openSUSE Security Update : the Linux Kernel (openSUSE-2016-124)

high Nessus Plugin ID 88545

Synopsis

The remote openSUSE host is missing a security update.

Description

The openSUSE 13.1 kernel was updated to receive various security and bugfixes.

Following security bugs were fixed :

- CVE-2016-0728: A reference leak in keyring handling with join_session_keyring() could lead to local attackers gain root privileges. (bsc#962075).

- CVE-2015-7550: A local user could have triggered a race between read and revoke in keyctl (bnc#958951).

- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959190).

- CVE-2015-8543: The networking implementation in the Linux kernel did not validate protocol identifiers for certain protocol families, which allowed local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application (bnc#958886).

- CVE-2014-8989: The Linux kernel did not properly restrict dropping of supplemental group memberships in certain namespace scenarios, which allowed local users to bypass intended file permissions by leveraging a POSIX ACL containing an entry for the group category that is more restrictive than the entry for the other category, aka a 'negative groups' issue, related to kernel/groups.c, kernel/uid16.c, and kernel/user_namespace.c (bnc#906545).

- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI (bnc#937969).

- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 did not ensure that certain slot numbers are valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936).

- CVE-2015-8104: The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).

- CVE-2015-5307: The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bnc#953527).

- CVE-2014-9529: Race condition in the key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed local users to cause a denial of service (memory corruption or panic) or possibly have unspecified other impact via keyctl commands that trigger access to a key structure member during garbage collection of a key (bnc#912202).

- CVE-2015-7990: Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937 (bnc#952384 953052).

- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#945825).

- CVE-2015-7885: The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 did not initialize a certain structure member, which allowed local users to obtain sensitive information from kernel memory via a crafted application (bnc#951627).

- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel did not validate attempted changes to the MTU value, which allowed context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product (bnc#955354).

- CVE-2015-8767: A case can occur when sctp_accept() is called by the user during a heartbeat timeout event after the 4-way handshake. Since sctp_assoc_migrate() changes both assoc->base.sk and assoc->ep, the bh_sock_lock in sctp_generate_heartbeat_event() will be taken with the listening socket but released with the new association socket. The result is a deadlock on any future attempts to take the listening socket lock.
(bsc#961509)

- CVE-2015-8575: Validate socket address length in sco_sock_bind() to prevent information leak (bsc#959399).

- CVE-2015-8551, CVE-2015-8552: xen/pciback: For XEN_PCI_OP_disable_msi[|x] only disable if device has MSI(X) enabled (bsc#957990).

- CVE-2015-8550: Compiler optimizations in the XEN PV backend drivers could have lead to double fetch vulnerabilities, causing denial of service or arbitrary code execution (depending on the configuration) (bsc#957988).

The following non-security bugs were fixed :

- ALSA: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).

- ALSA: hda - Fix noise problems on Thinkpad T440s (boo#958504).

- Input: aiptek - fix crash on detecting device without endpoints (bnc#956708).

- KEYS: Make /proc/keys unconditional if CONFIG_KEYS=y (boo#956934).

- KVM: x86: update masterclock values on TSC writes (bsc#961739).

- NFS: Fix a NULL pointer dereference of migration recovery ops for v4.2 client (bsc#960839).

- apparmor: allow SYS_CAP_RESOURCE to be sufficient to prlimit another task (bsc#921949).

- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).

- blktap: refine mm tracking (bsc#952976).

- cdrom: Random writing support for BD-RE media (bnc#959568).

- genksyms: Handle string literals with spaces in reference files (bsc#958510).

- ipv4: Do not increase PMTU with Datagram Too Big message (bsc#955224).

- ipv6: distinguish frag queues by device for multicast and link-local packets (bsc#955422).

- ipv6: fix tunnel error handling (bsc#952579).

- route: Use ipv4_mtu instead of raw rt_pmtu (bsc#955224).

- uas: Add response iu handling (bnc#954138).

- usbvision fix overflow of interfaces array (bnc#950998).

- x86/evtchn: make use of PHYSDEVOP_map_pirq.

- xen/pciback: Do not allow MSI-X ops if PCI_COMMAND_MEMORY is not set (bsc#957990 XSA-157).

