CVE-2014-00691
CVE-2014-00691, security advisory, novell, suse linux, suse, security, cve

CVE-2014-00691

Common Vulnerabilities and Exposures

[Previous] [Index] [Next]

Upstream information

CVE-2014-00691 at MITRE

Description

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having low severity.

No SUSE Bugzilla entries cross referenced.

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Desktop 12
SUSE Linux Enterprise Desktop 12 SP1
SUSE Linux Enterprise Desktop 12 SP2
SUSE Linux Enterprise Desktop 12 SP3
SUSE Linux Enterprise Desktop 12 SP4
SUSE Linux Enterprise High Availability 12 SP2
SUSE Linux Enterprise High Availability 12 SP3
SUSE Linux Enterprise High Availability 12 SP4
SUSE Linux Enterprise High Availability 15
SUSE Linux Enterprise Module for Basesystem 15
SUSE Linux Enterprise Module for Development Tools 15
SUSE Linux Enterprise Module for Legacy Software 15
SUSE Linux Enterprise Module for Live Patching 15
SUSE Linux Enterprise Server 11 SP4
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server 12 SP1
SUSE Linux Enterprise Server 12 SP2
SUSE Linux Enterprise Server 12 SP3
SUSE Linux Enterprise Server 12 SP4
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
SUSE Linux Enterprise Software Development Kit 11 SP4
SUSE Linux Enterprise Software Development Kit 12
SUSE Linux Enterprise Software Development Kit 12 SP1
SUSE Linux Enterprise Software Development Kit 12 SP2
SUSE Linux Enterprise Software Development Kit 12 SP3
SUSE Linux Enterprise Software Development Kit 12 SP4
SUSE Linux Enterprise Workstation Extension 12
SUSE Linux Enterprise Workstation Extension 12 SP1
SUSE Linux Enterprise Workstation Extension 12 SP2
SUSE Linux Enterprise Workstation Extension 12 SP3
SUSE Linux Enterprise Workstation Extension 12 SP4
SUSE Linux Enterprise Workstation Extension 15
openSUSE Leap 15.0
  • kernel-default >= 4.12.14-lp150.11.4
  • kernel-vanilla-base >= 4.12.14-lp150.11.4
Patchnames:
openSUSE Leap 15.0 GA kernel-default
openSUSE Leap 42.1
  • kernel-default >= 4.1.12-1.1
  • kernel-default-devel >= 4.1.12-1.1
  • kernel-devel >= 4.1.12-1.1
  • kernel-docs >= 4.1.12-1.1
  • kernel-macros >= 4.1.12-1.1
  • kernel-pv-devel >= 4.1.12-1.1
  • kernel-source >= 4.1.12-1.1
  • kernel-syms >= 4.1.12-1.1
  • kernel-xen >= 4.1.12-1.1
  • kernel-xen-devel >= 4.1.12-1.1
Patchnames:
openSUSE Leap 42.1 GA kernel-default
openSUSE Leap 42.2
  • kernel-default >= 4.4.27-2.1
  • kernel-default-devel >= 4.4.27-2.1
  • kernel-devel >= 4.4.27-2.1
  • kernel-docs >= 4.4.27-2.1
  • kernel-macros >= 4.4.27-2.1
  • kernel-source >= 4.4.27-2.1
  • kernel-syms >= 4.4.27-2.1
Patchnames:
openSUSE Leap 42.2 GA kernel-default
openSUSE Leap 42.3
  • kernel-default >= 4.4.76-1.1
  • kernel-default-devel >= 4.4.76-1.1
  • kernel-devel >= 4.4.76-1.1
  • kernel-docs >= 4.4.76-1.1
  • kernel-macros >= 4.4.76-1.1
  • kernel-source >= 4.4.76-1.1
  • kernel-syms >= 4.4.76-1.1
Patchnames:
openSUSE Leap 42.3 GA kernel-default
openSUSE Tumbleweed
  • kernel-debug >= 4.8.13-1.1
  • kernel-debug-base >= 4.8.13-1.1
  • kernel-debug-devel >= 4.8.13-1.1
  • kernel-default >= 4.8.13-1.1
  • kernel-default-base >= 4.8.13-1.1
  • kernel-default-devel >= 4.8.13-1.1
  • kernel-devel >= 4.8.13-1.1
  • kernel-docs >= 4.8.13-1.1
  • kernel-docs-html >= 4.8.13-1.1
  • kernel-docs-pdf >= 4.8.13-1.1
  • kernel-macros >= 4.8.13-1.1
  • kernel-obs-build >= 4.8.13-1.1
  • kernel-obs-qa >= 4.8.13-1.1
  • kernel-pae >= 4.8.13-1.1
  • kernel-pae-base >= 4.8.13-1.1
  • kernel-pae-devel >= 4.8.13-1.1
  • kernel-source >= 4.8.13-1.1
  • kernel-source-vanilla >= 4.8.13-1.1
  • kernel-syms >= 4.8.13-1.1
  • kernel-syzkaller >= 4.8.13-1.1
  • kernel-syzkaller-base >= 4.8.13-1.1
  • kernel-syzkaller-devel >= 4.8.13-1.1
  • kernel-vanilla >= 4.8.13-1.1
  • kernel-vanilla-base >= 4.8.13-1.1
  • kernel-vanilla-devel >= 4.8.13-1.1
Patchnames:
openSUSE Tumbleweed GA kernel-debug