250 (17aa:2226) (boo#934755).

- ALSA: hda - Add dock support for Thinkpad T450s (17aa:5036) (boo#934755).

- ALSA: hda - Add headphone quirk for Lifebook E752 (boo#934755).

- ALSA: hda - Add headset mic quirk for Dell Inspiron 5548 (boo#934755).

- ALSA: hda - Add mute-LED mode control to Thinkpad (boo#934755).

- ALSA: hda - Add one more node in the EAPD supporting candidate list (boo#934755).

- ALSA: hda - Add pin configs for ASUS mobo with IDT 92HD73XX codec (boo#934755).

- ALSA: hda - Add ultra dock support for Thinkpad X240 (boo#934755).

- ALSA: hda - Add workaround for CMI8888 snoop behavior (boo#934755).

- ALSA: hda - Add workaround for MacBook Air 5,2 built-in mic (boo#934755).

- ALSA: hda - Disable runtime PM for Panther Point again (boo#934755).

- ALSA: hda - Do not access stereo amps for mono channel widgets (boo#934755).

- ALSA: hda - Fix Dock Headphone on Thinkpad X250 seen as a Line Out (boo#934755).

- ALSA: hda - Fix headphone pin config for Lifebook T731 (boo#934755).

- ALSA: hda - Fix noise on AMD radeon 290x controller (boo#934755).

- ALSA: hda - Fix probing and stuttering on CMI8888 HD-audio controller (boo#934755).

- ALSA: hda - One more Dell macine needs DELL1_MIC_NO_PRESENCE quirk (boo#934755).

- ALSA: hda - One more HP machine needs to change mute led quirk (boo#934755).

- ALSA: hda - Set GPIO 4 low for a few HP machines (boo#934755).

- ALSA: hda - Set single_adc_amp flag for CS420x codecs (boo#934755).

- ALSA: hda - Treat stereo-to-mono mix properly (boo#934755).

- ALSA: hda - change three SSID quirks to one pin quirk (boo#934755).

- ALSA: hda - fix 'num_steps = 0' error on ALC256 (boo#934755).

- ALSA: hda - fix a typo by changing mute_led_nid to cap_mute_led_nid (boo#934755).

- ALSA: hda - fix headset mic detection problem for one more machine (boo#934755).

- ALSA: hda - fix mute led problem for three HP laptops (boo#934755).

- ALSA: hda - set proper caps for newer AMD hda audio in KB/KV (boo#934755).

- ALSA: hda/realtek - ALC292 dock fix for Thinkpad L450 (boo#934755).

- ALSA: hda/realtek - Add a fixup for another Acer Aspire 9420 (boo#934755).

- ALSA: hda/realtek - Enable the ALC292 dock fixup on the Thinkpad T450 (boo#934755).

- ALSA: hda/realtek - Fix Headphone Mic does not recording for ALC256 (boo#934755).

- ALSA: hda/realtek - Make more stable to get pin sense for ALC283 (boo#934755).

- ALSA: hda/realtek - Support Dell headset mode for ALC256 (boo#934755).

- ALSA: hda/realtek - Support HP mute led for output and input (boo#934755).

- ALSA: hda/realtek - move HP_LINE1_MIC1_LED quirk for alc282 (boo#934755).

- ALSA: hda/realtek - move HP_MUTE_LED_MIC1 quirk for alc282 (boo#934755).

- ALSA: hdspm - Constrain periods to 2 on older cards (boo#934755).

- ALSA: pcm: Do not leave PREPARED state after draining (boo#934755).

- ALSA: snd-usb: add quirks for Roland UA-22 (boo#934755).

- ALSA: usb - Creative USB X-Fi Pro SB1095 volume knob support (boo#934755).

- ALSA: usb-audio: Add mic volume fix quirk for Logitech Quickcam Fusion (boo#934755).

- ALSA: usb-audio: Add quirk for MS LifeCam HD-3000 (boo#934755).

- ALSA: usb-audio: Add quirk for MS LifeCam Studio (boo#934755).

- ALSA: usb-audio: Do not attempt to get Lifecam HD-5000 sample rate (boo#934755).

- ALSA: usb-audio: Do not attempt to get Microsoft Lifecam Cinema sample rate (boo#934755).

- ALSA: usb-audio: add MAYA44 USB+ mixer control names (boo#934755).

- ALSA: usb-audio: do not try to get Benchmark DAC1 sample rate (boo#934755).

- ALSA: usb-audio: do not try to get Outlaw RR2150 sample rate (boo#934755).

