{"id":"SUSE-RU-2015:0621-1","summary":"Security update for Linux kernel","details":"\nThe SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix \nvarious bugs and security issues.\n\nThe following security bugs have been fixed:\n\n    * \n\n      CVE-2014-1739: The media_device_enum_entities function in\n      drivers/media/media-device.c in the Linux kernel before 3.14.6 does\n      not initialize a certain data structure, which allows local users to\n      obtain sensitive information from kernel memory by leveraging\n      /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call\n      (bnc#882804).\n\n    * \n\n      CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not\n      properly implement the interaction between range notification and\n      hole punching, which allows local users to cause a denial of service\n      (i_mutex hold) by using the mmap system call to access a hole, as\n      demonstrated by interfering with intended shmem activity by blocking\n      completion of (1) an MADV_REMOVE madvise call or (2) an\n      FALLOC_FL_PUNCH_HOLE fallocate call (bnc#883518).\n\n    * \n\n      CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through\n      3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and\n      the sep CPU feature flag is set, allows local users to cause a denial\n      of service (OOPS and system crash) via an invalid syscall number, as\n      demonstrated by number 1000 (bnc#883724).\n\n    * \n\n      CVE-2014-4667: The sctp_association_free function in\n      net/sctp/associola.c in the Linux kernel before 3.15.2 does not\n      properly manage a certain backlog value, which allows remote\n      attackers to cause a denial of service (socket outage) via a crafted\n      SCTP packet (bnc#885422).\n\n    * \n\n      CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the\n      Linux kernel through 3.15.6 allows local users to gain privileges by\n      leveraging data-structure differences between an l2tp socket and an\n      inet socket (bnc#887082).\n\n    * \n\n      CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c\n      in the Linux kernel through 3.15.8, when SCTP authentication is\n      enabled, allows remote attackers to cause a denial of service (NULL\n      pointer dereference and OOPS) by starting to establish an association\n      between two endpoints immediately after an exchange of INIT and INIT\n      ACK chunks to establish an earlier association between these\n      endpoints in the opposite direction (bnc#889173).\n\n    * \n\n      CVE-2014-5471: Stack consumption vulnerability in the\n      parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the\n      Linux kernel through 3.16.1 allows local users to cause a denial of\n      service (uncontrolled recursion, and system crash or reboot) via a\n      crafted iso9660 image with a CL entry referring to a directory entry\n      that has a CL entry. (bnc#892490)\n\n    * \n\n      CVE-2014-5472: The parse_rock_ridge_inode_internal function in\n      fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users\n      to cause a denial of service (unkillable mount process) via a crafted\n      iso9660 image with a self-referential CL entry. (bnc#892490)\n\n    * \n\n      CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux\n      kernel before 3.13.7 allows remote attackers to cause a denial of\n      service (system crash) via network traffic that improperly interacts\n      with the WLAN_STA_PS_STA state (aka power-save mode), related to\n      sta_info.c and tx.c. (bnc#871797)\n\n    * \n\n      CVE-2014-4027: The rd_build_device_space function in\n      drivers/target/target_core_rd.c in the Linux kernel before 3.14 does\n      not properly initialize a certain data structure, which allows local\n      users to obtain sensitive information from ramdisk_mcp memory by\n      leveraging access to a SCSI initiator. (bnc#882639)\n\n    * \n\n      CVE-2014-3153 The futex_requeue function in kernel/futex.c in the\n      Linux kernel through 3.14.5 does not ensure that calls have two\n      different futex addresses, which allows local users to gain\n      privileges via a crafted FUTEX_REQUEUE command that facilitates\n      unsafe waiter modification. (bnc#880892)\n\n    * \n\n      CVE-2014-6410: Avoid infinite loop when processing indirect ICBs\n      (bnc#896689)\n\nThe following non-security bugs have been fixed:\n\n    * ACPI / PAD: call schedule() when need_resched() is true (bnc#866911).\n    * ACPI: Fix bug when ACPI reset register is implemented in system\n      memory (bnc#882900).\n    * ACPI: Limit access to custom_method (bnc#884333).\n    * ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746).\n    * Add option to automatically enforce module signatures when in Secure\n      Boot mode (bnc#884333).\n    * Add secure_modules() call (bnc#884333).\n    * Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344).\n    * Backported new patches of Lock down functions for UEFI secure boot\n      Also updated series.conf and removed old patches.\n    * Btrfs: Return EXDEV for cross file system snapshot.\n    * Btrfs: abort the transaction when we does not find our extent ref.\n    * Btrfs: avoid warning bomb of btrfs_invalidate_inodes.\n    * Btrfs: cancel scrub on transaction abortion.\n    * Btrfs: correctly set profile flags on seqlock retry.\n    * Btrfs: does not check nodes for extent items.\n    * Btrfs: fix a possible deadlock between scrub and transaction\n      committing.\n    * Btrfs: fix corruption after write/fsync failure + fsync + log\n      recovery (bnc#894200).\n    * Btrfs: fix csum tree corruption, duplicate and outdated checksums\n      (bnc#891619).\n    * Btrfs: fix double free in find_lock_delalloc_range.\n    * Btrfs: fix possible memory leak in btrfs_create_tree().\n    * Btrfs: fix use of uninit 'ret' in end_extent_writepage().\n    * Btrfs: free delayed node outside of root-\u003einode_lock (bnc#866864).\n    * Btrfs: make DEV_INFO ioctl available to anyone.\n    * Btrfs: make FS_INFO ioctl available to anyone.\n    * Btrfs: make device scan less noisy.\n    * Btrfs: make sure there are not any read requests before stopping\n      workers.\n    * Btrfs: more efficient io tree navigation on wait_extent_bit.\n    * Btrfs: output warning instead of error when loading free space cache\n      failed.\n    * Btrfs: retrieve more info from FS_INFO ioctl.\n    * Btrfs: return EPERM when deleting a default subvolume (bnc#869934).\n    * Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol\n      (bnc#866615).\n    * Btrfs: use right type to get real comparison.\n    * Btrfs: wake up @scrub_pause_wait as much as we can.\n    * Btrfs: wake up transaction thread upon remount.\n    * CacheFiles: Add missing retrieval completions (bnc#880344).\n    * CacheFiles: Does not try to dump the index key if the cookie has been\n      cleared (bnc#880344).\n    * CacheFiles: Downgrade the requirements passed to the allocator\n      (bnc#880344).\n    * CacheFiles: Fix the marking of cached pages (bnc#880344).\n    * CacheFiles: Implement invalidation (bnc#880344).\n    * CacheFiles: Make some debugging statements conditional (bnc#880344).\n    * Drivers: hv: util: Fix a bug in the KVP code (bnc#886840).\n    * Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code\n      (bnc#886840).\n    * FS-Cache: Add transition to handle invalidate immediately after\n      lookup (bnc#880344).\n    * FS-Cache: Check that there are no read ops when cookie relinquished\n      (bnc#880344).\n    * FS-Cache: Clear remaining page count on retrieval cancellation\n      (bnc#880344).\n    * FS-Cache: Convert the object event ID #defines into an enum\n      (bnc#880344).\n    * FS-Cache: Does not sleep in page release if __GFP_FS is not set\n      (bnc#880344).\n    * FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344).\n    * FS-Cache: Exclusive op submission can BUG if there is been an I/O\n      error (bnc#880344).\n    * FS-Cache: Fix __wait_on_atomic_t() to call the action func if the\n      counter != 0 (bnc#880344).\n    * FS-Cache: Fix object state machine to have separate work and wait\n      states (bnc#880344).\n    * FS-Cache: Fix operation state management and accounting (bnc#880344).\n    * FS-Cache: Fix signal handling during waits (bnc#880344).\n    * FS-Cache: Initialise the object event mask with the calculated mask\n      (bnc#880344).\n    * FS-Cache: Limit the number of I/O error reports for a cache\n      (bnc#880344).\n    * FS-Cache: Make cookie relinquishment wait for outstanding reads\n      (bnc#880344).\n    * FS-Cache: Mark cancellation of in-progress operation (bnc#880344).\n    * FS-Cache: One of the write operation paths doeses not set the object\n      state (bnc#880344).\n    * FS-Cache: Provide proper invalidation (bnc#880344).\n    * FS-Cache: Simplify cookie retention for fscache_objects, fixing oops\n      (bnc#880344).\n    * FS-Cache: The retrieval remaining-pages counter needs to be atomic_t\n      (bnc#880344).\n    * FS-Cache: Uninline fscache_object_init() (bnc#880344).\n    * FS-Cache: Wrap checks on object state (bnc#880344).\n    * HID: usbhid: add always-poll quirk (bnc#888607).\n    * HID: usbhid: enable always-poll quirk for Elan Touchscreen\n      (bnc#888607).\n    * IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297).\n    * Ignore 'flags' change to event_constraint (bnc#876114).\n    * Ignore data_src/weight changes to perf_sample_data (bnc#876114).\n    * NFS: Allow more operations in an NFSv4.1 request (bnc#890513).\n    * NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968).\n    * NFS: Does not copy read delegation stateids in setattr (bnc#888968).\n    * NFS: Does not use a delegation to open a file when returning that\n      delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496)\n    * NFS: Fixes for NFS RCU-walk support in line with code going upstream\n    * NFS: Use FS-Cache invalidation (bnc#880344).\n    * NFS: allow lockless access to access_cache (bnc#866130).\n    * NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts\n      (bnc#888591).\n    * NFS: nfs4_do_open should add negative results to the dcache\n      (bnc#866130).\n    * NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a\n      page (bnc#880344).\n    * NFS: nfs_open_revalidate: only evaluate parent if it will be used\n      (bnc#866130).\n    * NFS: prepare for RCU-walk support but pushing tests later in code\n      (bnc#866130).\n    * NFS: support RCU_WALK in nfs_permission() (bnc#866130).\n    * NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130).\n    * NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130).\n    * NFSD: Does not hand out delegations for 30 seconds after recalling\n      them (bnc#880370).\n    * NFSv4 set open access operation call flag in nfs4_init_opendata_res\n      (bnc#888968, bnc#892200, bnc#893596, bnc#893496).\n    * NFSv4: Add a helper for encoding opaque data (bnc#888968).\n    * NFSv4: Add a helper for encoding stateids (bnc#888968).\n    * NFSv4: Add helpers for basic copying of stateids (bnc#888968).\n    * NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968).\n    * NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968).\n    * NFSv4: Rename nfs4_copy_stateid() (bnc#888968).\n    * NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an\n      error (bnc#888968).\n    * NFSv4: Simplify the struct nfs4_stateid (bnc#888968).\n    * NFSv4: The stateid must remain the same for replayed RPC calls\n      (bnc#888968).\n    * NFSv4: nfs4_stateid_is_current should return 'true' for an invalid\n      stateid (bnc#888968).\n    * One more fix for kABI breakage.\n    * PCI: Lock down BAR access when module security is enabled\n      (bnc#884333).\n    * PCI: enable MPS 'performance' setting to properly handle bridge MPS\n      (bnc#883376).\n    * PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441).\n    * PM / Hibernate: Create a Radix-Tree to store memory bitmap\n      (bnc#860441).\n    * PM / Hibernate: Implement position keeping in radix tree\n      (bnc#860441).\n    * PM / Hibernate: Iterate over set bits instead of PFNs in\n      swsusp_free() (bnc#860441).\n    * PM / Hibernate: Remove the old memory-bitmap implementation\n      (bnc#860441).\n    * PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node\n      (bnc#860441).\n    * Restrict /dev/mem and /dev/kmem when module loading is restricted\n      (bnc#884333).\n    * Reuse existing 'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT\n      (bnc#876114).\n    * USB: handle LPM errors during device suspend correctly (bnc#849123).\n    * Update kabi files to reflect fscache change (bnc#880344)\n    * Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281)\n    * VFS: Make more complete truncate operation available to CacheFiles\n      (bnc#880344).\n    * [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366,\n      ltc#83367).