SUSE-SU-2016:2912-1: An update that solves 11 vulnerabilities and has 111 fixes is now available.
Category: security (important) Bug References: 1000189,1000287,1000304,1000776,1001419,1001486,1002165,1003079,1003153,1003400,1003568,1003866,1003925,1003964,1004252,1004462,1004517,1004520,1005666,1006691,1007615,1007886,744692,772786,789311,857397,860441,865545,866130,868923,874131,876463,898675,904489,909994,911687,915183,921338,921784,922064,922634,924381,924384,930399,931454,934067,937086,937888,940545,941420,946309,955446,956514,959463,961257,962846,966864,967640,970943,971975,971989,974406,974620,975596,975772,976195,977687,978094,979451,979928,982783,983619,984194,984419,984779,984992,985562,986445,987192,987333,987542,987565,987621,987805,988440,988617,988715,989152,989953,990245,991247,991608,991665,992244,992555,992591,992593,992712,993392,993841,993890,993891,994296,994438,994520,994748,995153,995968,996664,997059,997299,997708,997896,998689,998795,998825,999577,999584,999600,999779,999907,999932 CVE References: CVE-2015-8956,CVE-2016-5696,CVE-2016-6130,CVE-2016-6327,CVE-2016-6480,CVE-2016-6828,CVE-2016-7042,CVE-2016-7097,CVE-2016-7425,CVE-2016-8658,CVE-2016-8666 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP1 (src): kernel-default-3.12.67-60.64.18.1 SUSE Linux Enterprise Software Development Kit 12-SP1 (src): kernel-docs-3.12.67-60.64.18.3, kernel-obs-build-3.12.67-60.64.18.1 SUSE Linux Enterprise Server 12-SP1 (src): kernel-default-3.12.67-60.64.18.1, kernel-source-3.12.67-60.64.18.1, kernel-syms-3.12.67-60.64.18.1, kernel-xen-3.12.67-60.64.18.1 SUSE Linux Enterprise Module for Public Cloud 12 (src): kernel-ec2-3.12.67-60.64.18.1 SUSE Linux Enterprise Live Patching 12 (src): kgraft-patch-SLE12-SP1_Update_9-1-6.3 SUSE Linux Enterprise Desktop 12-SP1 (src): kernel-default-3.12.67-60.64.18.1, kernel-source-3.12.67-60.64.18.1, kernel-syms-3.12.67-60.64.18.1, kernel-xen-3.12.67-60.64.18.1
SUSE-SU- 2016:2912- 1: An update that solves 11 vulnerabilities and has 111 fixes is now available.
Category: security (important) 1000287, 1000304, 1000776, 1001419, 1001486, 1002165, 1003079, 1003153, 1003400, 1003568, 1003866, 1003925, 1003964, 1004252, 1004462, 1004517, 1004520, 1005666, 1006691, 1007615, 1007886, 744692, 772786, 789311, 857397, 860441, 865545, 866130, 868923, 874131, 876463, 898675, 904489, 909994, 911687, 915183, 921338, 921784, 922064, 922634, 924381, 924384, 930399, 931454, 934067, 937086, 937888, 940545, 941420, 946309, 955446, 956514, 959463, 961257, 962846, 966864, 967640, 970943, 971975, 971989, 974406, 974620, 975596, 975772, 976195, 977687, 978094, 979451, 979928, 982783, 983619, 984194, 984419, 984779, 984992, 985562, 986445, 987192, 987333, 987542, 987565, 987621, 987805, 988440, 988617, 988715, 989152, 989953, 990245, 991247, 991608, 991665, 992244, 992555, 992591, 992593, 992712, 993392, 993841, 993890, 993891, 994296, 994438, 994520, 994748, 995153, 995968, 996664, 997059, 997299, 997708, 997896, 998689, 998795, 998825, 999577, 999584, 999600, 999779, 999907, 999932 8956,CVE- 2016-5696, CVE-2016- 6130,CVE- 2016-6327, CVE-2016- 6480,CVE- 2016-6828, CVE-2016- 7042,CVE- 2016-7097, CVE-2016- 7425,CVE- 2016-8658, CVE-2016- 8666 default- 3.12.67- 60.64.18. 1 docs-3. 12.67-60. 64.18.3, kernel- obs-build- 3.12.67- 60.64.18. 1 default- 3.12.67- 60.64.18. 1, kernel- source- 3.12.67- 60.64.18. 1, kernel- syms-3. 12.67-60. 64.18.1, kernel- xen-3.12. 67-60.64. 18.1 ec2-3.12. 67-60.64. 18.1 patch-SLE12- SP1_Update_ 9-1-6.3 default- 3.12.67- 60.64.18. 1, kernel- source- 3.12.67- 60.64.18. 1, kernel- syms-3. 12.67-60. 64.18.1, kernel- xen-3.12. 67-60.64. 18.1
Bug References: 1000189,
CVE References: CVE-2015-
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP1 (src): kernel-
SUSE Linux Enterprise Software Development Kit 12-SP1 (src): kernel-
SUSE Linux Enterprise Server 12-SP1 (src): kernel-
SUSE Linux Enterprise Module for Public Cloud 12 (src): kernel-
SUSE Linux Enterprise Live Patching 12 (src): kgraft-
SUSE Linux Enterprise Desktop 12-SP1 (src): kernel-