{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-compute":"3.12.69-60.30.1","kernel-compute-base":"3.12.69-60.30.1","kernel-compute-devel":"3.12.69-60.30.1","kernel-compute_debug-devel":"3.12.69-60.30.1","kernel-devel-rt":"3.12.69-60.30.1","kernel-rt":"3.12.69-60.30.1","kernel-rt-base":"3.12.69-60.30.1","kernel-rt-devel":"3.12.69-60.30.1","kernel-rt_debug-devel":"3.12.69-60.30.1","kernel-source-rt":"3.12.69-60.30.1","kernel-syms-rt":"3.12.69-60.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Real Time 12 SP1","name":"kernel-compute","purl":"pkg:rpm/suse/kernel-compute&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.12.69-60.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-compute":"3.12.69-60.30.1","kernel-compute-base":"3.12.69-60.30.1","kernel-compute-devel":"3.12.69-60.30.1","kernel-compute_debug-devel":"3.12.69-60.30.1","kernel-devel-rt":"3.12.69-60.30.1","kernel-rt":"3.12.69-60.30.1","kernel-rt-base":"3.12.69-60.30.1","kernel-rt-devel":"3.12.69-60.30.1","kernel-rt_debug-devel":"3.12.69-60.30.1","kernel-source-rt":"3.12.69-60.30.1","kernel-syms-rt":"3.12.69-60.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Real Time 12 SP1","name":"kernel-compute_debug","purl":"pkg:rpm/suse/kernel-compute_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.12.69-60.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-compute":"3.12.69-60.30.1","kernel-compute-base":"3.12.69-60.30.1","kernel-compute-devel":"3.12.69-60.30.1","kernel-compute_debug-devel":"3.12.69-60.30.1","kernel-devel-rt":"3.12.69-60.30.1","kernel-rt":"3.12.69-60.30.1","kernel-rt-base":"3.12.69-60.30.1","kernel-rt-devel":"3.12.69-60.30.1","kernel-rt_debug-devel":"3.12.69-60.30.1","kernel-source-rt":"3.12.69-60.30.1","kernel-syms-rt":"3.12.69-60.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Real Time 12 SP1","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.12.69-60.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-compute":"3.12.69-60.30.1","kernel-compute-base":"3.12.69-60.30.1","kernel-compute-devel":"3.12.69-60.30.1","kernel-compute_debug-devel":"3.12.69-60.30.1","kernel-devel-rt":"3.12.69-60.30.1","kernel-rt":"3.12.69-60.30.1","kernel-rt-base":"3.12.69-60.30.1","kernel-rt-devel":"3.12.69-60.30.1","kernel-rt_debug-devel":"3.12.69-60.30.1","kernel-source-rt":"3.12.69-60.30.1","kernel-syms-rt":"3.12.69-60.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Real Time 12 SP1","name":"kernel-rt_debug","purl":"pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.12.69-60.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-compute":"3.12.69-60.30.1","kernel-compute-base":"3.12.69-60.30.1","kernel-compute-devel":"3.12.69-60.30.1","kernel-compute_debug-devel":"3.12.69-60.30.1","kernel-devel-rt":"3.12.69-60.30.1","kernel-rt":"3.12.69-60.30.1","kernel-rt-base":"3.12.69-60.30.1","kernel-rt-devel":"3.12.69-60.30.1","kernel-rt_debug-devel":"3.12.69-60.30.1","kernel-source-rt":"3.12.69-60.30.1","kernel-syms-rt":"3.12.69-60.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Real Time 12 SP1","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.12.69-60.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-compute":"3.12.69-60.30.1","kernel-compute-base":"3.12.69-60.30.1","kernel-compute-devel":"3.12.69-60.30.1","kernel-compute_debug-devel":"3.12.69-60.30.1","kernel-devel-rt":"3.12.69-60.30.1","kernel-rt":"3.12.69-60.30.1","kernel-rt-base":"3.12.69-60.30.1","kernel-rt-devel":"3.12.69-60.30.1","kernel-rt_debug-devel":"3.12.69-60.30.1","kernel-source-rt":"3.12.69-60.30.1","kernel-syms-rt":"3.12.69-60.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Real Time 12 SP1","name":"kernel-syms-rt","purl":"pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.12.69-60.30.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 12 rt-kernel was updated to 3.12.69 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2015-8962: Fixed a double free vulnerability in the SCSI subsystem that allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) (bnc#1010501).\n- CVE-2015-8963: Fixed a race condition in kernel/events/core.c that allowed local users to gain privileges or cause a denial of service (use-after-free) (bnc#1010502).