- ALSA: usb-audio: fix missing input volume controls in MAYA44 USB(+) (boo#934755).

- Automatically Provide/Obsolete all subpackages of old flavors (bnc#925567)

- Fix kABI for ak411x structs (boo#934755).

- Fix kABI for snd_emu10k1 struct (boo#934755).

- HID: add ALWAYS_POLL quirk for a Logitech 0xc007 (bnc#929624).

- HID: add HP OEM mouse to quirk ALWAYS_POLL (bnc#929624).

- HID: add quirk for PIXART OEM mouse used by HP (bnc#929624).

- HID: usbhid: add always-poll quirk (bnc#929624).

- HID: usbhid: add another mouse that needs QUIRK_ALWAYS_POLL (bnc#929624).

- HID: usbhid: enable always-poll quirk for Elan Touchscreen (bnc#929624).

- HID: usbhid: enable always-poll quirk for Elan Touchscreen 009b (bnc#929624).

- HID: usbhid: enable always-poll quirk for Elan Touchscreen 0103 (bnc#929624).

- HID: usbhid: enable always-poll quirk for Elan Touchscreen 016f (bnc#929624).

- HID: usbhid: fix PIXART optical mouse (bnc#929624).

- HID: usbhid: more mice with ALWAYS_POLL (bnc#929624).

- HID: usbhid: yet another mouse with ALWAYS_POLL (bnc#929624).

- HID: yet another buggy ELAN touchscreen (bnc#929624).

- Input: synaptics - handle spurious release of trackstick buttons (bnc#928693).

- Input: synaptics - re-route tracksticks buttons on the Lenovo 2015 series (bnc#928693).

- Input: synaptics - remove TOPBUTTONPAD property for Lenovos 2015 (bnc#928693).

- Input: synaptics - retrieve the extended capabilities in query $10 (bnc#928693).

- NFSv4: When returning a delegation, do not reclaim an incompatible open mode (bnc#934202).

- Refresh patches.xen/xen-blkfront-indirect (bsc#922235).

- Update config files: extend CONFIG_DPM_WATCHDOG_TIMEOUT to 60 (bnc#934397)

- arm64: mm: Remove hack in mmap randomized layout Fix commit id and mainlined information

- bnx2x: Fix kdump when iommu=on (bug#921769).

- client MUST ignore EncryptionKeyLength if CAP_EXTENDED_SECURITY is set (bnc#932348).

- config/armv7hl: Disable AMD_XGBE_PHY The AMD XGBE ethernet chip is only used on ARM64 systems.

- config: disable XGBE on non-ARM hardware It is documented as being present only on AMD SoCs.

- cpufreq: fix a NULL pointer dereference in
__cpufreq_governor() (bsc#924664).

- drm/i915/bdw: PCI IDs ending in 0xb are ULT (boo#935913).

- drm/i915/chv: Remove Wait for a previous gfx force-off (boo#935913).

- drm/i915/dp: only use training pattern 3 on platforms that support it (boo#935913).

- drm/i915/dp: there is no audio on port A (boo#935913).

- drm/i915/hsw: Fix workaround for server AUX channel clock divisor (boo#935913).

- drm/i915/vlv: remove wait for previous GFX clk disable request (boo#935913).

- drm/i915/vlv: save/restore the power context base reg (boo#935913).

- drm/i915: Add missing MacBook Pro models with dual channel LVDS (boo#935913).

- drm/i915: BDW Fix Halo PCI IDs marked as ULT (boo#935913).

- drm/i915: Ban Haswell from using RCS flips (boo#935913).

- drm/i915: Check obj->vma_list under the struct_mutex (boo#935913).

- drm/i915: Correct the IOSF Dev_FN field for IOSF transfers (boo#935913).

- drm/i915: Dell Chromebook 11 has PWM backlight (boo#935913).

- drm/i915: Disable caches for Global GTT (boo#935913).

- drm/i915: Do a dummy DPCD read before the actual read (bnc#907714).

- drm/i915: Do not complain about stolen conflicts on gen3 (boo#935913).

- drm/i915: Do not leak pages when freeing userptr objects (boo#935913).

- drm/i915: Dont enable CS_PARSER_ERROR interrupts at all (boo#935913).

- drm/i915: Evict CS TLBs between batches (boo#935913).

- drm/i915: Fix DDC probe for passive adapters (boo#935913).

- drm/i915: Fix and clean BDW PCH identification (boo#935913).

- drm/i915: Force the CS stall for invalidate flushes (boo#935913).