\n    * acpi: Ignore acpi_rsdp kernel parameter when module loading is\n      restricted (bnc#884333).\n    * af_iucv: correct cleanup if listen backlog is full (bnc#885262,\n      LTC#111728).\n    * asus-wmi: Restrict debugfs interface when module loading is\n      restricted (bnc#884333).\n    * autofs4: allow RCU-walk to walk through autofs4 (bnc#866130).\n    * autofs4: avoid taking fs_lock during rcu-walk (bnc#866130).\n    * autofs4: does not take spinlock when not needed in\n      autofs4_lookup_expiring (bnc#866130).\n    * autofs4: factor should_expire() out of autofs4_expire_indirect\n      (bnc#866130).\n    * autofs4: make 'autofs4_can_expire' idempotent (bnc#866130).\n    * autofs4: remove a redundant assignment (bnc#866130).\n    * autofs: fix lockref lookup (bnc#888591).\n    * be2net: add dma_mapping_error() check for dma_map_page()\n      (bnc#881759).\n    * block: add cond_resched() to potentially long running ioctl discard\n      loop (bnc#884725).\n    * block: fix race between request completion and timeout handling\n      (bnc#881051).\n    * cdc-ether: clean packet filter upon probe (bnc#876017).\n    * cpuset: Fix memory allocator deadlock (bnc#876590).\n    * crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs\n      have them, but some are FIPS certified, with some kernel support.\n    * crypto: fips - only panic on bad/missing crypto mod signatures\n      (bnc#887503).\n    * crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips\n      mode (bnc#889451).\n    * dasd: validate request size before building CCW/TCW (bnc#891087,\n      LTC#114068).\n    * dm mpath: fix race condition between multipath_dtr and pg_init_done\n      (bnc#826486).\n    * dm-mpath: fix panic on deleting sg device (bnc#870161).\n    * drm/ast: AST2000 cannot be detected correctly (bnc#895983).\n    * drm/ast: Actually load DP501 firmware when required (bnc#895608\n      bnc#871134).\n    * drm/ast: Add missing entry to dclk_table[].\n    * drm/ast: Add reduced non reduced mode parsing for wide screen mode\n      (bnc#892723).\n    * drm/ast: initial DP501 support (v0.2) (bnc#871134).\n    * drm/ast: open key before detect chips (bnc#895983).\n    * drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304).\n    * drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064).\n    * drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init\n      (bnc#869055).\n    * drm/i915: create functions for the 'unclaimed register' checks\n      (bnc#869055).\n    * drm/i915: use FPGA_DBG for the 'unclaimed register' checks\n      (bnc#869055).\n    * drm/mgag200: Initialize data needed to map fbdev memory (bnc\n      #806990).\n    * e1000e: enable support for new device IDs (bnc#885509).\n    * fs/fscache: remove spin_lock() from the condition in while()\n      (bnc#880344).\n    * hibernate: Disable in a signed modules environment (bnc#884333).\n    * hugetlb: does not use ERR_PTR with VM_FAULT* values\n    * ibmvscsi: Abort init sequence during error recovery (bnc#885382).\n    * ibmvscsi: Add memory barriers for send / receive (bnc#885382).\n    * inet: add a redirect generation id in inetpeer (bnc#860593).\n    * inetpeer: initialize -\u003eredirect_genid in inet_getpeer() (bnc#860593).\n    * ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645).\n    * kabi: hide bnc#860593 changes of struct inetpeer_addr_base\n      (bnc#860593).\n    * kernel: 3215 tty hang (bnc#891087, LTC#114562).\n    * kernel: fix data corruption when reading /proc/sysinfo (bnc#891087,\n      LTC#114480).\n    * kernel: fix kernel oops with load of fpc register (bnc#889061,\n      LTC#113596).\n    * kernel: sclp console tty reference counting (bnc#891087, LTC#115466).\n    * kexec: Disable at runtime if the kernel enforces module loading\n      restrictions (bnc#884333).\n    * md/raid6: avoid data corruption during recovery of double-degraded\n      RAID6.\n    * memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim\n      fix).\n    * memcg: do not expose uninitialized mem_cgroup_per_node to world\n      (bnc#883096).\n    * mm, hugetlb: add VM_NORESERVE check in vma_has_reserves()\n    * mm, hugetlb: change variable name reservations to resv\n    * mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache\n    * mm, hugetlb: defer freeing pages when gathering surplus pages\n    * mm, hugetlb: do not use a page in page cache for cow optimization\n    * mm, hugetlb: fix and clean-up node iteration code to alloc or free\n    * mm, hugetlb: fix race in region tracking\n    * mm, hugetlb: fix subpool accounting handling\n    * mm, hugetlb: improve page-fault scalability\n    * mm, hugetlb: improve, cleanup resv_map parameters\n    * mm, hugetlb: move up the code which check availability of free huge\n      page\n    * mm, hugetlb: protect reserved pages when soft offlining a hugepage\n    * mm, hugetlb: remove decrement_hugepage_resv_vma()\n    * mm, hugetlb: remove redundant list_empty check in\n      gather_surplus_pages()\n    * mm, hugetlb: remove resv_map_put\n    * mm, hugetlb: remove useless check about mapping type\n    * mm, hugetlb: return a reserved page to a reserved pool if failed\n    * mm, hugetlb: trivial commenting fix\n    * mm, hugetlb: unify region structure handling\n    * mm, hugetlb: unify region structure handling kabi\n    * mm, hugetlb: use long vars instead of int in region_count() (Hugetlb\n      Fault Scalability).\n    * mm, hugetlb: use vma_resv_map() map types\n    * mm, oom: fix badness score underflow (bnc#884582, bnc#884767).\n    * mm, oom: normalize oom scores to oom_score_adj scale only for\n      userspace (bnc#884582, bnc#884767).\n    * mm, thp: do not allow thp faults to avoid cpuset restrictions\n      (bnc#888849).\n    * net/mlx4_core: Load higher level modules according to ports type\n      (bnc#887680).\n    * net/mlx4_core: Load the IB driver when the device supports IBoE\n      (bnc#887680).\n    * net/mlx4_en: Fix a race between napi poll function and RX ring\n      cleanup (bnc#863586).\n    * net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058).\n    * net: fix checksumming features handling in output path (bnc#891259).\n    * pagecache_limit: batch large nr_to_scan targets (bnc#895221).\n    * pagecachelimit: reduce lru_lock congestion for heavy parallel reclaim\n      fix (bnc#895680).\n    * perf/core: Add weighted samples (bnc#876114).\n    * perf/x86: Add flags to event constraints (bnc#876114).\n    * perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114).\n    * perf: Add generic memory sampling interface (bnc#876114).\n    * qla2xxx: Avoid escalating the SCSI error handler if the command is\n      not found in firmware (bnc#859840).\n    * qla2xxx: Clear loop_id for ports that are marked lost during fabric\n      scanning (bnc#859840).\n    * qla2xxx: Does not check for firmware hung during the reset context\n      for ISP82XX (bnc#859840).\n    * qla2xxx: Issue abort command for outstanding commands during cleanup\n      when only firmware is alive (bnc#859840).\n    * qla2xxx: Reduce the time we wait for a command to complete during\n      SCSI error handling (bnc#859840).\n    * qla2xxx: Set host can_queue value based on available resources\n      (bnc#859840).\n    * restore smp_mb() in unlock_new_inode() (bnc#890526).\n    * s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061,\n      LTC#113725).\n    * sched: fix the theoretical signal_wake_up() vs schedule() race\n      (bnc#876055).\n    * sclp_vt220: Enable integrated ASCII console per default (bnc#885262,\n      LTC#112035).\n    * scsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614).\n    * scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608).\n    * scsiback: correct grant page unmapping.\n    * scsiback: fix retry handling in __report_luns().\n    * scsiback: free resources after error.\n    * sunrpc/auth: allow lockless (rcu) lookup of credential cache\n      (bnc#866130).\n    * supported.conf: remove external from drivers/net/veth (bnc#889727)\n    * supported.conf: support net/sched/act_police.ko (bnc#890426)\n    * tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921).\n    * tg3: Change nvram command timeout value to 50ms (bnc#855657).\n    * tg3: Override clock, link aware and link idle mode during NVRAM dump\n      (bnc#855657).\n    * tg3: Set the MAC clock to the fastest speed during boot code load\n      (bnc#855657).\n    * usb: Does not enable LPM if the exit latency is zero (bnc#832309).\n    * usbcore: Does not log on consecutive debounce failures of the same\n      port (bnc#888105).\n    * usbhid: fix PIXART optical mouse (bnc#888607).\n    * uswsusp: Disable when module loading is restricted (bnc#884333).\n    * vscsi: support larger transfer sizes (bnc#774818).\n    * writeback: Do not sync data dirtied after sync start (bnc#833820).\n    * x86 thermal: Delete power-limit-notification console messages\n      (bnc#882317).\n    * x86 thermal: Disable power limit notification interrupt by default\n      (bnc#882317).\n    * x86 thermal: Re-enable power limit notification interrupt by default\n      (bnc#882317).\n    * x86, cpu hotplug: Fix stack frame warning in\n      check_irq_vectors_for_cpu_disable() (bnc#887418).\n    * x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847).\n    * x86/UV: Add kdump to UV NMI handler (bnc#888847).\n    * x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847).\n    * x86/UV: Move NMI support (bnc#888847).\n    * x86/UV: Update UV support for external NMI signals (bnc#888847).\n    * x86/uv/nmi: Fix Sparse warnings (bnc#888847).\n    * x86: Add check for number of available vectors before CPU down\n      (bnc#887418).\n    * x86: Lock down IO port access when module security is enabled\n      (bnc#884333).\n    * x86: Restrict MSR access when module loading is restricted\n      (bnc#884333).\n\nSecurity Issues:\n\n    * CVE-2013-1979\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979\u003e\n    * CVE-2014-1739\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739\u003e\n    * CVE-2014-2706\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706\u003e\n    * CVE-2014-4027\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027\u003e\n    * CVE-2014-4171\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171\u003e\n    * CVE-2014-4508\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508\u003e\n    * CVE-2014-4667\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667\u003e\n    * CVE-2014-4943\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943\u003e\n    * CVE-2014-5077\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077\u003e\n    * CVE-2014-5471\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471\u003e\n    * CVE-2014-5472\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472\u003e\n    * CVE-2014-3153\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153\u003e\n    * CVE-2014-6410\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410\u003e\n\nThe SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to fix \nvarious bugs and security issues.\n\nFollowing security bugs were fixed: CVE-2013-1979: The scm_set_cred \nfunction in include/net/scm.h in the Linux kernel before 3.8.11 uses \nincorrect uid and gid values during credentials passing, which allows local \nusers to gain privileges via a crafted application (bnc#816708).\n\nCVE-2014-1739: The media_device_enum_entities function in \ndrivers/media/media-device.c in the Linux kernel before 3.14.6 does not \ninitialize a certain data structure, which allows local users to obtain \nsensitive information from kernel memory by leveraging /dev/media0 read \naccess for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804).\n\nCVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not \nproperly implement the interaction between range notification and hole \npunching, which allows local users to cause a denial of service (i_mutex \nhold) by using the mmap system call to access a hole, as demonstrated by \ninterfering with intended shmem activity by blocking completion of (1) an \nMADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call \n(bnc#883518).\n\nCVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through \n3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the \nsep CPU feature flag is set, allows local users to cause a denial of \nservice (OOPS and system crash) via an invalid syscall number, as \ndemonstrated by number 1000 (bnc#883724).\n\nCVE-2014-4667: The sctp_association_free function in net/sctp/associola.c \nin the Linux kernel before 3.15.2 does not properly manage a certain \nbacklog value, which allows remote attackers to cause a denial of service \n(socket outage) via a crafted SCTP packet (bnc#885422).\n\nCVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux \nkernel through 3.15.6 allows local users to gain privileges by leveraging \ndata-structure differences between an l2tp socket and an inet socket \n(bnc#887082).