Upstream information
Description
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2015-1197. Reason: This candidate is a duplicate of CVE-2015-1197. Notes: All CVE users should reference CVE-2015-1197 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having moderate severity.
SUSE | |
---|---|
Base Score | 4.4 |
Vector | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L |
Access Vector | Local |
Access Complexity | Low |
Privileges Required | None |
User Interaction | Required |
Scope | Unchanged |
Confidentiality Impact | None |
Integrity Impact | Low |
Availability Impact | Low |
CVSSv3 Version | 3 |
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
Product(s) | Source package | State |
---|---|---|
Magnum Orchestration | cpio | Not affected |
SUSE Container as a Service Platform 2.0 | cpio | Not affected |
SUSE Linux Enterprise Desktop 12 SP2 | cpio | Affected |
SUSE Linux Enterprise Desktop 12 SP3 | cpio | Not affected |
SUSE Linux Enterprise Server 11 SP3 LTSS | cpio | Not affected |
SUSE Linux Enterprise Server 11 SP4 | cpio | Not affected |
SUSE Linux Enterprise Server 12 LTSS | cpio | Not affected |
SUSE Linux Enterprise Server 12 SP1 LTSS | cpio | Not affected |
SUSE Linux Enterprise Server 12 SP2 | cpio | Not affected |
SUSE Linux Enterprise Server 12 SP3 | cpio | Not affected |