Solution

Update the affected the Linux Kernel packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=814440

https://bugzilla.opensuse.org/show_bug.cgi?id=851610

https://bugzilla.opensuse.org/show_bug.cgi?id=869564

https://bugzilla.opensuse.org/show_bug.cgi?id=873385

https://bugzilla.opensuse.org/show_bug.cgi?id=906545

https://bugzilla.opensuse.org/show_bug.cgi?id=907818

https://bugzilla.opensuse.org/show_bug.cgi?id=909077

https://bugzilla.opensuse.org/show_bug.cgi?id=909477

https://bugzilla.opensuse.org/show_bug.cgi?id=911326

https://bugzilla.opensuse.org/show_bug.cgi?id=912202

https://bugzilla.opensuse.org/show_bug.cgi?id=915517

https://bugzilla.opensuse.org/show_bug.cgi?id=915577

https://bugzilla.opensuse.org/show_bug.cgi?id=917830

https://bugzilla.opensuse.org/show_bug.cgi?id=918333

https://bugzilla.opensuse.org/show_bug.cgi?id=919007

https://bugzilla.opensuse.org/show_bug.cgi?id=919018

https://bugzilla.opensuse.org/show_bug.cgi?id=919463

https://bugzilla.opensuse.org/show_bug.cgi?id=919596

https://bugzilla.opensuse.org/show_bug.cgi?id=921313

https://bugzilla.opensuse.org/show_bug.cgi?id=921949

https://bugzilla.opensuse.org/show_bug.cgi?id=922583

https://bugzilla.opensuse.org/show_bug.cgi?id=922936

https://bugzilla.opensuse.org/show_bug.cgi?id=922944

https://bugzilla.opensuse.org/show_bug.cgi?id=926238

https://bugzilla.opensuse.org/show_bug.cgi?id=926240

https://bugzilla.opensuse.org/show_bug.cgi?id=927780

https://bugzilla.opensuse.org/show_bug.cgi?id=927786

https://bugzilla.opensuse.org/show_bug.cgi?id=928130

https://bugzilla.opensuse.org/show_bug.cgi?id=929525

https://bugzilla.opensuse.org/show_bug.cgi?id=930399

https://bugzilla.opensuse.org/show_bug.cgi?id=931988

https://bugzilla.opensuse.org/show_bug.cgi?id=932348

https://bugzilla.opensuse.org/show_bug.cgi?id=933896

https://bugzilla.opensuse.org/show_bug.cgi?id=933904

https://bugzilla.opensuse.org/show_bug.cgi?id=933907

https://bugzilla.opensuse.org/show_bug.cgi?id=933934

https://bugzilla.opensuse.org/show_bug.cgi?id=935542

https://bugzilla.opensuse.org/show_bug.cgi?id=935705

https://bugzilla.opensuse.org/show_bug.cgi?id=936502

https://bugzilla.opensuse.org/show_bug.cgi?id=936831

https://bugzilla.opensuse.org/show_bug.cgi?id=937032

https://bugzilla.opensuse.org/show_bug.cgi?id=937033

https://bugzilla.opensuse.org/show_bug.cgi?id=937969

https://bugzilla.opensuse.org/show_bug.cgi?id=938706

https://bugzilla.opensuse.org/show_bug.cgi?id=940338

https://bugzilla.opensuse.org/show_bug.cgi?id=944296

https://bugzilla.opensuse.org/show_bug.cgi?id=945825

https://bugzilla.opensuse.org/show_bug.cgi?id=947155

https://bugzilla.opensuse.org/show_bug.cgi?id=949936

https://bugzilla.opensuse.org/show_bug.cgi?id=950998

https://bugzilla.opensuse.org/show_bug.cgi?id=951194

https://bugzilla.opensuse.org/show_bug.cgi?id=951440

https://bugzilla.opensuse.org/show_bug.cgi?id=951627

https://bugzilla.opensuse.org/show_bug.cgi?id=952384

https://bugzilla.opensuse.org/show_bug.cgi?id=952579

https://bugzilla.opensuse.org/show_bug.cgi?id=952976

https://bugzilla.opensuse.org/show_bug.cgi?id=953052

https://bugzilla.opensuse.org/show_bug.cgi?id=953527

https://bugzilla.opensuse.org/show_bug.cgi?id=954138

https://bugzilla.opensuse.org/show_bug.cgi?id=954404

https://bugzilla.opensuse.org/show_bug.cgi?id=955224

https://bugzilla.opensuse.org/show_bug.cgi?id=955354

https://bugzilla.opensuse.org/show_bug.cgi?id=955422

https://bugzilla.opensuse.org/show_bug.cgi?id=956708

https://bugzilla.opensuse.org/show_bug.cgi?id=956934

https://bugzilla.opensuse.org/show_bug.cgi?id=957988

https://bugzilla.opensuse.org/show_bug.cgi?id=957990

https://bugzilla.opensuse.org/show_bug.cgi?id=958504

https://bugzilla.opensuse.org/show_bug.cgi?id=958510

https://bugzilla.opensuse.org/show_bug.cgi?id=958886

https://bugzilla.opensuse.org/show_bug.cgi?id=958951

https://bugzilla.opensuse.org/show_bug.cgi?id=959190

https://bugzilla.opensuse.org/show_bug.cgi?id=959399

https://bugzilla.opensuse.org/show_bug.cgi?id=959568

https://bugzilla.opensuse.org/show_bug.cgi?id=960839

https://bugzilla.opensuse.org/show_bug.cgi?id=961509

https://bugzilla.opensuse.org/show_bug.cgi?id=961739

https://bugzilla.opensuse.org/show_bug.cgi?id=962075

Plugin Details

Severity: High

ID: 88545

File Name: openSUSE-2016-124.nasl

Version: 2.8

Type: local

Agent: unix

Published: 2/3/2016

Updated: 1/19/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.2