\n\nCVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in \nthe Linux kernel through 3.15.8, when SCTP authentication is enabled, \nallows remote attackers to cause a denial of service (NULL pointer \ndereference and OOPS) by starting to establish an association between two \nendpoints immediately after an exchange of INIT and INIT ACK chunks to \nestablish an earlier association between these endpoints in the opposite \ndirection (bnc#889173).\n\nCVE-2014-5471: Stack consumption vulnerability in the \nparse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux \nkernel through 3.16.1 allows local users to cause a denial of service \n(uncontrolled recursion, and system crash or reboot) via a crafted iso9660 \nimage with a CL entry referring to a directory entry that has a CL entry. \n(bnc#892490)\n\nCVE-2014-5472: The parse_rock_ridge_inode_internal function in \nfs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to \ncause a denial of service (unkillable mount process) via a crafted iso9660 \nimage with a self-referential CL entry. (bnc#892490)\n\nCVE-2014-2706: Race condition in the mac80211 subsystem in the Linux kernel \nbefore 3.13.7 allows remote attackers to cause a denial of service (system \ncrash) via network traffic that improperly interacts with the \nWLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and \ntx.c. (bnc#871797)\n\nCVE-2014-4027: The rd_build_device_space function in \ndrivers/target/target_core_rd.c in the Linux kernel before 3.14 does not \nproperly initialize a certain data structure, which allows local users to \nobtain sensitive information from ramdisk_mcp memory by leveraging access \nto a SCSI initiator. (bnc#882639)\n\nCVE-2014-3153 The futex_requeue function in kernel/futex.c in the Linux \nkernel through 3.14.5 does not ensure that calls have two different futex \naddresses, which allows local users to gain privileges via a crafted \nFUTEX_REQUEUE command that facilitates unsafe waiter modification. \n(bnc#880892)\n\nCVE-2014-6410: Avoid infinite loop when processing indirect ICBs \n(bnc#896689)\n\nThe following non-security bugs were fixed: - ACPI / PAD: call schedule() \nwhen need_resched() is true (bnc#866911). - ACPI: Fix bug when ACPI reset \nregister is implemented in system memory (bnc#882900). - ACPI: Limit access \nto custom_method (bnc#884333). - ALSA: hda - Enabling Realtek ALC 671 codec \n(bnc#891746). - Add option to automatically enforce module signatures when \nin Secure Boot mode (bnc#884333). - Add secure_modules() call (bnc#884333). \n- Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344). - Backported \nnew patches of Lock down functions for UEFI secure boot Also updated \nseries.conf and removed old patches. - Btrfs: Return EXDEV for cross file \nsystem snapshot. - Btrfs: abort the transaction when we does not find our \nextent ref. - Btrfs: avoid warning bomb of btrfs_invalidate_inodes. - \nBtrfs: cancel scrub on transaction abortion. - Btrfs: correctly set profile \nflags on seqlock retry. - Btrfs: does not check nodes for extent items. - \nBtrfs: fix a possible deadlock between scrub and transaction committing. - \nBtrfs: fix corruption after write/fsync failure + fsync + log recovery \n(bnc#894200). - Btrfs: fix csum tree corruption, duplicate and outdated \nchecksums (bnc#891619). - Btrfs: fix double free in \nfind_lock_delalloc_range. - Btrfs: fix possible memory leak in \nbtrfs_create_tree(). - Btrfs: fix use of uninit 'ret' in \nend_extent_writepage(). - Btrfs: free delayed node outside of \nroot-\u003einode_lock (bnc#866864). - Btrfs: make DEV_INFO ioctl available to \nanyone. - Btrfs: make FS_INFO ioctl available to anyone. - Btrfs: make \ndevice scan less noisy. - Btrfs: make sure there are not any read requests \nbefore stopping workers. - Btrfs: more efficient io tree navigation on \nwait_extent_bit. - Btrfs: output warning instead of error when loading free \nspace cache failed. - Btrfs: retrieve more info from FS_INFO ioctl. - \nBtrfs: return EPERM when deleting a default subvolume (bnc#869934). - \nBtrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). \n- Btrfs: use right type to get real comparison. - Btrfs: wake up \n@scrub_pause_wait as much as we can. - Btrfs: wake up transaction thread \nupon remount. - CacheFiles: Add missing retrieval completions (bnc#880344). \n- CacheFiles: Does not try to dump the index key if the cookie has been \ncleared (bnc#880344). - CacheFiles: Downgrade the requirements passed to \nthe allocator (bnc#880344). - CacheFiles: Fix the marking of cached pages \n(bnc#880344). - CacheFiles: Implement invalidation (bnc#880344). - \nCacheFiles: Make some debugging statements conditional (bnc#880344). - \nDrivers: hv: util: Fix a bug in the KVP code (bnc#886840). - Drivers: hv: \nvmbus: Fix a bug in the channel callback dispatch code (bnc#886840). - \nFS-Cache: Add transition to handle invalidate immediately after lookup \n(bnc#880344). - FS-Cache: Check that there are no read ops when cookie \nrelinquished (bnc#880344). - FS-Cache: Clear remaining page count on \nretrieval cancellation (bnc#880344). - FS-Cache: Convert the object event \nID #defines into an enum (bnc#880344). - FS-Cache: Does not sleep in page \nrelease if __GFP_FS is not set (bnc#880344). - FS-Cache: Does not use \nspin_is_locked() in assertions (bnc#880344). - FS-Cache: Exclusive op \nsubmission can BUG if there is been an I/O error (bnc#880344). - FS-Cache: \nFix __wait_on_atomic_t() to call the action func if the counter != 0 \n(bnc#880344). - FS-Cache: Fix object state machine to have separate work \nand wait states (bnc#880344). - FS-Cache: Fix operation state management \nand accounting (bnc#880344). - FS-Cache: Fix signal handling during waits \n(bnc#880344). - FS-Cache: Initialise the object event mask with the \ncalculated mask (bnc#880344). - FS-Cache: Limit the number of I/O error \nreports for a cache (bnc#880344). - FS-Cache: Make cookie relinquishment \nwait for outstanding reads (bnc#880344). - FS-Cache: Mark cancellation of \nin-progress operation (bnc#880344). - FS-Cache: One of the write operation \npaths doeses not set the object state (bnc#880344). - FS-Cache: Provide \nproper invalidation (bnc#880344). - FS-Cache: Simplify cookie retention for \nfscache_objects, fixing oops (bnc#880344). - FS-Cache: The retrieval \nremaining-pages counter needs to be atomic_t (bnc#880344). - FS-Cache: \nUninline fscache_object_init() (bnc#880344). - FS-Cache: Wrap checks on \nobject state (bnc#880344). - HID: usbhid: add always-poll quirk \n(bnc#888607). - HID: usbhid: enable always-poll quirk for Elan Touchscreen \n(bnc#888607). - IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297). - \nIgnore 'flags' change to event_constraint (bnc#876114). - Ignore \ndata_src/weight changes to perf_sample_data (bnc#876114). - NFS: Allow more \noperations in an NFSv4.1 request (bnc#890513). - NFS: Clean up helper \nfunction nfs4_select_rw_stateid() (bnc#888968). - NFS: Does not copy read \ndelegation stateids in setattr (bnc#888968). - NFS: Does not use a \ndelegation to open a file when returning that delegation (bnc#888968, \nbnc#892200, bnc#893596, bnc#893496) - NFS: Fixes for NFS RCU-walk support \nin line with code going upstream - NFS: Use FS-Cache invalidation \n(bnc#880344). - NFS: allow lockless access to access_cache (bnc#866130). - \nNFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts \n(bnc#888591). - NFS: nfs4_do_open should add negative results to the dcache \n(bnc#866130). - NFS: nfs_migrate_page() does not wait for FS-Cache to \nfinish with a page (bnc#880344). - NFS: nfs_open_revalidate: only evaluate \nparent if it will be used (bnc#866130). - NFS: prepare for RCU-walk support \nbut pushing tests later in code (bnc#866130). - NFS: support RCU_WALK in \nnfs_permission() (bnc#866130). - NFS: teach nfs_lookup_verify_inode to \nhandle LOOKUP_RCU (bnc#866130). - NFS: teach nfs_neg_need_reval to \nunderstand LOOKUP_RCU (bnc#866130). - NFSD: Does not hand out delegations \nfor 30 seconds after recalling them (bnc#880370). - NFSv4 set open access \noperation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200, \nbnc#893596, bnc#893496). - NFSv4: Add a helper for encoding opaque data \n(bnc#888968). - NFSv4: Add a helper for encoding stateids (bnc#888968). - \nNFSv4: Add helpers for basic copying of stateids (bnc#888968). - NFSv4: \nClean up nfs4_select_rw_stateid() (bnc#888968). - NFSv4: Fix the return \nvalue of nfs4_select_rw_stateid (bnc#888968). - NFSv4: Rename \nnfs4_copy_stateid() (bnc#888968). - NFSv4: Resend the READ/WRITE RPC call \nif a stateid change causes an error (bnc#888968). - NFSv4: Simplify the \nstruct nfs4_stateid (bnc#888968). - NFSv4: The stateid must remain the same \nfor replayed RPC calls (bnc#888968). - NFSv4: nfs4_stateid_is_current \nshould return 'true' for an invalid stateid (bnc#888968). - One more fix \nfor kABI breakage. - PCI: Lock down BAR access when module security is \nenabled (bnc#884333). - PCI: enable MPS 'performance' setting to properly \nhandle bridge MPS (bnc#883376). - PM / Hibernate: Add memory_rtree_find_bit \nfunction (bnc#860441). - PM / Hibernate: Create a Radix-Tree to store \nmemory bitmap (bnc#860441). - PM / Hibernate: Implement position keeping in \nradix tree (bnc#860441). - PM / Hibernate: Iterate over set bits instead of \nPFNs in swsusp_free() (bnc#860441). - PM / Hibernate: Remove the old \nmemory-bitmap implementation (bnc#860441). - PM / Hibernate: Touch Soft \nLockup Watchdog in rtree_next_node (bnc#860441). - Restrict /dev/mem and \n/dev/kmem when module loading is restricted (bnc#884333). - Reuse existing \n'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). - USB: \nhandle LPM errors during device suspend correctly (bnc#849123). - Update \nkabi files to reflect fscache change (bnc#880344) - Update x86_64 config \nfiles: re-enable SENSORS_W83627EHF (bnc#891281) - VFS: Make more complete \ntruncate operation available to CacheFiles (bnc#880344). - [FEAT NET1222] \nib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). - acpi: \nIgnore acpi_rsdp kernel parameter when module loading is restricted \n(bnc#884333). - af_iucv: correct cleanup if listen backlog is full \n(bnc#885262, LTC#111728). - asus-wmi: Restrict debugfs interface when \nmodule loading is restricted (bnc#884333). - autofs4: allow RCU-walk to \nwalk through autofs4 (bnc#866130). - autofs4: avoid taking fs_lock during \nrcu-walk (bnc#866130). - autofs4: does not take spinlock when not needed in \nautofs4_lookup_expiring (bnc#866130). - autofs4: factor should_expire() out \nof autofs4_expire_indirect (bnc#866130). - autofs4: make \n'autofs4_can_expire' idempotent (bnc#866130). - autofs4: remove a redundant \nassignment (bnc#866130). - autofs: fix lockref lookup (bnc#888591). - \nbe2net: add dma_mapping_error() check for dma_map_page() (bnc#881759). - \nblock: add cond_resched() to potentially long running ioctl discard loop \n(bnc#884725). - block: fix race between request completion and timeout \nhandling (bnc#881051). - cdc-ether: clean packet filter upon probe \n(bnc#876017). - cpuset: Fix memory allocator deadlock (bnc#876590). - \ncrypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs have \nthem, but some are FIPS certified, with some kernel support. - crypto: fips \n- only panic on bad/missing crypto mod signatures (bnc#887503). - crypto: \ntestmgr - allow aesni-intel and ghash_clmulni-intel in fips mode \n(bnc#889451). - dasd: validate request size before building CCW/TCW \n(bnc#891087, LTC#114068). - dm mpath: fix race condition between \nmultipath_dtr and pg_init_done (bnc#826486). - dm-mpath: fix panic on \ndeleting sg device (bnc#870161). - drm/ast: AST2000 cannot be detected \ncorrectly (bnc#895983). - drm/ast: Actually load DP501 firmware when \nrequired (bnc#895608 bnc#871134). - drm/ast: Add missing entry to \ndclk_table[]. - drm/ast: Add reduced non reduced mode parsing for wide \nscreen mode (bnc#892723). - drm/ast: initial DP501 support (v0.2) \n(bnc#871134). - drm/ast: open key before detect chips (bnc#895983). - \ndrm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304). - \ndrm/i915: Only apply DPMS to the encoder if enabled (bnc#893064). - \ndrm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init (bnc#869055). - \ndrm/i915: create functions for the 'unclaimed register' checks \n(bnc#869055). - drm/i915: use FPGA_DBG for the 'unclaimed register' checks \n(bnc#869055). - drm/mgag200: Initialize data needed to map fbdev memory \n(bnc #806990). - e1000e: enable support for new device IDs (bnc#885509). - \nfs/fscache: remove spin_lock() from the condition in while() (bnc#880344). \n- hibernate: Disable in a signed modules environment (bnc#884333). - \nhugetlb: does not use ERR_PTR with VM_FAULT* values - ibmvscsi: Abort init \nsequence during error recovery (bnc#885382). - ibmvscsi: Add memory \nbarriers for send / receive (bnc#885382). - inet: add a redirect generation \nid in inetpeer (bnc#860593). - inetpeer: initialize -\u003eredirect_genid in \ninet_getpeer() (bnc#860593). - ipv6: tcp: fix