- drm/i915: Handle failure to kick out a conflicting fb driver (boo#935913).

- drm/i915: Ignore SURFLIVE and flip counter when the GPU gets reset (boo#935913).

- drm/i915: Ignore VBT backlight check on Macbook 2, 1 (boo#935913).

- drm/i915: Invalidate media caches on gen7 (boo#935913).

- drm/i915: Kick fbdev before vgacon (boo#935913).

- drm/i915: Only fence tiled region of object (boo#935913).

- drm/i915: Only warn the first time we attempt to mmio whilst suspended (boo#935913).

- drm/i915: Unlock panel even when LVDS is disabled (boo#935913).

- drm/i915: Use IS_HSW_ULT() in a HSW specific code path (boo#935913).

- drm/i915: cope with large i2c transfers (boo#935913).

- drm/i915: do not warn if backlight unexpectedly enabled (boo#935913).

- drm/i915: drop WaSetupGtModeTdRowDispatch:snb (boo#935913).

- drm/i915: save/restore GMBUS freq across suspend/resume on gen4 (boo#935913).

- drm/i915: vlv: fix IRQ masking when uninstalling interrupts (boo#935913).

- drm/i915: vlv: fix save/restore of GFX_MAX_REQ_COUNT reg (boo#935913).

- drm/radeon: retry dcpd fetch (bnc#931580).

- ftrace/x86/xen: use kernel identity mapping only when really needed (bsc#873195, bsc#886272, bsc#903727, bsc#927725)

- guards: Add support for an external filelist in --check mode This will allow us to run --check without a kernel-source.git work tree.

- guards: Include the file name also in the 'Not found' error

- guards: Simplify help text

- hyperv: Add processing of MTU reduced by the host (bnc#919596).

- ideapad_laptop: Lenovo G50-30 fix rfkill reports wireless blocked (boo#939394).

- ipv6: do not delete previously existing ECMP routes if add fails (bsc#930399).

- ipv6: fix ECMP route replacement (bsc#930399).

- ipv6: replacing a rt6_info needs to purge possible propagated rt6_infos too (bsc#930399).

- kABI: protect linux/slab.h include in of/address.

- kabi/severities: ignore already-broken but acceptable kABI changes - SYSTEM_TRUSTED_KEYRING=n change removed system_trusted_keyring - Commits 3688875f852 and ea5ed8c70e9 changed iov_iter_get_pages prototype - KVM changes are intermodule dependencies

- kabi: Fix CRC for dma_get_required_mask.

- kabi: add kABI reference files

- libata: Blacklist queued TRIM on Samsung SSD 850 Pro (bsc#926156).

- libata: Blacklist queued TRIM on all Samsung 800-series (bnc#930599).

- net: ppp: Do not call bpf_prog_create() in ppp_lock (bnc#930488).

- rpm/ Do not fail if the kernel versions do not match

- rt2x00: do not align payload on modern H/W (bnc#932844).

- rtlwifi: rtl8192cu: Fix kernel deadlock (bnc#927786).

- thermal: step_wise: Revert optimization (boo#925961).

- tty: Fix pty master poll() after slave closes v2 (bsc#937138). arm64: mm: Remove hack in mmap randomize layout (bsc#937033)

- udf: Remove repeated loads blocksize (bsc#933907).

- usb: core: Fix USB 3.0 devices lost in NOTATTACHED state after a hub port reset (bnc#937226).

- x86, apic: Handle a bad TSC more gracefully (boo#935530).

- x86/PCI: Use host bridge _CRS info on Foxconn K8M890-8237A (bnc#907092).

- x86/PCI: Use host bridge _CRS info on systems with >32 bit addressing (bnc#907092).

- x86/microcode/amd: Do not overwrite final patch levels (bsc#913996).

- x86/microcode/amd: Extract current patch level read to a function (bsc#913996).

- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).

- xenbus: add proper handling of XS_ERROR from Xenbus for transactions.

- xhci: Calculate old endpoints correctly on device reset (bnc#938976).


Update the affected the Linux Kernel packages.