\n- CVE-2015-8964: Fixed a bug in the tty_set_termios_ldisc function that allowed local users to obtain sensitive information from kernel memory (bnc#1010507).\n- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) (bnc#1017710).\n- CVE-2016-7910: Fixed a use-after-free vulnerability in the block subsystem that allowed local users to gain privileges (bnc#1010716).\n- CVE-2016-7911: Fixed a race condition in the get_task_ioprio function that allowed local users to gain privileges or cause a denial of service (use-after-free) (bnc#1010711).\n- CVE-2016-7913: Fixed a bug in the xc2028_set_config function that allowed local users to gain privileges or cause a denial of service (use-after-free) (bnc#1010478).\n- CVE-2016-7914: The assoc_array_insert_into_terminal_node function did not check whether a slot is a leaf, which allowed local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) (bnc#1010475).\n- CVE-2016-8399: Fixed a bug in the kernel networking subsystem that could have enabled a local malicious application to execute arbitrary code within the context of the kernel. (bnc#1014746).\n- CVE-2016-8632: The net subsystem did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) (bnc#1008831).\n- CVE-2016-8633: The firewire subsystem allowed remote attackers to execute arbitrary code via crafted fragmented packets in certain unusual hardware configurations (bnc#1008833).\n- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb truncation, which allowed local users to cause a denial of service (system crash) (bnc#1009969).\n- CVE-2016-8655: Fixed a race condition in the network subsystem that allowed local users to gain privileges or cause a denial of service (use-after-free) (bnc#1012754).\n- CVE-2016-9083: The PCI subsystem local users to bypass integer overflow checks and cause a denial of service (memory corruption) or have unspecified other impact (bnc#1007197).\n- CVE-2016-9084: The PCI subsystem misused the kzalloc() function, which allowed local users to cause a denial of service (integer overflow) or have unspecified other impact (bnc#1007197).\n- CVE-2016-9555: Fixed a bug in the network subsystem that allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685).\n- CVE-2016-9576: The block subsystem did not properly restrict the type of iterator, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) (bnc#1013604).\n- CVE-2016-9756: The kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory (bnc#1013038).\n- CVE-2016-9793: The net subsystem mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact (bnc#1013531).\n- CVE-2016-9794: Fixed a race condition in the ALSA subsystem that allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact (bnc#1013533).\n- CVE-2016-9806: Fixed a race condition in the netlink_dump() function which could have allowed local users to cause a denial of service (double free) or possibly have unspecified other impact (bnc#1013540).\n- CVE-2017-2583: kvm: x86: fixed emulation of 'MOV SS, null selector'  (bsc#1020602).\n- CVE-2017-2584: arch: x86: kvm: fixed a bug that could have allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) (bnc#1019851).\n- CVE-2017-5551: tmpfs: Fixed a bug that could have allowed users to set setgid bits on files they don't down. (bsc#1021258, CVE-2017-5551).\n\nThe following non-security bugs were fixed:\n\n- 8250_pci: Fix potential use-after-free in error path (bsc#1013001).\n- block_dev: do not test bdev->bd_contains when it is not stable (bsc#1008557).\n- bna: Add synchronization for tx ring (bsc#993739).\n- bnx2i/bnx2fc : fix randconfig error in next-20140909 (bsc#922052 bsc#922056).\n- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).\n- bnx2x: fix lockdep splat (bsc#922052 bsc#922056).\n- btrfs: Ensure proper sector alignment for btrfs_free_reserved_data_space (bsc#1005666).\n- btrfs: Export and move leaf/subtree qgroup helpers to qgroup.c (bsc#983087).\n- btrfs: Revert 'do not delay inode ref updates during log replay' (bsc#987192).\n- btrfs: bugfix: handle FS_IOC32_{GETFLAGS,SETFLAGS,GETVERSION} in btrfs_ioctl (bsc#1018100).\n- btrfs: do not delay inode ref updates during log replay (bsc#987192).