tcp_v6_conn_request() \n(bnc#887645). - kabi: hide bnc#860593 changes of struct inetpeer_addr_base \n(bnc#860593). - kernel: 3215 tty hang (bnc#891087, LTC#114562). - kernel: \nfix data corruption when reading /proc/sysinfo (bnc#891087, LTC#114480). - \nkernel: fix kernel oops with load of fpc register (bnc#889061, LTC#113596). \n- kernel: sclp console tty reference counting (bnc#891087, LTC#115466). - \nkexec: Disable at runtime if the kernel enforces module loading \nrestrictions (bnc#884333). - md/raid6: avoid data corruption during \nrecovery of double-degraded RAID6. - memcg, vmscan: Fix forced scan of \nanonymous pages (memory reclaim fix). - memcg: do not expose uninitialized \nmem_cgroup_per_node to world (bnc#883096). - mm, hugetlb: add VM_NORESERVE \ncheck in vma_has_reserves() - mm, hugetlb: change variable name \nreservations to resv - mm, hugetlb: decrement reserve count if VM_NORESERVE \nalloc page cache - mm, hugetlb: defer freeing pages when gathering surplus \npages - mm, hugetlb: do not use a page in page cache for cow optimization - \nmm, hugetlb: fix and clean-up node iteration code to alloc or free - mm, \nhugetlb: fix race in region tracking - mm, hugetlb: fix subpool accounting \nhandling - mm, hugetlb: improve page-fault scalability - mm, hugetlb: \nimprove, cleanup resv_map parameters - mm, hugetlb: move up the code which \ncheck availability of free huge page - mm, hugetlb: protect reserved pages \nwhen soft offlining a hugepage - mm, hugetlb: remove \ndecrement_hugepage_resv_vma() - mm, hugetlb: remove redundant list_empty \ncheck in gather_surplus_pages() - mm, hugetlb: remove resv_map_put - mm, \nhugetlb: remove useless check about mapping type - mm, hugetlb: return a \nreserved page to a reserved pool if failed - mm, hugetlb: trivial \ncommenting fix - mm, hugetlb: unify region structure handling - mm, \nhugetlb: unify region structure handling kabi - mm, hugetlb: use long vars \ninstead of int in region_count() (Hugetlb Fault Scalability). - mm, \nhugetlb: use vma_resv_map() map types - mm, oom: fix badness score \nunderflow (bnc#884582, bnc#884767). - mm, oom: normalize oom scores to \noom_score_adj scale only for userspace (bnc#884582, bnc#884767). - mm, thp: \ndo not allow thp faults to avoid cpuset restrictions (bnc#888849). - \nnet/mlx4_core: Load higher level modules according to ports type \n(bnc#887680). - net/mlx4_core: Load the IB driver when the device supports \nIBoE (bnc#887680). - net/mlx4_en: Fix a race between napi poll function and \nRX ring cleanup (bnc#863586). - net/mlx4_en: Fix selftest failing on non \n10G link speed (bnc#888058). - net: fix checksumming features handling in \noutput path (bnc#891259). - pagecache_limit: batch large nr_to_scan targets \n(bnc#895221). - pagecachelimit: reduce lru_lock congestion for heavy \nparallel reclaim fix (bnc#895680). - perf/core: Add weighted samples \n(bnc#876114). - perf/x86: Add flags to event constraints (bnc#876114). - \nperf/x86: Add memory profiling via PEBS Load Latency (bnc#876114). - perf: \nAdd generic memory sampling interface (bnc#876114). - qla2xxx: Avoid \nescalating the SCSI error handler if the command is not found in firmware \n(bnc#859840). - qla2xxx: Clear loop_id for ports that are marked lost \nduring fabric scanning (bnc#859840). - qla2xxx: Does not check for firmware \nhung during the reset context for ISP82XX (bnc#859840). - qla2xxx: Issue \nabort command for outstanding commands during cleanup when only firmware is \nalive (bnc#859840). - qla2xxx: Reduce the time we wait for a command to \ncomplete during SCSI error handling (bnc#859840). - qla2xxx: Set host \ncan_queue value based on available resources (bnc#859840). - restore \nsmp_mb() in unlock_new_inode() (bnc#890526). - s390/pci: introduce lazy \nIOTLB flushing for DMA unmap (bnc#889061, LTC#113725). - sched: fix the \ntheoretical signal_wake_up() vs schedule() race (bnc#876055). - sclp_vt220: \nEnable integrated ASCII console per default (bnc#885262, LTC#112035). - \nscsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614). - \nscsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608). - \nscsiback: correct grant page unmapping. - scsiback: fix retry handling in \n__report_luns(). - scsiback: free resources after error. - sunrpc/auth: \nallow lockless (rcu) lookup of credential cache (bnc#866130). - \nsupported.conf: remove external from drivers/net/veth (bnc#889727) - \nsupported.conf: support net/sched/act_police.ko (bnc#890426) - tcp: adapt \nselected parts of RFC 5682 and PRR logic (bnc#879921). - tg3: Change nvram \ncommand timeout value to 50ms (bnc#855657). - tg3: Override clock, link \naware and link idle mode during NVRAM dump (bnc#855657). - tg3: Set the MAC \nclock to the fastest speed during boot code load (bnc#855657). - usb: Does \nnot enable LPM if the exit latency is zero (bnc#832309). - usbcore: Does \nnot log on consecutive debounce failures of the same port (bnc#888105). - \nusbhid: fix PIXART optical mouse (bnc#888607). - uswsusp: Disable when \nmodule loading is restricted (bnc#884333). - vscsi: support larger transfer \nsizes (bnc#774818). - writeback: Do not sync data dirtied after sync start \n(bnc#833820). - x86 thermal: Delete power-limit-notification console \nmessages (bnc#882317). - x86 thermal: Disable power limit notification \ninterrupt by default (bnc#882317). - x86 thermal: Re-enable power limit \nnotification interrupt by default (bnc#882317). - x86, cpu hotplug: Fix \nstack frame warning in check_irq_vectors_for_cpu_disable() (bnc#887418). - \nx86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847). - x86/UV: Add \nkdump to UV NMI handler (bnc#888847). - x86/UV: Add summary of cpu activity \nto UV NMI handler (bnc#888847). - x86/UV: Move NMI support (bnc#888847). - \nx86/UV: Update UV support for external NMI signals (bnc#888847). - \nx86/uv/nmi: Fix Sparse warnings (bnc#888847). - x86: Add check for number \nof available vectors before CPU down (bnc#887418). - x86: Lock down IO port \naccess when module security is enabled (bnc#884333). - x86: Restrict MSR \naccess when module loading is restricted (bnc#884333).\n\nSecurity Issues:\n\n    * CVE-2013-1979\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979\u003e\n    * CVE-2014-1739\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739\u003e\n    * CVE-2014-2706\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706\u003e\n    * CVE-2014-4027\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027\u003e\n    * CVE-2014-4171\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171\u003e\n    * CVE-2014-4508\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508\u003e\n    * CVE-2014-4667\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667\u003e\n    * CVE-2014-4943\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943\u003e\n    * CVE-2014-5077\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077\u003e\n    * CVE-2014-5471\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471\u003e\n    * CVE-2014-5472\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472\u003e\n    * CVE-2014-3153\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153\u003e\n    * CVE-2014-6410\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410\u003e\n\n","modified":"2026-03-11T05:56:44.307180Z","published":"2014-09-24T00:35:24Z","related":["CVE-2012-2372","CVE-2012-4398","CVE-2013-0160","CVE-2013-1059","CVE-2013-1774","CVE-2013-1819","CVE-2013-1929","CVE-2013-1979","CVE-2013-2146","CVE-2013-2148","CVE-2013-2164","CVE-2013-2206","CVE-2013-2232","CVE-2013-2234","CVE-2013-2237","CVE-2013-2851","CVE-2013-2852","CVE-2013-2889","CVE-2013-2893","CVE-2013-2897","CVE-2013-2899","CVE-2013-2929","CVE-2013-2930","CVE-2013-3076","CVE-2013-3222","CVE-2013-3223","CVE-2013-3224","CVE-2013-3225","CVE-2013-3227","CVE-2013-3228","CVE-2013-3229","CVE-2013-3231","CVE-2013-3232","CVE-2013-3234","CVE-2013-3235","CVE-2013-3301","CVE-2013-4162","CVE-2013-4163","CVE-2013-4299","CVE-2013-4345","CVE-2013-4470","CVE-2013-4483","CVE-2013-4511","CVE-2013-4514","CVE-2013-4515","CVE-2013-4579","CVE-2013-4587","CVE-2013-4592","CVE-2013-6367","CVE-2013-6368","CVE-2013-6376","CVE-2013-6378","CVE-2013-6380","CVE-2013-6382","CVE-2013-6383","CVE-2013-6463","CVE-2013-6885","CVE-2013-7027","CVE-2013-7263","CVE-2013-7264","CVE-2013-7265","CVE-2013-7339","CVE-2014-0055","CVE-2014-0069","CVE-2014-0077","CVE-2014-0101","CVE-2014-0131","CVE-2014-0155","CVE-2014-0181","CVE-2014-0196","CVE-2014-1444","CVE-2014-1445","CVE-2014-1446","CVE-2014-1737","CVE-2014-1738","CVE-2014-1739","CVE-2014-1874","CVE-2014-2309","CVE-2014-2523","CVE-2014-2678","CVE-2014-2706","CVE-2014-2851","CVE-2014-3122","CVE-2014-3144","CVE-2014-3145","CVE-2014-3153","CVE-2014-3181","CVE-2014-3184","CVE-2014-3185","CVE-2014-3186","CVE-2014-3601","CVE-2014-3610","CVE-2014-3646","CVE-2014-3647","CVE-2014-3673","CVE-2014-3687","CVE-2014-3688","CVE-2014-3690","CVE-2014-3917","CVE-2014-4027","CVE-2014-4171","CVE-2014-4508","CVE-2014-4608","CVE-2014-4652","CVE-2014-4653","CVE-2014-4654","CVE-2014-4655","CVE-2014-4656","CVE-2014-4667","CVE-2014-4699","CVE-2014-4943","CVE-2014-5077","CVE-2014-5471","CVE-2014-5472","CVE-2014-6410","CVE-2014-7822","CVE-2014-7826","CVE-2014-7841","CVE-2014-7842","CVE-2014-7970","CVE-2014-8086","CVE-2014-8133","CVE-2014-8134","CVE-2014-8159","CVE-2014-8160","CVE-2014-8369","CVE-2014-8559","CVE-2014-8709","CVE-2014-8884","CVE-2014-9090","CVE-2014-9322","CVE-2014-9419","CVE-2014-9420","CVE-2014-9529","CVE-2014-9584","CVE-2014-9585","CVE-2014-9683","CVE-2015-0777","CVE-2015-1421","CVE-2015-1593","CVE-2015-2041","CVE-2015-2042","CVE-2015-2150","CVE-2015-2830","CVE-2015-2922","CVE-2015-3331","CVE-2015-3339","CVE-2015-3636"],"upstream":["CVE-2012-2372","CVE-2012-4398","CVE-2013-0160","CVE-2013-1059","CVE-2013-1774","CVE-2013-1819","CVE-2013-1929","CVE-2013-1979","CVE-2013-2146","CVE-2013-2148","CVE-2013-2164","CVE-2013-2206","CVE-2013-2232","CVE-2013-2234","CVE-2013-2237","CVE-2013-2851","CVE-2013-2852","CVE-2013-2889","CVE-2013-2893","CVE-2013-2897","CVE-2013-2899","CVE-2013-2929","CVE-2013-2930","CVE-2013-3076","CVE-2013-3222","CVE-2013-3223","CVE-2013-3224","CVE-2013-3225","CVE-2013-3227","CVE-2013-3228","CVE-2013-3229","CVE-2013-3231","CVE-2013-3232","CVE-2013-3234","CVE-2013-3235","CVE-2013-3301","CVE-2013-4162","CVE-2013-4163","CVE-2013-4299","CVE-2013-4345","CVE-2013-4470","CVE-2013-4483","CVE-2013-4511","CVE-2013-4514","CVE-2013-4515","CVE-2013-4579","CVE-2013-4587","CVE-2013-4592","CVE-2013-6367","CVE-2013-6368","CVE-2013-6376","CVE-2013-6378","CVE-2013-6380","CVE-2013-6382","CVE-2013-6383","CVE-2013-6463","CVE-2013-6885","CVE-2013-7027","CVE-2013-7263","CVE-2013-7264","CVE-2013-7265","CVE-2013-7339","CVE-2014-0055","CVE-2014-0069","CVE-2014-0077","CVE-2014-0101","CVE-2014-0131","CVE-2014-0155","CVE-2014-0181","CVE-2014-0196","CVE-2014-1444","CVE-2014-1445","CVE-2014-1446","CVE-2014-1737","CVE-2014-1738","CVE-2014-1739","CVE-2014-1874","CVE-2014-2309","CVE-2014-2523","CVE-2014-2678","CVE-2014-2706","CVE-2014-2851","CVE-2014-3122","CVE-2014-3144","CVE-2014-3145","CVE-2014-3153","CVE-2014-3181","CVE-2014-3184","CVE-2014-3185","CVE-2014-3186","CVE-2014-3601","CVE-2014-3610","CVE-2014-3646","CVE-2014-3647","CVE-2014-3673","CVE-2014-3687","CVE-2014-3688","CVE-2014-3690","CVE-2014-3917","CVE-2014-4027","CVE-2014-4171","CVE-2014-4508","CVE-2014-4608","CVE-2014-4652","CVE-2014-4653","CVE-2014-4654","CVE-2014-4655","CVE-2014-4656","CVE-2014-4667","CVE-2014-4699","CVE-2014-4943","CVE-2014-5077","CVE-2014-5471","CVE-2014-5472","CVE-2014-6410","CVE-2014-7822","CVE-2014-7826","CVE-2014-7841","CVE-2014-7842","CVE-2014-7970","CVE-2014-8086","CVE-2014-8133","CVE-2014-8134","CVE-2014-8159","CVE-2014-8160","CVE-2014-8369","CVE-2014-8559","CVE-2014-8709","CVE-2014-8884","CVE-2014-9090","CVE-2014-9322","CVE-2014-9419","CVE-2014-9420","CVE-2014-9529","CVE-2014-9584","CVE-2014-9585","CVE-2014-9683","CVE-2015-0777","CVE-2015-1421","CVE-2015-1593","CVE-2015-2041","CVE-2015-2042","CVE-2015-2150","CVE-2015-2830","CVE-2015-2922","CVE-2015-3331","CVE-2015-3339","CVE-2015-3636"],"references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement//suse-ru-20150621-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/599263"},{"type":"REPORT","url":"https://bugzilla.suse.com/708296"},{"type":"REPORT","url":"https://bugzilla.suse.com/733022"},{"type":"REPORT","url":"https://bugzilla.suse.com/745640"},{"type":"REPORT","url":"https://bugzilla.suse.com/755743"},{"type":"REPORT","url":"https://bugzilla.suse.com/760407"},{"type":"REPORT","url":"https://bugzilla.suse.com/763463"},{"type":"REPORT","url":"https://bugzilla.suse.com/763968"},{"type":"REPORT","url":"https://bugzilla.suse.com/765523"},{"type":"REPORT","url":"https://bugzilla.suse.com/767610"},{"type":"REPORT","url":"https://bugzilla.suse.com/769035"},{"type":"REPORT","url":"https://bugzilla.suse.com/769644"},{"type":"REPORT","url":"https://bugzilla.suse.com/770541"},{"type":"REPORT","url":"https://bugzilla.suse.com/771619"},{"type":"REPORT","url":"https