See Also

Plugin Details

Severity: High

ID: 85432

File Name: openSUSE-2015-543.nasl

Version: 2.3

Type: local

Agent: unix

Published: 8/17/2015

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information


Risk Factor: Medium

Score: 6.7


Risk Factor: High

Base Score: 9

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:bbswitch, p-cpe:/a:novell:opensuse:bbswitch-debugsource, p-cpe:/a:novell:opensuse:bbswitch-kmp-default, p-cpe:/a:novell:opensuse:bbswitch-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:bbswitch-kmp-desktop, p-cpe:/a:novell:opensuse:bbswitch-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:bbswitch-kmp-pae, p-cpe:/a:novell:opensuse:bbswitch-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:bbswitch-kmp-xen, p-cpe:/a:novell:opensuse:bbswitch-kmp-xen-debuginfo, p-cpe:/a:novell:opensuse:cloop, p-cpe:/a:novell:opensuse:cloop-debuginfo, p-cpe:/a:novell:opensuse:cloop-debugsource, p-cpe:/a:novell:opensuse:cloop-kmp-default, p-cpe:/a:novell:opensuse:cloop-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:cloop-kmp-desktop, p-cpe:/a:novell:opensuse:cloop-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:cloop-kmp-pae, p-cpe:/a:novell:opensuse:cloop-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:cloop-kmp-xen, p-cpe:/a:novell:opensuse:cloop-kmp-xen-debuginfo, p-cpe:/a:novell:opensuse:crash, p-cpe:/a:novell:opensuse:crash-debuginfo, p-cpe:/a:novell:opensuse:crash-debugsource, p-cpe:/a:novell:opensuse:crash-devel, p-cpe:/a:novell:opensuse:crash-eppic, p-cpe:/a:novell:opensuse:crash-eppic-debuginfo, p-cpe:/a:novell:opensuse:crash-gcore, p-cpe:/a:novell:opensuse:crash-gcore-debuginfo, p-cpe:/a:novell:opensuse:crash-kmp-default, p-cpe:/a:novell:opensuse:crash-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:crash-kmp-desktop, p-cpe:/a:novell:opensuse:crash-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:crash-kmp-pae, p-cpe:/a:novell:opensuse:crash-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:crash-kmp-xen, p-cpe:/a:novell:opensuse:crash-kmp-xen-debuginfo, p-cpe:/a:novell:opensuse:hdjmod-debugsource, p-cpe:/a:novell:opensuse:hdjmod-kmp-default, p-cpe:/a:novell:opensuse:hdjmod-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:hdjmod-kmp-desktop, p-cpe:/a:novell:opensuse:hdjmod-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:hdjmod-kmp-pae, p-cpe:/a:novell:opensuse:hdjmod-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:hdjmod-kmp-xen, p-cpe:/a:novell:opensuse:hdjmod-kmp-xen-debuginfo, p-cpe:/a:novell:opensuse:ipset, p-cpe:/a:novell:opensuse:ipset-debuginfo, p-cpe:/a:novell:opensuse:ipset-debugsource, p-cpe:/a:novell:opensuse:ipset-devel, p-cpe:/a:novell:opensuse:ipset-kmp-default, p-cpe:/a:novell:opensuse:ipset-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:ipset-kmp-desktop, p-cpe:/a:novell:opensuse:ipset-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:ipset-kmp-pae, p-cpe:/a:novell:opensuse:ipset-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:ipset-kmp-xen, p-cpe:/a:novell:opensuse:ipset-kmp-xen-debuginfo, p-cpe:/a:novell:opensuse:kernel-debug, p-cpe:/a:novell:opensuse:kernel-debug-base, p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-debug-debuginfo, p-cpe:/a:novell:opensuse:kernel-debug-debugsource, p-cpe:/a:novell:opensuse:kernel-debug-devel, p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-default, p-cpe:/a:novell:opensuse:kernel-default-base, p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-default-debuginfo, p-cpe:/a:novell:opensuse:kernel-default-debugsource, p-cpe:/a:novell:opensuse:kernel-default-devel, p-cpe:/a:novell:opensuse:kernel-desktop, p-cpe:/a:novell:opensuse:kernel-desktop-base, p-cpe:/a:novell:opensuse:kernel-desktop-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-desktop-debuginfo, p-cpe:/a:novell:opensuse:kernel-desktop-debugsource, p-cpe:/a:novell:opensuse:kernel-desktop-devel, p-cpe:/a:novell:opensuse:kernel-devel, p-cpe:/a:novell:opensuse:kernel-ec2, p-cpe:/a:novell:opensuse:kernel-ec2-base, p-