\n- btrfs: fix incremental send failure caused by balance (bsc#985850).\n- btrfs: fix relocation incorrectly dropping data references (bsc#990384).\n- btrfs: increment ctx->pos for every emitted or skipped dirent in readdir (bsc#981709).\n- btrfs: qgroup: Fix qgroup data leaking by using subtree tracing (bsc#983087).\n- btrfs: remove old tree_root dirent processing in btrfs_real_readdir() (bsc#981709).\n- btrfs: send, do not bug on inconsistent snapshots (bsc#985850).\n- cpufreq: intel_pstate: Fix divide by zero on Knights Landing (KNL) (bsc#1008876).\n- cpuset: fix sched_load_balance that was accidentally broken in a previous update (bsc#1010294).\n- ext4: fix data exposure after a crash (bsc#1012985).\n- fs/dcache: move the call of __d_drop(anon) into __d_materialise_unique(dentry, anon) (bsc#984194).\n- fuse: do not use iocb after it may have been freed (bsc#1012985).\n- hpilo: Add support for iLO5 (bsc#999101).\n- ib/core: Avoid unsigned int overflow in sg_alloc_table (bsc#924381 bsc#921338).\n- ib/mlx5: Fix FW version diaplay in sysfs (bnc#923036).\n- ib/mlx5: Fix entries check in mlx5_ib_resize_cq (bnc#858727).\n- ib/mlx5: Fix entries checks in mlx5_ib_create_cq (bnc#858727).\n- ib/mlx5: Remove per-MR pas and dma pointers (bnc#923036).\n- ibmveth: calculate gso_segs for large packets (bsc#1019148).\n- ibmveth: check return of skb_linearize in ibmveth_start_xmit (bsc#1019148).\n- ibmveth: consolidate kmalloc of array, memset 0 to kcalloc (bsc#1019148).\n- ibmveth: set correct gso_size and gso_type (bsc#1019148).\n- igb: Fix oops caused by missing queue pairing (bnc#857394).\n- ipmi_si: create hardware-independent softdep for ipmi_devintf (bsc#1009062).\n- ipr: Enable SIS pipe commands for SIS-32 devices (bsc#1016961).\n- ipv4: Fix ip_queue_xmit to pass sk into ip_local_out_sk (bsc#938963).\n- kabi: protect __sk_mem_reclaim (kabi).\n- kabi: protect struct perf_event_context (kabi).\n- kabi: reintroduce sk_filter (kabi).\n- kernel: remove broken memory detection sanity check (bnc#1008567, LTC#148072).\n- kgr: ignore zombie tasks during the patching (bnc#1008979).\n- kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread (bsc#1010612).\n- kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410).\n- net/mlx5: Avoid passing dma address 0 to firmware (bnc#858727).\n- net/mlx5: Fix typo in mlx5_query_port_pvlc (bnc#923036).\n- net/mlx5e: Do not modify CQ before it was created (bnc#923036).\n- net/mlx5e: Do not try to modify CQ moderation if it is not supported (bnc#923036).\n- net/mlx5e: Fix MLX5E_100BASE_T define (bnc#923036).\n- net/mlx5e: Remove wrong poll CQ optimization (bnc#923036).\n- netback: correct array index (bsc#983348).\n- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).\n- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).\n- nfsv4: Fix 'NFS Lock reclaim failed' errors (bsc#1014410).\n- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).\n- posix_acl: Fixup acl reference leak and missing conversions in ext3, gfs2, jfs, hfsplus.\n- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).\n- proc: avoid including 'mountproto=' with no protocol in /proc/mounts (bsc#1019260).\n- raid1: ignore discard error (bsc#1017164).\n- reiserfs: fix race in prealloc discard (bsc#987576).\n- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)\n- rpm/kernel-spec-macros: Fix the check if there is no rebuild counter (bsc#1012060)\n- rpm/kernel-spec-macros: Ignore too high rebuild counter (bsc#1012060)\n- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013001).\n- sfc: clear napi_hash state when copying channels (bsc#923037).\n- sfc: fix potential stack corruption from running past stat bitmask (bsc#923037).\n- sfc: on MC reset, clear PIO buffer linkage in TXQs (bnc#856380).\n- sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).\n- sunrpc: Fix reconnection timeouts (bsc#1014410).\n- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).\n- target: Make EXTENDED_COPY 0xe4 failure return COPY TARGET DEVICE NOT REACHABLE (bsc#991273).\n- target: add XCOPY target/segment desc sense codes (bsc#991273).