://bugzilla.suse.com/773006"},{"type":"REPORT","url":"https://bugzilla.suse.com/773255"},{"type":"REPORT","url":"https://bugzilla.suse.com/773837"},{"type":"REPORT","url":"https://bugzilla.suse.com/774818"},{"type":"REPORT","url":"https://bugzilla.suse.com/779488"},{"type":"REPORT","url":"https://bugzilla.suse.com/783475"},{"type":"REPORT","url":"https://bugzilla.suse.com/785901"},{"type":"REPORT","url":"https://bugzilla.suse.com/786450"},{"type":"REPORT","url":"https://bugzilla.suse.com/787843"},{"type":"REPORT","url":"https://bugzilla.suse.com/789010"},{"type":"REPORT","url":"https://bugzilla.suse.com/789359"},{"type":"REPORT","url":"https://bugzilla.suse.com/792271"},{"type":"REPORT","url":"https://bugzilla.suse.com/793727"},{"type":"REPORT","url":"https://bugzilla.suse.com/794824"},{"type":"REPORT","url":"https://bugzilla.suse.com/797090"},{"type":"REPORT","url":"https://bugzilla.suse.com/797526"},{"type":"REPORT","url":"https://bugzilla.suse.com/797727"},{"type":"REPORT","url":"https://bugzilla.suse.com/797909"},{"type":"REPORT","url":"https://bugzilla.suse.com/798050"},{"type":"REPORT","url":"https://bugzilla.suse.com/800255"},{"type":"REPORT","url":"https://bugzilla.suse.com/800875"},{"type":"REPORT","url":"https://bugzilla.suse.com/801341"},{"type":"REPORT","url":"https://bugzilla.suse.com/801427"},{"type":"REPORT","url":"https://bugzilla.suse.com/803320"},{"type":"REPORT","url":"https://bugzilla.suse.com/804482"},{"type":"REPORT","url":"https://bugzilla.suse.com/804609"},{"type":"REPORT","url":"https://bugzilla.suse.com/804950"},{"type":"REPORT","url":"https://bugzilla.suse.com/805114"},{"type":"REPORT","url":"https://bugzilla.suse.com/805371"},{"type":"REPORT","url":"https://bugzilla.suse.com/805740"},{"type":"REPORT","url":"https://bugzilla.suse.com/805804"},{"type":"REPORT","url":"https://bugzilla.suse.com/806396"},{"type":"REPORT","url":"https://bugzilla.suse.com/806976"},{"type":"REPORT","url":"https://bugzilla.suse.com/806988"},{"type":"REPORT","url":"https://bugzilla.suse.com/806990"},{"type":"REPORT","url":"https://bugzilla.suse.com/807434"},{"type":"REPORT","url":"https://bugzilla.suse.com/807471"},{"type":"REPORT","url":"https://bugzilla.suse.com/807502"},{"type":"REPORT","url":"https://bugzilla.suse.com/808015"},{"type":"REPORT","url":"https://bugzilla.suse.com/808079"},{"type":"REPORT","url":"https://bugzilla.suse.com/808136"},{"type":"REPORT","url":"https://bugzilla.suse.com/808837"},{"type":"REPORT","url":"https://bugzilla.suse.com/808855"},{"type":"REPORT","url":"https://bugzilla.suse.com/808940"},{"type":"REPORT","url":"https://bugzilla.suse.com/809122"},{"type":"REPORT","url":"https://bugzilla.suse.com/809130"},{"type":"REPORT","url":"https://bugzilla.suse.com/809463"},{"type":"REPORT","url":"https://bugzilla.suse.com/809895"},{"type":"REPORT","url":"https://bugzilla.suse.com/809975"},{"type":"REPORT","url":"https://bugzilla.suse.com/810323"},{"type":"REPORT","url":"https://bugzilla.suse.com/810722"},{"type":"REPORT","url":"https://bugzilla.suse.com/812274"},{"type":"REPORT","url":"https://bugzilla.suse.com/812281"},{"type":"REPORT","url":"https://bugzilla.suse.com/812332"},{"type":"REPORT","url":"https://bugzilla.suse.com/812526"},{"type":"REPORT","url":"https://bugzilla.suse.com/812974"},{"type":"REPORT","url":"https://bugzilla.suse.com/813245"},{"type":"REPORT","url":"https://bugzilla.suse.com/813604"},{"type":"REPORT","url":"https://bugzilla.suse.com/813733"},{"type":"REPORT","url":"https://bugzilla.suse.com/813922"},{"type":"REPORT","url":"https://bugzilla.suse.com/814336"},{"type":"REPORT","url":"https://bugzilla.suse.com/815256"},{"type":"REPORT","url":"https://bugzilla.suse.com/815320"},{"type":"REPORT","url":"https://bugzilla.suse.com/815356"},{"type":"REPORT","url":"https://bugzilla.suse.com/816043"},{"type":"REPORT","url":"https://bugzilla.suse.com/816099"},{"type":"REPORT","url":"https://bugzilla.suse.com/816451"},{"type":"REPORT","url":"https://bugzilla.suse.com/816708"},{"type":"REPORT","url":"https://bugzilla.suse.com/817035"},{"type":"REPORT","url":"https://bugzilla.suse.com/817377"},{"type":"REPORT","url":"https://bugzilla.suse.com/818047"},{"type":"REPORT","url":"https://bugzilla.suse.com/818064"},{"type":"REPORT","url":"https://bugzilla.suse.com/818371"},{"type":"REPORT","url":"https://bugzilla.suse.com/818465"},{"type":"REPORT","url":"https://bugzilla.suse.com/818545"},{"type":"REPORT","url":"https://bugzilla.suse.com/819018"},{"type":"REPORT","url":"https://bugzilla.suse.com/819195"},{"type":"REPORT","url":"https://bugzilla.suse.com/819363"},{"type":"REPORT","url":"https://bugzilla.suse.com/819523"},{"type":"REPORT","url":"https://bugzilla.suse.com/819610"},{"type":"REPORT","url":"https://bugzilla.suse.com/819655"},{"type":"REPORT","url":"https://bugzilla.suse.com/819979"},{"type":"REPORT","url":"https://bugzilla.suse.com/820102"},{"type":"REPORT","url":"https://bugzilla.suse.com/820172"},{"type":"REPORT","url":"https://bugzilla.suse.com/820338"},{"type":"REPORT","url":"https://bugzilla.suse.com/820434"},{"type":"REPORT","url":"https://bugzilla.suse.com/820848"},{"type":"REPORT","url":"https://bugzilla.suse.com/821052"},{"type":"REPORT","url":"https://bugzilla.suse.com/821070"},{"type":"REPORT","url":"https://bugzilla.suse.com/821235"},{"type":"REPORT","url":"https://bugzilla.suse.com/821259"},{"type":"REPORT","url":"https://bugzilla.suse.com/821465"},{"type":"REPORT","url":"https://bugzilla.suse.com/821619"},{"type":"REPORT","url":"https://bugzilla.suse.com/821799"},{"type":"REPORT","url":"https://bugzilla.suse.com/821859"},{"type":"REPORT","url":"https://bugzilla.suse.com/821930"},{"type":"REPORT","url":"https://bugzilla.suse.com/821948"},{"type":"REPORT","url":"https://bugzilla.suse.com/821980"},{"type":"REPORT","url":"https://bugzilla.suse.com/822052"},{"type":"REPORT","url":"https://bugzilla.suse.com/822066"},{"type":"REPORT","url":"https://bugzilla.suse.com/822077"},{"type":"REPORT","url":"https://bugzilla.suse.com/822080"},{"type":"REPORT","url":"https://bugzilla.suse.com/822164"},{"type":"REPORT","url":"https://bugzilla.suse.com/822225"},{"type":"REPORT","url":"https://bugzilla.suse.com/822340"},{"type":"REPORT","url":"https://bugzilla.suse.com/822431"},{"type":"REPORT","url":"https://bugzilla.suse.com/822433"},{"type":"REPORT","url":"https://bugzilla.suse.com/822575"},{"type":"REPORT","url":"https://bugzilla.suse.com/822579"},{"type":"REPORT","url":"https://bugzilla.suse.com/822722"},{"type":"REPORT","url":"https://bugzilla.suse.com/822825"},{"type":"REPORT","url":"https://bugzilla.suse.com/822878"},{"type":"REPORT","url":"https://bugzilla.suse.com/823082"},{"type":"REPORT","url":"https://bugzilla.suse.com/823223"},{"type":"REPORT","url":"https://bugzilla.suse.com/823342"},{"type":"REPORT","url":"https://bugzilla.suse.com/823386"},{"type":"REPORT","url":"https://bugzilla.suse.com/823517"},{"type":"REPORT","url":"https://bugzilla.suse.com/823597"},{"type":"REPORT","url":"https://bugzilla.suse.com/823618"},{"type":"REPORT","url":"https://bugzilla.suse.com/823795"},{"type":"REPORT","url":"https://bugzilla.suse.com/824159"},{"type":"REPORT","url":"https://bugzilla.suse.com/824256"},{"type":"REPORT","url":"https://bugzilla.suse.com/824295"},{"type":"REPORT","url":"https://bugzilla.suse.com/824568"},{"type":"REPORT","url":"https://bugzilla.suse.com/824915"},{"type":"REPORT","url":"https://bugzilla.suse.com/825006"},{"type":"REPORT","url":"https://bugzilla.suse.com/825037"},{"type":"REPORT","url":"https://bugzilla.suse.com/825048"},{"type":"REPORT","url":"https://bugzilla.suse.com/825142"},{"type":"REPORT","url":"https://bugzilla.suse.com/825227"},{"type":"REPORT","url":"https://bugzilla.suse.com/825291"},{"type":"REPORT","url":"https://bugzilla.suse.com/825591"},{"type":"REPORT","url":"https://bugzilla.suse.com/825657"},{"type":"REPORT","url":"https://bugzilla.suse.com/825696"},{"type":"REPORT","url":"https://bugzilla.suse.com/825887"},{"type":"REPORT","url":"https://bugzilla.suse.com/825896"},{"type":"REPORT","url":"https://bugzilla.suse.com/826102"},{"type":"REPORT","url":"https://bugzilla.suse.com/826186"},{"type":"REPORT","url":"https://bugzilla.suse.com/826350"},{"type":"REPORT","url":"https://bugzilla.suse.com/826486"},{"type":"REPORT","url":"https://bugzilla.suse.com/826602"},{"type":"REPORT","url":"https://bugzilla.suse.com/826756"},{"type":"REPORT","url":"https://bugzilla.suse.com/826960"},{"type":"REPORT","url":"https://bugzilla.suse.com/826978"},{"type":"REPORT","url":"https://bugzilla.suse.com/827246"},{"type":"REPORT","url":"https://bugzilla.suse.com/827271"},{"type":"REPORT","url":"https://bugzilla.suse.com/827372"},{"type":"REPORT","url":"https://bugzilla.suse.com/827376"},{"type":"REPORT","url":"https://bugzilla.suse.com/827378"},{"type":"REPORT","url":"https://bugzilla.suse.com/827416"},{"type":"REPORT","url":"https://bugzilla.suse.com/827527"},{"type":"REPORT","url":"https://bugzilla.suse.com/827670"},{"type":"REPORT","url":"https://bugzilla.suse.com/827749"},{"type":"REPORT","url":"https://bugzilla.suse.com/827750"},{"type":"REPORT","url":"https://bugzilla.suse.com/827767"},{"type":"REPORT","url":"https://bugzilla.suse.com/827930"},{"type":"REPORT","url":"https://bugzilla.suse.com/827966"},{"type":"REPORT","url":"https://bugzilla.suse.com/828087"},{"type":"REPORT","url":"https://bugzilla.suse.com/828119"},{"type":"REPORT","url":"https://bugzilla.suse.com/828192"},{"type":"REPORT","url":"https://bugzilla.suse.com/828236"},{"type":"REPORT","url":"https://bugzilla.suse.com/828265"},{"type":"REPORT","url":"https://bugzilla.suse.com/828574"},{"type":"REPORT","url":"https://bugzilla.suse.com/828714"},{"type":"REPORT","url":"https://bugzilla.suse.com/828886"},{"type":"REPORT","url":"https://bugzilla.suse.com/828894"},{"type":"REPORT","url":"https://bugzilla.suse.com/828914"},{"type":"REPORT","url":"https://bugzilla.suse.com/829001"},{"type":"REPORT","url":"https://bugzilla.suse.com/829082"},{"type":"REPORT","url":"https://bugzilla.suse.com/829110"},{"type":"REPORT","url":"https://bugzilla.suse.com/829357"},{"type":"REPORT","url":"https://bugzilla.suse.com/829539"},{"type":"REPORT","url":"https://bugzilla.suse.com/829622"},{"type":"REPORT","url":"https://bugzilla.suse.com/829682"},{"type":"REPORT","url":"https://bugzilla.suse.com/830346"},{"type":"REPORT","url":"https://bugzilla.suse.com/830478"},{"type":"REPORT","url":"https://bugzilla.suse.com/830766"},{"type":"REPORT","url":"https://bugzilla.suse.com/830822"},{"type":"REPORT","url":"https://bugzilla.suse.com/830901"},{"type":"REPORT","url":"https://bugzilla.suse.com/830985"},{"type":"REPORT","url":"https://bugzilla.suse.com/831029"},{"type":"REPORT","url":"https://bugzilla.suse.com/831055"},{"type":"REPORT","url":"https://bugzilla.suse.com/831058"},{"type":"REPORT","url":"https://bugzilla.suse.com/831103"},{"type":"REPORT","url":"https://bugzilla.suse.com/831143"},{"type":"REPORT","url":"https://bugzilla.suse.com/831380"},{"type":"REPORT","url":"https://bugzilla.suse.com/831410"},{"type":"REPORT","url":"https://bugzilla.suse.com/831422"},{"type":"REPORT","url":"https://bugzilla.suse.com/831424"},{"type":"REPORT","url":"https://bugzilla.suse.com/831438"},{"type":"REPORT","url":"https://bugzilla.suse.com/831623"},{"type":"REPORT","url":"https://bugzilla.suse.com/831949"},{"type":"REPORT","url":"https://bugzilla.suse.com/832292"},{"type":"REPORT","url":"https://bugzilla.suse.com/832309"},{"type":"REPORT","url":"https://bugzilla.suse.com/832318"},{"type":"REPORT","url":"https://bugzilla.suse.com/832710"},{"type":"REPORT","url":"https://bugzilla.suse.com/833073"},{"type":"REPORT","url":"https://bugzilla.suse.com/833097"},{"type":"REPORT","url":"https://bugzilla.suse.com/833148"},{"type":"REPORT","url":"https://bugzilla.suse.com/833151"},{"type":"REPORT","url":"https://bugzilla.suse.com/833321"},{"type":"REPORT","url":"https://bugzilla.suse.com/833588"},{"type":"REPORT","url":"https://bugzilla.suse.com/833635"},{"type":"REPORT","url":"https://bugzilla.suse.com/833820"},{"type":"REPORT","url":"https://bugzilla.suse.com/833858"},{"type":"REPORT","url":"https://bugzilla.suse.com/833968"},{"type":"REPORT","url":"https://bugzilla.suse.com/834116"},{"type":"REPORT","url":"https://bugzilla.suse.com/834204"},{"type":"REPORT","url":"https://bugzilla.suse.com/834473"},{"type":"REPORT","url":"https://bugzilla.suse.com/834600"},{"type":"REPORT","url":"https://bugzilla.suse.com/834647"},{"type":"REPORT","url":"https://bugzilla.suse.com/834708"},{"type":"REPORT","url":"https://bugzilla.suse.com/834742"},{"type":"REPORT","url":"https://bugzilla.suse.com/834808"},{"type":"REPORT","url":"https://bugzilla.suse.com/834905"},{"type":"REPORT","url":"https://bugzilla.suse.com/835074"},{"type":"REPORT","url":"https://bugzilla.suse.com/835094"},{"type":"REPORT","url":"https://bugzilla.suse.com/835175"},{"type":"REPORT","url":"https://bugzilla.suse.com/835186"},{"type":"REPORT","url":"https://bugzilla.suse.com/835189"},{"type":"REPORT","url":"https://bugzilla.suse.com/835684"},{"type":"REPORT","url":"https