{"affected":[{"ecosystem_specific":{"binaries":[{"kgraft-patch-3_12_61-52_128-default":"2-2.1","kgraft-patch-3_12_61-52_128-xen":"2-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12-LTSS","name":"kgraft-patch-SLE12_Update_34","purl":"pkg:rpm/suse/kgraft-patch-SLE12_Update_34&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2-2.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for the Linux Kernel 3.12.61-52_128 fixes one issue.\n\nThe following security issue was fixed:\n\n- CVE-2018-1000199: - CVE-2018-1000199: An address corruption flaw was discovered while modifying a h/w breakpoint via 'modify_user_hw_breakpoint' routine, an unprivileged user/process could use this flaw to crash the system kernel resulting in DoS OR to potentially escalate privileges on a the system. (bsc#1090036).\n","id":"SUSE-SU-2018:1525-1","modified":"2018-06-05T15:37:27Z","published":"2018-06-05T15:37:27Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20181525-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1090036"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-1000199"}],"related":["CVE-2018-1000199"],"summary":"Security update for the Linux Kernel (Live Patch 34 for SLE 12)","upstream":["CVE-2018-1000199"]}