Temporal Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:kernel-pae-devel-debuginfo, p-cpe:/a:novell:opensuse:pcfclock-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:vhba-kmp-desktop, p-cpe:/a:novell:opensuse:ipset-kmp-xen, p-cpe:/a:novell:opensuse:ndiswrapper, p-cpe:/a:novell:opensuse:virtualbox-host-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:kernel-ec2-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-pae, p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource, p-cpe:/a:novell:opensuse:vhba-kmp-debugsource, p-cpe:/a:novell:opensuse:kernel-trace-base, p-cpe:/a:novell:opensuse:virtualbox-qt-debuginfo, p-cpe:/a:novell:opensuse:ndiswrapper-kmp-pae, p-cpe:/a:novell:opensuse:xen-tools-domu, p-cpe:/a:novell:opensuse:kernel-pae-base-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-host-kmp-pae, p-cpe:/a:novell:opensuse:xtables-addons-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:kernel-xen-base, p-cpe:/a:novell:opensuse:virtualbox-devel, p-cpe:/a:novell:opensuse:ndiswrapper-kmp-default, p-cpe:/a:novell:opensuse:kernel-trace-devel-debuginfo, p-cpe:/a:novell:opensuse:ipset-kmp-pae, p-cpe:/a:novell:opensuse:pcfclock-kmp-desktop, p-cpe:/a:novell:opensuse:crash-gcore, p-cpe:/a:novell:opensuse:kernel-debug-debugsource, p-cpe:/a:novell:opensuse:cloop-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:kernel-ec2-base, p-cpe:/a:novell:opensuse:cloop-kmp-pae, p-cpe:/a:novell:opensuse:ipset-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:xen-libs-debuginfo, p-cpe:/a:novell:opensuse:ipset-devel, p-cpe:/a:novell:opensuse:hdjmod-kmp-default-debuginfo, cpe:/o:novell:opensuse:13.1, p-cpe:/a:novell:opensuse:crash-kmp-desktop, p-cpe:/a:novell:opensuse:xen-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:cloop-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:crash-gcore-debuginfo, p-cpe:/a:novell:opensuse:xtables-addons-kmp-default, p-cpe:/a:novell:opensuse:cloop-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:hdjmod-kmp-pae, p-cpe:/a:novell:opensuse:kernel-trace, p-cpe:/a:novell:opensuse:kernel-xen-devel, p-cpe:/a:novell:opensuse:cloop-kmp-xen-debuginfo, p-cpe:/a:novell:opensuse:kernel-ec2-debuginfo, p-cpe:/a:novell:opensuse:kernel-pae-debuginfo, p-cpe:/a:novell:opensuse:vhba-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:kernel-source, p-cpe:/a:novell:opensuse:crash-debugsource, p-cpe:/a:novell:opensuse:kernel-trace-debuginfo, p-cpe:/a:novell:opensuse:kernel-ec2-devel, p-cpe:/a:novell:opensuse:python-virtualbox-debuginfo, p-cpe:/a:novell:opensuse:xtables-addons-kmp-pae, p-cpe:/a:novell:opensuse:pcfclock, p-cpe:/a:novell:opensuse:kernel-xen-devel-debuginfo, p-cpe:/a:novell:opensuse:iscsitarget-kmp-default, p-cpe:/a:novell:opensuse:xen-kmp-desktop, p-cpe:/a:novell:opensuse:crash-debuginfo, p-cpe:/a:novell:opensuse:xen-debugsource, p-cpe:/a:novell:opensuse:xen-libs-32bit, p-cpe:/a:novell:opensuse:cloop-debugsource, p-cpe:/a:novell:opensuse:xtables-addons-kmp-desktop, p-cpe:/a:novell:opensuse:iscsitarget-debuginfo, p-cpe:/a:novell:opensuse:iscsitarget-kmp-xen-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-default, p-cpe:/a:novell:opensuse:kernel-xen-debugsource, p-cpe:/a:novell:opensuse:kernel-default-base, p-cpe:/a:novell:opensuse:pcfclock-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:xen-xend-tools-debuginfo, p-cpe:/a:novell:opensuse:xen-tools, p-cpe:/a:novell:opensuse:xen-kmp-pae, p-cpe:/a:novell:opensuse:xen-tools-debuginfo, p-cpe:/a:novell:opensuse:crash-devel, p-cpe:/a:novell:opensuse:kernel-pae-devel, p-cpe:/a:novell:opensuse:kernel-vanilla-devel, p-cpe:/a:novell:opensuse:crash-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:libipset3, p-cpe:/a:novell:opensuse:iscsitarget-kmp-pae, p-cpe:/a:novell:opensuse:cloop-kmp-xen, p-cpe:/a:novell:opensuse:xen-libs, p-cpe:/a:novell:opensuse:kernel-desktop, p-cpe:/a:novell:opensuse:xtables-addons-kmp-xen, p-cpe:/a:novell:opensuse:ndiswrapper-debuginfo, p-cpe:/a:novell:opensuse:iscsitarget-debugsource, p-cpe:/a:novell:opensuse:kernel-ec2-base-debuginfo, p-cpe:/a:novell:opensuse:ipset-debugsource, p-cpe:/a:novell:opensuse:kernel-default-debuginfo, p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-trace-debugsource, p-cpe:/a:novell:opensuse:ndiswrapper-debugsource, p-cpe:/a:novell:opensuse:vhba-kmp-default, p-cpe:/a:novell:opensuse:virtualbox-host-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:ipset-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:kernel-pae-debugsource, p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-pae, p-cpe:/a:novell:opensuse:python-virtualbox, p-cpe:/a:novell:opensuse:crash-kmp-xen, p-cpe:/a:novell:opensuse:kernel-debug, p-cpe:/a:novell:opensuse:hdjmod-kmp-xen, p-cpe:/a:novell:opensuse:virtualbox-debuginfo, p-cpe:/a:novell:opensuse:iscsitarget-kmp-desktop, p-cpe:/a:novell:opensuse:kernel-debug-base, p-cpe:/a:novell:opensuse:libipset3-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:ipset-kmp-desktop, p-cpe:/a:novell:opensuse:virtualbox-host-kmp-desktop, p-cpe:/a:novell:opensuse:kernel-syms, p-cpe:/a:novell