://bugzilla.suse.com/835839"},{"type":"REPORT","url":"https://bugzilla.suse.com/835930"},{"type":"REPORT","url":"https://bugzilla.suse.com/836218"},{"type":"REPORT","url":"https://bugzilla.suse.com/836347"},{"type":"REPORT","url":"https://bugzilla.suse.com/836718"},{"type":"REPORT","url":"https://bugzilla.suse.com/836801"},{"type":"REPORT","url":"https://bugzilla.suse.com/837206"},{"type":"REPORT","url":"https://bugzilla.suse.com/837372"},{"type":"REPORT","url":"https://bugzilla.suse.com/837563"},{"type":"REPORT","url":"https://bugzilla.suse.com/837596"},{"type":"REPORT","url":"https://bugzilla.suse.com/837739"},{"type":"REPORT","url":"https://bugzilla.suse.com/837741"},{"type":"REPORT","url":"https://bugzilla.suse.com/837803"},{"type":"REPORT","url":"https://bugzilla.suse.com/838346"},{"type":"REPORT","url":"https://bugzilla.suse.com/838448"},{"type":"REPORT","url":"https://bugzilla.suse.com/838623"},{"type":"REPORT","url":"https://bugzilla.suse.com/839407"},{"type":"REPORT","url":"https://bugzilla.suse.com/839973"},{"type":"REPORT","url":"https://bugzilla.suse.com/840116"},{"type":"REPORT","url":"https://bugzilla.suse.com/840226"},{"type":"REPORT","url":"https://bugzilla.suse.com/840524"},{"type":"REPORT","url":"https://bugzilla.suse.com/840830"},{"type":"REPORT","url":"https://bugzilla.suse.com/841050"},{"type":"REPORT","url":"https://bugzilla.suse.com/841094"},{"type":"REPORT","url":"https://bugzilla.suse.com/841402"},{"type":"REPORT","url":"https://bugzilla.suse.com/841445"},{"type":"REPORT","url":"https://bugzilla.suse.com/841498"},{"type":"REPORT","url":"https://bugzilla.suse.com/841654"},{"type":"REPORT","url":"https://bugzilla.suse.com/841656"},{"type":"REPORT","url":"https://bugzilla.suse.com/842057"},{"type":"REPORT","url":"https://bugzilla.suse.com/842063"},{"type":"REPORT","url":"https://bugzilla.suse.com/842239"},{"type":"REPORT","url":"https://bugzilla.suse.com/842604"},{"type":"REPORT","url":"https://bugzilla.suse.com/842820"},{"type":"REPORT","url":"https://bugzilla.suse.com/843185"},{"type":"REPORT","url":"https://bugzilla.suse.com/843419"},{"type":"REPORT","url":"https://bugzilla.suse.com/843429"},{"type":"REPORT","url":"https://bugzilla.suse.com/843445"},{"type":"REPORT","url":"https://bugzilla.suse.com/843642"},{"type":"REPORT","url":"https://bugzilla.suse.com/843645"},{"type":"REPORT","url":"https://bugzilla.suse.com/843654"},{"type":"REPORT","url":"https://bugzilla.suse.com/843732"},{"type":"REPORT","url":"https://bugzilla.suse.com/843753"},{"type":"REPORT","url":"https://bugzilla.suse.com/843950"},{"type":"REPORT","url":"https://bugzilla.suse.com/844513"},{"type":"REPORT","url":"https://bugzilla.suse.com/845352"},{"type":"REPORT","url":"https://bugzilla.suse.com/845378"},{"type":"REPORT","url":"https://bugzilla.suse.com/845621"},{"type":"REPORT","url":"https://bugzilla.suse.com/845729"},{"type":"REPORT","url":"https://bugzilla.suse.com/846036"},{"type":"REPORT","url":"https://bugzilla.suse.com/846298"},{"type":"REPORT","url":"https://bugzilla.suse.com/846404"},{"type":"REPORT","url":"https://bugzilla.suse.com/846654"},{"type":"REPORT","url":"https://bugzilla.suse.com/846656"},{"type":"REPORT","url":"https://bugzilla.suse.com/846690"},{"type":"REPORT","url":"https://bugzilla.suse.com/846790"},{"type":"REPORT","url":"https://bugzilla.suse.com/846984"},{"type":"REPORT","url":"https://bugzilla.suse.com/846989"},{"type":"REPORT","url":"https://bugzilla.suse.com/847261"},{"type":"REPORT","url":"https://bugzilla.suse.com/847319"},{"type":"REPORT","url":"https://bugzilla.suse.com/847652"},{"type":"REPORT","url":"https://bugzilla.suse.com/847660"},{"type":"REPORT","url":"https://bugzilla.suse.com/847672"},{"type":"REPORT","url":"https://bugzilla.suse.com/847721"},{"type":"REPORT","url":"https://bugzilla.suse.com/847842"},{"type":"REPORT","url":"https://bugzilla.suse.com/848055"},{"type":"REPORT","url":"https://bugzilla.suse.com/848317"},{"type":"REPORT","url":"https://bugzilla.suse.com/848321"},{"type":"REPORT","url":"https://bugzilla.suse.com/848335"},{"type":"REPORT","url":"https://bugzilla.suse.com/848336"},{"type":"REPORT","url":"https://bugzilla.suse.com/848544"},{"type":"REPORT","url":"https://bugzilla.suse.com/848652"},{"type":"REPORT","url":"https://bugzilla.suse.com/848864"},{"type":"REPORT","url":"https://bugzilla.suse.com/849021"},{"type":"REPORT","url":"https://bugzilla.suse.com/849029"},{"type":"REPORT","url":"https://bugzilla.suse.com/849034"},{"type":"REPORT","url":"https://bugzilla.suse.com/849123"},{"type":"REPORT","url":"https://bugzilla.suse.com/849256"},{"type":"REPORT","url":"https://bugzilla.suse.com/849362"},{"type":"REPORT","url":"https://bugzilla.suse.com/849364"},{"type":"REPORT","url":"https://bugzilla.suse.com/849404"},{"type":"REPORT","url":"https://bugzilla.suse.com/849675"},{"type":"REPORT","url":"https://bugzilla.suse.com/849809"},{"type":"REPORT","url":"https://bugzilla.suse.com/849855"},{"type":"REPORT","url":"https://bugzilla.suse.com/849950"},{"type":"REPORT","url":"https://bugzilla.suse.com/850072"},{"type":"REPORT","url":"https://bugzilla.suse.com/850103"},{"type":"REPORT","url":"https://bugzilla.suse.com/850324"},{"type":"REPORT","url":"https://bugzilla.suse.com/850493"},{"type":"REPORT","url":"https://bugzilla.suse.com/850640"},{"type":"REPORT","url":"https://bugzilla.suse.com/850915"},{"type":"REPORT","url":"https://bugzilla.suse.com/851066"},{"type":"REPORT","url":"https://bugzilla.suse.com/851101"},{"type":"REPORT","url":"https://bugzilla.suse.com/851290"},{"type":"REPORT","url":"https://bugzilla.suse.com/851314"},{"type":"REPORT","url":"https://bugzilla.suse.com/851426"},{"type":"REPORT","url":"https://bugzilla.suse.com/851603"},{"type":"REPORT","url":"https://bugzilla.suse.com/851879"},{"type":"REPORT","url":"https://bugzilla.suse.com/852153"},{"type":"REPORT","url":"https://bugzilla.suse.com/852373"},{"type":"REPORT","url":"https://bugzilla.suse.com/852488"},{"type":"REPORT","url":"https://bugzilla.suse.com/852553"},{"type":"REPORT","url":"https://bugzilla.suse.com/852558"},{"type":"REPORT","url":"https://bugzilla.suse.com/852559"},{"type":"REPORT","url":"https://bugzilla.suse.com/852624"},{"type":"REPORT","url":"https://bugzilla.suse.com/852652"},{"type":"REPORT","url":"https://bugzilla.suse.com/852761"},{"type":"REPORT","url":"https://bugzilla.suse.com/852967"},{"type":"REPORT","url":"https://bugzilla.suse.com/853040"},{"type":"REPORT","url":"https://bugzilla.suse.com/853050"},{"type":"REPORT","url":"https://bugzilla.suse.com/853051"},{"type":"REPORT","url":"https://bugzilla.suse.com/853052"},{"type":"REPORT","url":"https://bugzilla.suse.com/853053"},{"type":"REPORT","url":"https://bugzilla.suse.com/853162"},{"type":"REPORT","url":"https://bugzilla.suse.com/853166"},{"type":"REPORT","url":"https://bugzilla.suse.com/853428"},{"type":"REPORT","url":"https://bugzilla.suse.com/853455"},{"type":"REPORT","url":"https://bugzilla.suse.com/853465"},{"type":"REPORT","url":"https://bugzilla.suse.com/854025"},{"type":"REPORT","url":"https://bugzilla.suse.com/854445"},{"type":"REPORT","url":"https://bugzilla.suse.com/854516"},{"type":"REPORT","url":"https://bugzilla.suse.com/854546"},{"type":"REPORT","url":"https://bugzilla.suse.com/854634"},{"type":"REPORT","url":"https://bugzilla.suse.com/854722"},{"type":"REPORT","url":"https://bugzilla.suse.com/855126"},{"type":"REPORT","url":"https://bugzilla.suse.com/855657"},{"type":"REPORT","url":"https://bugzilla.suse.com/855825"},{"type":"REPORT","url":"https://bugzilla.suse.com/856307"},{"type":"REPORT","url":"https://bugzilla.suse.com/856481"},{"type":"REPORT","url":"https://bugzilla.suse.com/856760"},{"type":"REPORT","url":"https://bugzilla.suse.com/856848"},{"type":"REPORT","url":"https://bugzilla.suse.com/857358"},{"type":"REPORT","url":"https://bugzilla.suse.com/857643"},{"type":"REPORT","url":"https://bugzilla.suse.com/857926"},{"type":"REPORT","url":"https://bugzilla.suse.com/858534"},{"type":"REPORT","url":"https://bugzilla.suse.com/858604"},{"type":"REPORT","url":"https://bugzilla.suse.com/858831"},{"type":"REPORT","url":"https://bugzilla.suse.com/858869"},{"type":"REPORT","url":"https://bugzilla.suse.com/858870"},{"type":"REPORT","url":"https://bugzilla.suse.com/858872"},{"type":"REPORT","url":"https://bugzilla.suse.com/859225"},{"type":"REPORT","url":"https://bugzilla.suse.com/859342"},{"type":"REPORT","url":"https://bugzilla.suse.com/859840"},{"type":"REPORT","url":"https://bugzilla.suse.com/860441"},{"type":"REPORT","url":"https://bugzilla.suse.com/860593"},{"type":"REPORT","url":"https://bugzilla.suse.com/861093"},{"type":"REPORT","url":"https://bugzilla.suse.com/861636"},{"type":"REPORT","url":"https://bugzilla.suse.com/861980"},{"type":"REPORT","url":"https://bugzilla.suse.com/862429"},{"type":"REPORT","url":"https://bugzilla.suse.com/862796"},{"type":"REPORT","url":"https://bugzilla.suse.com/862934"},{"type":"REPORT","url":"https://bugzilla.suse.com/862957"},{"type":"REPORT","url":"https://bugzilla.suse.com/863178"},{"type":"REPORT","url":"https://bugzilla.suse.com/863300"},{"type":"REPORT","url":"https://bugzilla.suse.com/863335"},{"type":"REPORT","url":"https://bugzilla.suse.com/863410"},{"type":"REPORT","url":"https://bugzilla.suse.com/863526"},{"type":"REPORT","url":"https://bugzilla.suse.com/863586"},{"type":"REPORT","url":"https://bugzilla.suse.com/863873"},{"type":"REPORT","url":"https://bugzilla.suse.com/864025"},{"type":"REPORT","url":"https://bugzilla.suse.com/864058"},{"type":"REPORT","url":"https://bugzilla.suse.com/864401"},{"type":"REPORT","url":"https://bugzilla.suse.com/864404"},{"type":"REPORT","url":"https://bugzilla.suse.com/864409"},{"type":"REPORT","url":"https://bugzilla.suse.com/864411"},{"type":"REPORT","url":"https://bugzilla.suse.com/864464"},{"type":"REPORT","url":"https://bugzilla.suse.com/864833"},{"type":"REPORT","url":"https://bugzilla.suse.com/864880"},{"type":"REPORT","url":"https://bugzilla.suse.com/865310"},{"type":"REPORT","url":"https://bugzilla.suse.com/865330"},{"type":"REPORT","url":"https://bugzilla.suse.com/865342"},{"type":"REPORT","url":"https://bugzilla.suse.com/865419"},{"type":"REPORT","url":"https://bugzilla.suse.com/865783"},{"type":"REPORT","url":"https://bugzilla.suse.com/865882"},{"type":"REPORT","url":"https://bugzilla.suse.com/866081"},{"type":"REPORT","url":"https://bugzilla.suse.com/866102"},{"type":"REPORT","url":"https://bugzilla.suse.com/866130"},{"type":"REPORT","url":"https://bugzilla.suse.com/866253"},{"type":"REPORT","url":"https://bugzilla.suse.com/866428"},{"type":"REPORT","url":"https://bugzilla.suse.com/866615"},{"type":"REPORT","url":"https://bugzilla.suse.com/866800"},{"type":"REPORT","url":"https://bugzilla.suse.com/866864"},{"type":"REPORT","url":"https://bugzilla.suse.com/866911"},{"type":"REPORT","url":"https://bugzilla.suse.com/867362"},{"type":"REPORT","url":"https://bugzilla.suse.com/867517"},{"type":"REPORT","url":"https://bugzilla.suse.com/867531"},{"type":"REPORT","url":"https://bugzilla.suse.com/867723"},{"type":"REPORT","url":"https://bugzilla.suse.com/867953"},{"type":"REPORT","url":"https://bugzilla.suse.com/868049"},{"type":"REPORT","url":"https://bugzilla.suse.com/868488"},{"type":"REPORT","url":"https://bugzilla.suse.com/868528"},{"type":"REPORT","url":"https://bugzilla.suse.com/868653"},{"type":"REPORT","url":"https://bugzilla.suse.com/868748"},{"type":"REPORT","url":"https://bugzilla.suse.com/869033"},{"type":"REPORT","url":"https://bugzilla.suse.com/869055"},{"type":"REPORT","url":"https://bugzilla.suse.com/869414"},{"type":"REPORT","url":"https://bugzilla.suse.com/869563"},{"type":"REPORT","url":"https://bugzilla.suse.com/869934"},{"type":"REPORT","url":"https://bugzilla.suse.com/870161"},{"type":"REPORT","url":"https://bugzilla.suse.com/870173"},{"type":"REPORT","url":"https://bugzilla.suse.com/870335"},{"type":"REPORT","url":"https://bugzilla.suse.com/870450"},{"type":"REPORT","url":"https://bugzilla.suse.com/870496"},{"type":"REPORT","url":"https://bugzilla.suse.com/870498"},{"type":"REPORT","url":"https://bugzilla.suse.com/870576"},{"type":"REPORT","url":"https://bugzilla.suse.com/870591"},{"type":"REPORT","url":"https://bugzilla.suse.com/870618"},{"type":"REPORT","url":"https://bugzilla.suse.com/870801"},{"type":"REPORT","url":"https://bugzilla.suse.com/870877"},{"type":"REPORT","url":"https://bugzilla.suse.com/870958"},{"type":"REPORT","url":"https://bugzilla.suse.com/871134"},{"type":"REPORT","url":"https://bugzilla.suse.com/871561"},{"type":"REPORT","url":"https://bugzilla.suse.com/871634"},{"type":"REPORT","url":"https://bugzilla.suse.com/871676"},{"type":"REPORT","url":"https://bugzilla.suse.com/871728"},{"type":"REPORT","url":"https://bugzilla.suse.com/871797"},{"type":"REPORT","url":"https://bugzilla.suse.com/871854"},{"type":"REPORT","url":"https://bugzilla.suse.com/871861"},{"type":"REPORT","url":"https://bugzilla.suse.com/871899"},{"type":"REPORT","url":"https://bugzilla.suse.com/872188"},{"type":"REPORT","url":"https://bugzilla.suse.com/872540"},{"type":"REPORT","url":"https