cpe:/a:novell:opensuse:kernel-ec2-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-ec2-debuginfo, p-cpe:/a:novell:opensuse:kernel-ec2-debugsource, p-cpe:/a:novell:opensuse:kernel-ec2-devel, p-cpe:/a:novell:opensuse:kernel-macros, p-cpe:/a:novell:opensuse:kernel-obs-build, p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource, p-cpe:/a:novell:opensuse:kernel-obs-qa, p-cpe:/a:novell:opensuse:kernel-obs-qa-xen, p-cpe:/a:novell:opensuse:kernel-pae, p-cpe:/a:novell:opensuse:kernel-pae-base, p-cpe:/a:novell:opensuse:kernel-pae-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-pae-debuginfo, p-cpe:/a:novell:opensuse:kernel-pae-debugsource, p-cpe:/a:novell:opensuse:kernel-pae-devel, p-cpe:/a:novell:opensuse:kernel-source, p-cpe:/a:novell:opensuse:kernel-source-vanilla, p-cpe:/a:novell:opensuse:kernel-syms, p-cpe:/a:novell:opensuse:kernel-vanilla, p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo, p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource, p-cpe:/a:novell:opensuse:kernel-vanilla-devel, p-cpe:/a:novell:opensuse:kernel-xen, p-cpe:/a:novell:opensuse:kernel-xen-base, p-cpe:/a:novell:opensuse:kernel-xen-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-xen-debuginfo, p-cpe:/a:novell:opensuse:kernel-xen-debugsource, p-cpe:/a:novell:opensuse:kernel-xen-devel, p-cpe:/a:novell:opensuse:libipset3, p-cpe:/a:novell:opensuse:libipset3-debuginfo, p-cpe:/a:novell:opensuse:pcfclock, p-cpe:/a:novell:opensuse:pcfclock-debuginfo, p-cpe:/a:novell:opensuse:pcfclock-debugsource, p-cpe:/a:novell:opensuse:pcfclock-kmp-default, p-cpe:/a:novell:opensuse:pcfclock-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:pcfclock-kmp-desktop, p-cpe:/a:novell:opensuse:pcfclock-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:pcfclock-kmp-pae, p-cpe:/a:novell:opensuse:pcfclock-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:vhba-kmp-debugsource, p-cpe:/a:novell:opensuse:vhba-kmp-default, p-cpe:/a:novell:opensuse:vhba-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:vhba-kmp-desktop, p-cpe:/a:novell:opensuse:vhba-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:vhba-kmp-pae, p-cpe:/a:novell:opensuse:vhba-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:vhba-kmp-xen, p-cpe:/a:novell:opensuse:vhba-kmp-xen-debuginfo, p-cpe:/a:novell:opensuse:xen, p-cpe:/a:novell:opensuse:xen-debugsource, p-cpe:/a:novell:opensuse:xen-devel, p-cpe:/a:novell:opensuse:xen-doc-html, p-cpe:/a:novell:opensuse:xen-kmp-default, p-cpe:/a:novell:opensuse:xen-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:xen-kmp-desktop, p-cpe:/a:novell:opensuse:xen-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:xen-libs, p-cpe:/a:novell:opensuse:xen-libs-32bit, p-cpe:/a:novell:opensuse:xen-libs-debuginfo, p-cpe:/a:novell:opensuse:xen-libs-debuginfo-32bit, p-cpe:/a:novell:opensuse:xen-tools, p-cpe:/a:novell:opensuse:xen-tools-debuginfo, p-cpe:/a:novell:opensuse:xen-tools-domU, p-cpe:/a:novell:opensuse:xen-tools-domU-debuginfo, p-cpe:/a:novell:opensuse:xtables-addons, p-cpe:/a:novell:opensuse:xtables-addons-debuginfo, p-cpe:/a:novell:opensuse:xtables-addons-debugsource, p-cpe:/a:novell:opensuse:xtables-addons-kmp-default, p-cpe:/a:novell:opensuse:xtables-addons-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:xtables-addons-kmp-desktop, p-cpe:/a:novell:opensuse:xtables-addons-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:xtables-addons-kmp-pae, p-cpe:/a:novell:opensuse:xtables-addons-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:xtables-addons-kmp-xen, p-cpe:/a:novell:opensuse:xtables-addons-kmp-xen-debuginfo, cpe:/o:novell:opensuse:13.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 8/12/2015

Reference Information

CVE: CVE-2014-9728, CVE-2014-9729, CVE-2014-9730, CVE-2014-9731, CVE-2015-1420, CVE-2015-1465, CVE-2015-2041, CVE-2015-2922, CVE-2015-3212, CVE-2015-3290, CVE-2015-3339, CVE-2015-3636, CVE-2015-4001, CVE-2015-4002, CVE-2015-4003, CVE-2015-4036, CVE-2015-4167, CVE-2015-4692, CVE-2015-4700, CVE-2015-5364, CVE-2015-5366