:opensuse:virtualbox-guest-x11-debuginfo, p-cpe:/a:novell:opensuse:ipset-kmp-default, p-cpe:/a:novell:opensuse:ipset-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:pcfclock-debuginfo, p-cpe:/a:novell:opensuse:crash-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:hdjmod-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-debugsource, p-cpe:/a:novell:opensuse:xen-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:kernel-default, p-cpe:/a:novell:opensuse:ndiswrapper-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-websrv-debuginfo, p-cpe:/a:novell:opensuse:crash-eppic, p-cpe:/a:novell:opensuse:xtables-addons-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:kernel-debug-debuginfo, p-cpe:/a:novell:opensuse:kernel-desktop-devel, p-cpe:/a:novell:opensuse:cloop-kmp-default, p-cpe:/a:novell:opensuse:xen-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:kernel-desktop-debuginfo, p-cpe:/a:novell:opensuse:hdjmod-kmp-xen-debuginfo, p-cpe:/a:novell:opensuse:xen-tools-domu-debuginfo, p-cpe:/a:novell:opensuse:kernel-ec2-debugsource, p-cpe:/a:novell:opensuse:kernel-default-debugsource, p-cpe:/a:novell:opensuse:xen-xend-tools, p-cpe:/a:novell:opensuse:ipset-debuginfo, p-cpe:/a:novell:opensuse:pcfclock-kmp-pae, p-cpe:/a:novell:opensuse:kernel-desktop-base, p-cpe:/a:novell:opensuse:kernel-devel, p-cpe:/a:novell:opensuse:vhba-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:hdjmod-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:iscsitarget-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:hdjmod-debugsource, p-cpe:/a:novell:opensuse:xtables-addons-kmp-xen-debuginfo, p-cpe:/a:novell:opensuse:iscsitarget-kmp-xen, p-cpe:/a:novell:opensuse:virtualbox, p-cpe:/a:novell:opensuse:cloop-debuginfo, p-cpe:/a:novell:opensuse:crash, p-cpe:/a:novell:opensuse:kernel-source-vanilla, p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo, p-cpe:/a:novell:opensuse:vhba-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-guest-tools-debuginfo, p-cpe:/a:novell:opensuse:iscsitarget-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:pcfclock-kmp-default, p-cpe:/a:novell:opensuse:hdjmod-kmp-default, p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo, p-cpe:/a:novell:opensuse:xen-devel, p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-xen-debuginfo, p-cpe:/a:novell:opensuse:iscsitarget, p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-desktop, p-cpe:/a:novell:opensuse:virtualbox-host-source, p-cpe:/a:novell:opensuse:kernel-debug-devel, p-cpe:/a:novell:opensuse:crash-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:crash-eppic-debuginfo, p-cpe:/a:novell:opensuse:crash-kmp-default, p-cpe:/a:novell:opensuse:kernel-ec2, p-cpe:/a:novell:opensuse:crash-kmp-xen-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-guest-tools, p-cpe:/a:novell:opensuse:virtualbox-guest-x11, p-cpe:/a:novell:opensuse:vhba-kmp-xen-debuginfo, p-cpe:/a:novell:opensuse:ndiswrapper-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-websrv, p-cpe:/a:novell:opensuse:xen, p-cpe:/a:novell:opensuse:vhba-kmp-xen, p-cpe:/a:novell:opensuse:xtables-addons-debuginfo, p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo, p-cpe:/a:novell:opensuse:xen-doc-html, p-cpe:/a:novell:opensuse:virtualbox-host-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:iscsitarget-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:xtables-addons-debugsource, p-cpe:/a:novell:opensuse:virtualbox-guest-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:kernel-default-devel, p-cpe:/a:novell:opensuse:crash-kmp-pae, p-cpe:/a:novell:opensuse:xtables-addons-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:virtualbox-qt, p-cpe:/a:novell:opensuse:ipset, p-cpe:/a:novell:opensuse:xen-kmp-default, p-cpe:/a:novell:opensuse:kernel-trace-base-debuginfo, p-cpe:/a:novell:opensuse:ndiswrapper-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:ipset-kmp-xen-debuginfo, p-cpe:/a:novell:opensuse:pcfclock-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:xtables-addons, p-cpe:/a:novell:opensuse:cloop-kmp-desktop, p-cpe:/a:novell:opensuse:kernel-desktop-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-xen, p-cpe:/a:novell:opensuse:kernel-xen-base-debuginfo, p-cpe:/a:novell:opensuse:xen-libs-debuginfo-32bit, p-cpe:/a:novell:opensuse:kernel-trace-devel, p-cpe:/a:novell:opensuse:kernel-desktop-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-pae-base, p-cpe:/a:novell:opensuse:kernel-vanilla, p-cpe:/a:novell:opensuse:ndiswrapper-kmp-desktop, p-cpe:/a:novell:opensuse:kernel-desktop-debugsource, p-cpe:/a:novell:opensuse:pcfclock-debugsource, p-cpe:/a:novell:opensuse:virtualbox-host-kmp-default, p-cpe:/a:novell:opensuse:cloop, p-cpe:/a:novell:opensuse:hdjmod-kmp-desktop, p-cpe:/a:novell:opensuse:vhba-kmp-pae