://bugzilla.suse.com/872634"},{"type":"REPORT","url":"https://bugzilla.suse.com/873061"},{"type":"REPORT","url":"https://bugzilla.suse.com/873228"},{"type":"REPORT","url":"https://bugzilla.suse.com/873374"},{"type":"REPORT","url":"https://bugzilla.suse.com/873463"},{"type":"REPORT","url":"https://bugzilla.suse.com/874108"},{"type":"REPORT","url":"https://bugzilla.suse.com/874145"},{"type":"REPORT","url":"https://bugzilla.suse.com/874440"},{"type":"REPORT","url":"https://bugzilla.suse.com/874577"},{"type":"REPORT","url":"https://bugzilla.suse.com/875051"},{"type":"REPORT","url":"https://bugzilla.suse.com/875386"},{"type":"REPORT","url":"https://bugzilla.suse.com/875690"},{"type":"REPORT","url":"https://bugzilla.suse.com/875798"},{"type":"REPORT","url":"https://bugzilla.suse.com/876017"},{"type":"REPORT","url":"https://bugzilla.suse.com/876055"},{"type":"REPORT","url":"https://bugzilla.suse.com/876086"},{"type":"REPORT","url":"https://bugzilla.suse.com/876102"},{"type":"REPORT","url":"https://bugzilla.suse.com/876114"},{"type":"REPORT","url":"https://bugzilla.suse.com/876176"},{"type":"REPORT","url":"https://bugzilla.suse.com/876463"},{"type":"REPORT","url":"https://bugzilla.suse.com/876590"},{"type":"REPORT","url":"https://bugzilla.suse.com/876594"},{"type":"REPORT","url":"https://bugzilla.suse.com/876633"},{"type":"REPORT","url":"https://bugzilla.suse.com/877013"},{"type":"REPORT","url":"https://bugzilla.suse.com/877257"},{"type":"REPORT","url":"https://bugzilla.suse.com/877456"},{"type":"REPORT","url":"https://bugzilla.suse.com/877497"},{"type":"REPORT","url":"https://bugzilla.suse.com/877593"},{"type":"REPORT","url":"https://bugzilla.suse.com/877775"},{"type":"REPORT","url":"https://bugzilla.suse.com/878115"},{"type":"REPORT","url":"https://bugzilla.suse.com/878123"},{"type":"REPORT","url":"https://bugzilla.suse.com/878274"},{"type":"REPORT","url":"https://bugzilla.suse.com/878407"},{"type":"REPORT","url":"https://bugzilla.suse.com/878509"},{"type":"REPORT","url":"https://bugzilla.suse.com/879304"},{"type":"REPORT","url":"https://bugzilla.suse.com/879921"},{"type":"REPORT","url":"https://bugzilla.suse.com/879957"},{"type":"REPORT","url":"https://bugzilla.suse.com/880007"},{"type":"REPORT","url":"https://bugzilla.suse.com/880344"},{"type":"REPORT","url":"https://bugzilla.suse.com/880357"},{"type":"REPORT","url":"https://bugzilla.suse.com/880370"},{"type":"REPORT","url":"https://bugzilla.suse.com/880437"},{"type":"REPORT","url":"https://bugzilla.suse.com/880484"},{"type":"REPORT","url":"https://bugzilla.suse.com/880892"},{"type":"REPORT","url":"https://bugzilla.suse.com/881051"},{"type":"REPORT","url":"https://bugzilla.suse.com/881571"},{"type":"REPORT","url":"https://bugzilla.suse.com/881759"},{"type":"REPORT","url":"https://bugzilla.suse.com/881761"},{"type":"REPORT","url":"https://bugzilla.suse.com/881939"},{"type":"REPORT","url":"https://bugzilla.suse.com/882317"},{"type":"REPORT","url":"https://bugzilla.suse.com/882324"},{"type":"REPORT","url":"https://bugzilla.suse.com/882470"},{"type":"REPORT","url":"https://bugzilla.suse.com/882639"},{"type":"REPORT","url":"https://bugzilla.suse.com/882804"},{"type":"REPORT","url":"https://bugzilla.suse.com/882900"},{"type":"REPORT","url":"https://bugzilla.suse.com/883096"},{"type":"REPORT","url":"https://bugzilla.suse.com/883376"},{"type":"REPORT","url":"https://bugzilla.suse.com/883380"},{"type":"REPORT","url":"https://bugzilla.suse.com/883518"},{"type":"REPORT","url":"https://bugzilla.suse.com/883724"},{"type":"REPORT","url":"https://bugzilla.suse.com/883795"},{"type":"REPORT","url":"https://bugzilla.suse.com/883948"},{"type":"REPORT","url":"https://bugzilla.suse.com/884333"},{"type":"REPORT","url":"https://bugzilla.suse.com/884582"},{"type":"REPORT","url":"https://bugzilla.suse.com/884725"},{"type":"REPORT","url":"https://bugzilla.suse.com/884767"},{"type":"REPORT","url":"https://bugzilla.suse.com/884817"},{"type":"REPORT","url":"https://bugzilla.suse.com/885077"},{"type":"REPORT","url":"https://bugzilla.suse.com/885262"},{"type":"REPORT","url":"https://bugzilla.suse.com/885382"},{"type":"REPORT","url":"https://bugzilla.suse.com/885422"},{"type":"REPORT","url":"https://bugzilla.suse.com/885509"},{"type":"REPORT","url":"https://bugzilla.suse.com/885725"},{"type":"REPORT","url":"https://bugzilla.suse.com/886840"},{"type":"REPORT","url":"https://bugzilla.suse.com/887082"},{"type":"REPORT","url":"https://bugzilla.suse.com/887418"},{"type":"REPORT","url":"https://bugzilla.suse.com/887503"},{"type":"REPORT","url":"https://bugzilla.suse.com/887597"},{"type":"REPORT","url":"https://bugzilla.suse.com/887608"},{"type":"REPORT","url":"https://bugzilla.suse.com/887645"},{"type":"REPORT","url":"https://bugzilla.suse.com/887680"},{"type":"REPORT","url":"https://bugzilla.suse.com/888058"},{"type":"REPORT","url":"https://bugzilla.suse.com/888105"},{"type":"REPORT","url":"https://bugzilla.suse.com/888591"},{"type":"REPORT","url":"https://bugzilla.suse.com/888607"},{"type":"REPORT","url":"https://bugzilla.suse.com/888847"},{"type":"REPORT","url":"https://bugzilla.suse.com/888849"},{"type":"REPORT","url":"https://bugzilla.suse.com/888968"},{"type":"REPORT","url":"https://bugzilla.suse.com/889061"},{"type":"REPORT","url":"https://bugzilla.suse.com/889173"},{"type":"REPORT","url":"https://bugzilla.suse.com/889221"},{"type":"REPORT","url":"https://bugzilla.suse.com/889451"},{"type":"REPORT","url":"https://bugzilla.suse.com/889614"},{"type":"REPORT","url":"https://bugzilla.suse.com/889727"},{"type":"REPORT","url":"https://bugzilla.suse.com/890297"},{"type":"REPORT","url":"https://bugzilla.suse.com/890426"},{"type":"REPORT","url":"https://bugzilla.suse.com/890513"},{"type":"REPORT","url":"https://bugzilla.suse.com/890526"},{"type":"REPORT","url":"https://bugzilla.suse.com/891087"},{"type":"REPORT","url":"https://bugzilla.suse.com/891211"},{"type":"REPORT","url":"https://bugzilla.suse.com/891212"},{"type":"REPORT","url":"https://bugzilla.suse.com/891259"},{"type":"REPORT","url":"https://bugzilla.suse.com/891277"},{"type":"REPORT","url":"https://bugzilla.suse.com/891281"},{"type":"REPORT","url":"https://bugzilla.suse.com/891368"},{"type":"REPORT","url":"https://bugzilla.suse.com/891619"},{"type":"REPORT","url":"https://bugzilla.suse.com/891641"},{"type":"REPORT","url":"https://bugzilla.suse.com/891746"},{"type":"REPORT","url":"https://bugzilla.suse.com/891790"},{"type":"REPORT","url":"https://bugzilla.suse.com/892200"},{"type":"REPORT","url":"https://bugzilla.suse.com/892490"},{"type":"REPORT","url":"https://bugzilla.suse.com/892723"},{"type":"REPORT","url":"https://bugzilla.suse.com/892782"},{"type":"REPORT","url":"https://bugzilla.suse.com/893064"},{"type":"REPORT","url":"https://bugzilla.suse.com/893496"},{"type":"REPORT","url":"https://bugzilla.suse.com/893596"},{"type":"REPORT","url":"https://bugzilla.suse.com/893758"},{"type":"REPORT","url":"https://bugzilla.suse.com/894058"},{"type":"REPORT","url":"https://bugzilla.suse.com/894200"},{"type":"REPORT","url":"https://bugzilla.suse.com/894213"},{"type":"REPORT","url":"https://bugzilla.suse.com/894895"},{"type":"REPORT","url":"https://bugzilla.suse.com/895221"},{"type":"REPORT","url":"https://bugzilla.suse.com/895387"},{"type":"REPORT","url":"https://bugzilla.suse.com/895468"},{"type":"REPORT","url":"https://bugzilla.suse.com/895608"},{"type":"REPORT","url":"https://bugzilla.suse.com/895680"},{"type":"REPORT","url":"https://bugzilla.suse.com/895841"},{"type":"REPORT","url":"https://bugzilla.suse.com/895983"},{"type":"REPORT","url":"https://bugzilla.suse.com/896382"},{"type":"REPORT","url":"https://bugzilla.suse.com/896390"},{"type":"REPORT","url":"https://bugzilla.suse.com/896391"},{"type":"REPORT","url":"https://bugzilla.suse.com/896392"},{"type":"REPORT","url":"https://bugzilla.suse.com/896415"},{"type":"REPORT","url":"https://bugzilla.suse.com/896484"},{"type":"REPORT","url":"https://bugzilla.suse.com/896689"},{"type":"REPORT","url":"https://bugzilla.suse.com/897502"},{"type":"REPORT","url":"https://bugzilla.suse.com/897694"},{"type":"REPORT","url":"https://bugzilla.suse.com/897708"},{"type":"REPORT","url":"https://bugzilla.suse.com/898295"},{"type":"REPORT","url":"https://bugzilla.suse.com/898375"},{"type":"REPORT","url":"https://bugzilla.suse.com/898554"},{"type":"REPORT","url":"https://bugzilla.suse.com/899192"},{"type":"REPORT","url":"https://bugzilla.suse.com/899574"},{"type":"REPORT","url":"https://bugzilla.suse.com/899843"},{"type":"REPORT","url":"https://bugzilla.suse.com/900279"},{"type":"REPORT","url":"https://bugzilla.suse.com/900644"},{"type":"REPORT","url":"https://bugzilla.suse.com/900881"},{"type":"REPORT","url":"https://bugzilla.suse.com/901638"},{"type":"REPORT","url":"https://bugzilla.suse.com/902232"},{"type":"REPORT","url":"https://bugzilla.suse.com/902286"},{"type":"REPORT","url":"https://bugzilla.suse.com/902346"},{"type":"REPORT","url":"https://bugzilla.suse.com/902349"},{"type":"REPORT","url":"https://bugzilla.suse.com/902351"},{"type":"REPORT","url":"https://bugzilla.suse.com/902675"},{"type":"REPORT","url":"https://bugzilla.suse.com/903096"},{"type":"REPORT","url":"https://bugzilla.suse.com/903331"},{"type":"REPORT","url":"https://bugzilla.suse.com/903640"},{"type":"REPORT","url":"https://bugzilla.suse.com/903653"},{"type":"REPORT","url":"https://bugzilla.suse.com/904013"},{"type":"REPORT","url":"https://bugzilla.suse.com/904053"},{"type":"REPORT","url":"https://bugzilla.suse.com/904242"},{"type":"REPORT","url":"https://bugzilla.suse.com/904358"},{"type":"REPORT","url":"https://bugzilla.suse.com/904659"},{"type":"REPORT","url":"https://bugzilla.suse.com/904671"},{"type":"REPORT","url":"https://bugzilla.suse.com/904700"},{"type":"REPORT","url":"https://bugzilla.suse.com/904883"},{"type":"REPORT","url":"https://bugzilla.suse.com/904901"},{"type":"REPORT","url":"https://bugzilla.suse.com/905100"},{"type":"REPORT","url":"https://bugzilla.suse.com/905304"},{"type":"REPORT","url":"https://bugzilla.suse.com/905312"},{"type":"REPORT","url":"https://bugzilla.suse.com/905522"},{"type":"REPORT","url":"https://bugzilla.suse.com/905799"},{"type":"REPORT","url":"https://bugzilla.suse.com/906027"},{"type":"REPORT","url":"https://bugzilla.suse.com/906586"},{"type":"REPORT","url":"https://bugzilla.suse.com/907196"},{"type":"REPORT","url":"https://bugzilla.suse.com/907338"},{"type":"REPORT","url":"https://bugzilla.suse.com/907551"},{"type":"REPORT","url":"https://bugzilla.suse.com/907611"},{"type":"REPORT","url":"https://bugzilla.suse.com/907818"},{"type":"REPORT","url":"https://bugzilla.suse.com/908069"},{"type":"REPORT","url":"https://bugzilla.suse.com/908163"},{"type":"REPORT","url":"https://bugzilla.suse.com/908393"},{"type":"REPORT","url":"https://bugzilla.suse.com/908550"},{"type":"REPORT","url":"https://bugzilla.suse.com/908551"},{"type":"REPORT","url":"https://bugzilla.suse.com/908572"},{"type":"REPORT","url":"https://bugzilla.suse.com/908706"},{"type":"REPORT","url":"https://bugzilla.suse.com/908825"},{"type":"REPORT","url":"https://bugzilla.suse.com/909077"},{"type":"REPORT","url":"https://bugzilla.suse.com/909078"},{"type":"REPORT","url":"https://bugzilla.suse.com/909088"},{"type":"REPORT","url":"https://bugzilla.suse.com/909092"},{"type":"REPORT","url":"https://bugzilla.suse.com/909093"},{"type":"REPORT","url":"https://bugzilla.suse.com/909095"},{"type":"REPORT","url":"https://bugzilla.suse.com/909264"},{"type":"REPORT","url":"https://bugzilla.suse.com/909309"},{"type":"REPORT","url":"https://bugzilla.suse.com/909312"},{"type":"REPORT","url":"https://bugzilla.suse.com/909477"},{"type":"REPORT","url":"https://bugzilla.suse.com/909565"},{"type":"REPORT","url":"https://bugzilla.suse.com/909684"},{"type":"REPORT","url":"https://bugzilla.suse.com/909740"},{"type":"REPORT","url":"https://bugzilla.suse.com/909846"},{"type":"REPORT","url":"https://bugzilla.suse.com/910013"},{"type":"REPORT","url":"https://bugzilla.suse.com/910150"},{"type":"REPORT","url":"https://bugzilla.suse.com/910159"},{"type":"REPORT","url":"https://bugzilla.suse.com/910251"},{"type":"REPORT","url":"https://bugzilla.suse.com/910321"},{"type":"REPORT","url":"https://bugzilla.suse.com/910322"},{"type":"REPORT","url":"https://bugzilla.suse.com/910517"},{"type":"REPORT","url":"https://bugzilla.suse.com/911181"},{"type":"REPORT","url":"https://bugzilla.suse.com/911325"},{"type":"REPORT","url":"https://bugzilla.suse.com/911326"},{"type":"REPORT","url":"https://bugzilla.suse.com/912171"},{"type":"REPORT","url":"https://bugzilla.suse.com/912202"},{"type":"REPORT","url":"https://bugzilla.suse.com/912705"},{"type":"REPORT","url":"https://bugzilla.suse.com/912741"},{"type":"REPORT","url":"https://bugzilla.suse.com/913059"},{"type":"REPORT","url":"https://bugzilla.suse.com/913080"},{"type":"REPORT","url":"https://bugzilla.suse.com/913598"},{"type":"REPORT","url":"https://bugzilla.suse.com/914355"},{"type":"REPORT","url":"https://bugzilla.suse.com/914423"},{"type":"REPORT","url":"https://bugzilla.suse.com/914726"},{"type":"REPORT","url":"https://