\n- target: bounds check XCOPY segment descriptor list (bsc#991273).\n- target: bounds check XCOPY total descriptor list length (bsc#991273).\n- target: check XCOPY segment descriptor CSCD IDs (bsc#1017170).\n- target: check for XCOPY parameter truncation (bsc#991273).\n- target: return UNSUPPORTED TARGET/SEGMENT DESC TYPE CODE sense (bsc#991273).\n- target: simplify XCOPY wwn->se_dev lookup helper (bsc#991273).\n- target: support XCOPY requests without parameters (bsc#991273).\n- target: use XCOPY TOO MANY TARGET DESCRIPTORS sense (bsc#991273).\n- target: use XCOPY segment descriptor CSCD IDs (bsc#1017170).\n- tg3: Avoid NULL pointer dereference in tg3_io_error_detected() (bsc#921778).\n- tty: Prevent ldisc drivers from re-using stale tty fields (bnc#1010507).\n- x86/apic: Order irq_enter/exit() calls correctly vs. ack_APIC_irq() (bsc#1013479).\n- xen/ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).\n- xenbus: correctly signal errors from xenstored_local_init() (luckily none so far).\n- xfs: allow lazy sb counter sync during filesystem freeze sequence (bsc#980560).\n- xfs: refactor xlog_recover_process_data() (bsc#1019300).\n","id":"SUSE-SU-2017:0407-1","modified":"2017-02-06T14:41:53Z","published":"2017-02-06T14:41:53Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2017/suse-su-20170407-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1003813"},{"type":"REPORT","url":"https://bugzilla.suse.com/1005666"},{"type":"REPORT","url":"https://bugzilla.suse.com/1007197"},{"type":"REPORT","url":"https://bugzilla.suse.com/1008557"},{"type":"REPORT","url":"https://bugzilla.suse.com/1008567"},{"type":"REPORT","url":"https://bugzilla.suse.com/1008831"},{"type":"REPORT","url":"https://bugzilla.suse.com/1008833"},{"type":"REPORT","url":"https://bugzilla.suse.com/1008876"},{"type":"REPORT","url":"https://bugzilla.suse.com/1008979"},{"type":"REPORT","url":"https://bugzilla.suse.com/1009062"},{"type":"REPORT","url":"https://bugzilla.suse.com/1009969"},{"type":"REPORT","url":"https://bugzilla.suse.com/1010040"},{"type":"REPORT","url":"https://bugzilla.suse.com/1010213"},{"type":"REPORT","url":"https://bugzilla.suse.com/1010294"},{"type":"REPORT","url":"https://bugzilla.suse.com/1010475"},{"type":"REPORT","url":"https://bugzilla.suse.com/1010478"},{"type":"REPORT","url":"https://bugzilla.suse.com/1010501"},{"type":"REPORT","url":"https://bugzilla.suse.com/1010502"},{"type":"REPORT","url":"https://bugzilla.suse.com/1010507"},{"type":"REPORT","url":"https://bugzilla.suse.com/1010612"},{"type":"REPORT","url":"https://bugzilla.suse.com/1010711"},{"type":"REPORT","url":"https://bugzilla.suse.com/1010716"},{"type":"REPORT","url":"https://bugzilla.suse.com/1011685"},{"type":"REPORT","url":"https://bugzilla.suse.com/1012060"},{"type":"REPORT","url":"https://bugzilla.suse.com/1012422"},{"type":"REPORT","url":"https://bugzilla.suse.com/1012754"},{"type":"REPORT","url":"https://bugzilla.suse.com/1012917"},{"type":"REPORT","url":"https://bugzilla.suse.com/1012985"},{"type":"REPORT","url":"https://bugzilla.suse.com/1013001"},{"type":"REPORT","url":"https://bugzilla.suse.com/1013038"},{"type":"REPORT","url":"https://bugzilla.suse.com/1013479"},{"type":"REPORT","url":"https://bugzilla.suse.com/1013531"},{"type":"REPORT","url":"https://bugzilla.suse.com/1013533"},{"type":"REPORT","url":"https://bugzilla.suse.com/1013540"},{"type":"REPORT","url":"https://bugzilla.suse.com/1013604"},{"type":"REPORT","url":"https://bugzilla.suse.com/1014410"},{"type":"REPORT","url":"https://bugzilla.suse.com/1014746"},{"type":"REPORT","url":"https://bugzilla.suse.com/1016713"},{"type":"REPORT","url":"https://bugzilla.suse.com/1016725"},{"type":"REPORT","url":"https://bugzilla.suse.com/1016961"},{"type":"REPORT","url":"https://bugzilla.suse.com/1017164"},{"type":"REPORT","url":"https://bugzilla.suse.com/1017170"},{"type":"REPORT","url":"https://bugzilla.suse.com/1017410"},{"type":"REPORT","url":"https://bugzilla.suse.com/1017710"},{"type":"REPORT","url":"https://bugzilla.suse.com/1018100"},{"type":"REPORT","url":"https://bugzilla.suse.com/1019032"},{"type":"REPORT","url":"https://bugzilla.suse.com/1019148"},{"type":"REPORT","url":"https://bugzilla.suse.com/1019260"},{"type":"REPORT","url":"https://bugzilla.suse.com/1019300"},{"type":"REPORT","url":"https://bugzilla.suse.com/1019783"},{"type":"REPORT","url":"https://bugzilla.suse.com/1019851"},{"type":"REPORT","url":"https://bugzilla.suse.com/1020214"},{"type":"REPORT","url":"https://bugzilla.suse.com/1020602"},{"type":"REPORT","url":"https://bugzilla.suse.com/1021258"},{"type":"REPORT","url":"https://bugzilla.suse.com/856380"},{"type":"REPORT","url":"https://bugzilla.suse.com/857394"},{"type":"REPORT","url":"https://bugzilla.suse.com/858727"},{"type":"REPORT","url":"https://bugzilla.suse.com/921338"},{"type":"REPORT","url":"https://bugzilla.suse.com/921778"},{"type":"REPORT","url":"https://bugzilla.suse.com/922052"},{"type":"REPORT","url":"https://bugzilla.suse.com/922056"},{"type":"REPORT","url":"https://bugzilla.suse.com/923036"},{"type":"REPORT","url":"https://bugzilla.suse.com/923037"},{"type":"REPORT","url":"https://bugzilla.suse.com/924381"},{"type":"REPORT","url":"https://bugzilla.suse.com/938963"},{"type":"REPORT","url":"https://bugzilla.suse.com/972993"},{"type":"REPORT","url":"https://bugzilla.suse.com/980560"},{"type":"REPORT","url":"https://bugzilla.suse.com/981709"},{"type":"REPORT","url":"https://bugzilla.suse.com/983087"},{"type":"REPORT","url":"https://bugzilla.suse.com/983348"},{"type":"REPORT","url":"https://bugzilla.suse.com/984194"},{"type":"REPORT","url":"https://bugzilla.suse.com/984419"},{"type":"REPORT","url":"https://bugzilla.suse.com/985850"},{"type":"REPORT","url":"https://bugzilla.suse.com/987192"},{"type":"REPORT","url":"https://bugzilla.suse.com/987576"},{"type":"REPORT","url":"https://bugzilla.suse.com/990384"},{"type":"REPORT","url":"https://bugzilla.suse.com/991273"},{"type":"REPORT","url":"https://bugzilla.suse.com/993739"},{"type":"REPORT","url":"https://bugzilla.suse.com/997807"},{"type":"REPORT","url":"https://bugzilla.suse.com/999101"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-8962"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-8963"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-8964"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10088"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7910"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7911"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7913"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7914"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8399"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8632"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8633"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8645"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8655"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-9083"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-9084"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-9555"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-9576"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-9756"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-9793"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-9794"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-9806"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-2583"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-2584"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5551"}],"related":["CVE-2015-8962","CVE-2015-8963","CVE-2015-8964","CVE-2016-10088","CVE-2016-7910","CVE-2016-7911","CVE-2016-7913","CVE-2016-7914","CVE-2016-8399","CVE-2016-8632","CVE-2016-8633","CVE-2016-8645","CVE-2016-8655","CVE-2016-9083","CVE-2016-9084","CVE-2016-9555","CVE-2016-9576","CVE-2016-9756","CVE-2016-9793","CVE-2016-9794","CVE-2016-9806","CVE-2017-2583","CVE-2017-2584","CVE-2017-5551"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2015-8962","CVE-2015-8963","CVE-2015-8964","CVE-2016-10088","CVE-2016-7910","CVE-2016-7911","CVE-2016-7913","CVE-2016-7914","CVE-2016-8399","CVE-2016-8632","CVE-2016-8633","CVE-2016-8645","CVE-2016-8655","CVE-2016-9083","CVE-2016-9084","CVE-2016-9555","CVE-2016-9576","CVE-2016-9756","CVE-2016-9793","CVE-2016-9794","CVE-2016-9806","CVE-2017-2583","CVE-2017-2584","CVE-2017-5551"]}