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/8/2016

Exploitable With

Core Impact

Reference Information

CVE: CVE-2014-2568, CVE-2014-8133, CVE-2014-8989, CVE-2014-9090, CVE-2014-9419, CVE-2014-9529, CVE-2014-9683, CVE-2014-9715, CVE-2014-9728, CVE-2014-9729, CVE-2014-9730, CVE-2014-9731, CVE-2015-0272, CVE-2015-0777, CVE-2015-1420, CVE-2015-1421, CVE-2015-2041, CVE-2015-2042, CVE-2015-2150, CVE-2015-2666, CVE-2015-2830, CVE-2015-2922, CVE-2015-2925, CVE-2015-3212, CVE-2015-3339, CVE-2015-3636, CVE-2015-4001, CVE-2015-4002, CVE-2015-4003, CVE-2015-4004, CVE-2015-4036, CVE-2015-4167, CVE-2015-4692, CVE-2015-4700, CVE-2015-5157, CVE-2015-5283, CVE-2015-5307, CVE-2015-5364, CVE-2015-5366, CVE-2015-5707, CVE-2015-6937, CVE-2015-7550, CVE-2015-7799, CVE-2015-7833, CVE-2015-7872, CVE-2015-7885, CVE-2015-7990, CVE-2015-8104, CVE-2015-8215, CVE-2015-8543, CVE-2015-8550, CVE-2015-8551, CVE-2015-8552, CVE-2015-8569, CVE-2015-8575, CVE-2015-8767, CVE-2016-0728