bugzilla.suse.com/914742"},{"type":"REPORT","url":"https://bugzilla.suse.com/914818"},{"type":"REPORT","url":"https://bugzilla.suse.com/914987"},{"type":"REPORT","url":"https://bugzilla.suse.com/915045"},{"type":"REPORT","url":"https://bugzilla.suse.com/915200"},{"type":"REPORT","url":"https://bugzilla.suse.com/915209"},{"type":"REPORT","url":"https://bugzilla.suse.com/915322"},{"type":"REPORT","url":"https://bugzilla.suse.com/915335"},{"type":"REPORT","url":"https://bugzilla.suse.com/915577"},{"type":"REPORT","url":"https://bugzilla.suse.com/915791"},{"type":"REPORT","url":"https://bugzilla.suse.com/915826"},{"type":"REPORT","url":"https://bugzilla.suse.com/916515"},{"type":"REPORT","url":"https://bugzilla.suse.com/916521"},{"type":"REPORT","url":"https://bugzilla.suse.com/916848"},{"type":"REPORT","url":"https://bugzilla.suse.com/916982"},{"type":"REPORT","url":"https://bugzilla.suse.com/917093"},{"type":"REPORT","url":"https://bugzilla.suse.com/917120"},{"type":"REPORT","url":"https://bugzilla.suse.com/917648"},{"type":"REPORT","url":"https://bugzilla.suse.com/917684"},{"type":"REPORT","url":"https://bugzilla.suse.com/917830"},{"type":"REPORT","url":"https://bugzilla.suse.com/917839"},{"type":"REPORT","url":"https://bugzilla.suse.com/917884"},{"type":"REPORT","url":"https://bugzilla.suse.com/918333"},{"type":"REPORT","url":"https://bugzilla.suse.com/919007"},{"type":"REPORT","url":"https://bugzilla.suse.com/919018"},{"type":"REPORT","url":"https://bugzilla.suse.com/919357"},{"type":"REPORT","url":"https://bugzilla.suse.com/919463"},{"type":"REPORT","url":"https://bugzilla.suse.com/919589"},{"type":"REPORT","url":"https://bugzilla.suse.com/919682"},{"type":"REPORT","url":"https://bugzilla.suse.com/919808"},{"type":"REPORT","url":"https://bugzilla.suse.com/920250"},{"type":"REPORT","url":"https://bugzilla.suse.com/921769"},{"type":"REPORT","url":"https://bugzilla.suse.com/922583"},{"type":"REPORT","url":"https://bugzilla.suse.com/923344"},{"type":"REPORT","url":"https://bugzilla.suse.com/924142"},{"type":"REPORT","url":"https://bugzilla.suse.com/924271"},{"type":"REPORT","url":"https://bugzilla.suse.com/924282"},{"type":"REPORT","url":"https://bugzilla.suse.com/924333"},{"type":"REPORT","url":"https://bugzilla.suse.com/924340"},{"type":"REPORT","url":"https://bugzilla.suse.com/925012"},{"type":"REPORT","url":"https://bugzilla.suse.com/925370"},{"type":"REPORT","url":"https://bugzilla.suse.com/925443"},{"type":"REPORT","url":"https://bugzilla.suse.com/925567"},{"type":"REPORT","url":"https://bugzilla.suse.com/925729"},{"type":"REPORT","url":"https://bugzilla.suse.com/926016"},{"type":"REPORT","url":"https://bugzilla.suse.com/926240"},{"type":"REPORT","url":"https://bugzilla.suse.com/926439"},{"type":"REPORT","url":"https://bugzilla.suse.com/926767"},{"type":"REPORT","url":"https://bugzilla.suse.com/927190"},{"type":"REPORT","url":"https://bugzilla.suse.com/927257"},{"type":"REPORT","url":"https://bugzilla.suse.com/927262"},{"type":"REPORT","url":"https://bugzilla.suse.com/927338"},{"type":"REPORT","url":"https://bugzilla.suse.com/928122"},{"type":"REPORT","url":"https://bugzilla.suse.com/928130"},{"type":"REPORT","url":"https://bugzilla.suse.com/928142"},{"type":"REPORT","url":"https://bugzilla.suse.com/928333"},{"type":"REPORT","url":"https://bugzilla.suse.com/928970"},{"type":"REPORT","url":"https://bugzilla.suse.com/929145"},{"type":"REPORT","url":"https://bugzilla.suse.com/929148"},{"type":"REPORT","url":"https://bugzilla.suse.com/929283"},{"type":"REPORT","url":"https://bugzilla.suse.com/929525"},{"type":"REPORT","url":"https://bugzilla.suse.com/929647"},{"type":"REPORT","url":"https://bugzilla.suse.com/930145"},{"type":"REPORT","url":"https://bugzilla.suse.com/930171"},{"type":"REPORT","url":"https://bugzilla.suse.com/930226"},{"type":"REPORT","url":"https://bugzilla.suse.com/930284"},{"type":"REPORT","url":"https://bugzilla.suse.com/930401"},{"type":"REPORT","url":"https://bugzilla.suse.com/930669"},{"type":"REPORT","url":"https://bugzilla.suse.com/930786"},{"type":"REPORT","url":"https://bugzilla.suse.com/930788"},{"type":"REPORT","url":"https://bugzilla.suse.com/931014"},{"type":"REPORT","url":"https://bugzilla.suse.com/931015"},{"type":"REPORT","url":"https://bugzilla.suse.com/931850"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2012-2372"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2012-4398"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-0160"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-1059"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-1774"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-1819"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-1929"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-1979"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-2146"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-2148"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-2164"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-2206"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-2232"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-2234"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-2237"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-2851"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-2852"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-2889"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-2893"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-2897"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-2899"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-2929"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-2930"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-3076"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-3222"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-3223"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-3224"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-3225"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-3227"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-3228"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-3229"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-3231"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-3232"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-3234"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-3235"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-3301"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-4162"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-4163"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-4299"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-4345"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-4470"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-4483"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-4511"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-4514"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-4515"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-4579"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-4587"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-4592"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-6367"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-6368"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-6376"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-6378"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-6380"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-6382"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-6383"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-6463"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-6885"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-7027"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-7263"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-7264"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-7265"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-7339"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-0055"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-0069"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-0077"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-0101"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-0131"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-0155"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-0181"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-0196"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-1444"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-1445"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-1446"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-1737"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-1738"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-1739"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-1874"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-2309"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-2523"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-2678"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-2706"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-2851"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-3122"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-3144"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-3145"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-3153"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-3181"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-3184"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-3185"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-3186"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-3601"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-3610"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-3646"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-3647"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-3673"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-3687"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-3688"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-3690"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-3917"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-4027"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-4171"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-4508"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-4608"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-4652"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-4653"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-4654"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-4655"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-4656"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-4667"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-4699"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-4943"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-5077"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-5471"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-5472"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-6410"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-7822"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-7826"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-7841"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-7842"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-7970"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-8086"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-8133"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-8134"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-8159"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-8160"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-8369"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-8559"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-8709"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-8884"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-9090"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-9322"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-9419"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-9420"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-9529"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-9584"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-9585"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-9683"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-0777"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-1421"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-1593"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-2041"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-2042"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-2150"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-2830"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-2922"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-3331"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-3339"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-3636"}],"schema_version":"1.7.5"}