{"affected":[{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_103-92_53-default":"11-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"kgraft-patch-SLE12-SP2_Update_16","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_16&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"11-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_103-92_56-default":"11-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"kgraft-patch-SLE12-SP2_Update_17","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_17&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"11-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_90-92_50-default":"12-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"kgraft-patch-SLE12-SP2_Update_15","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_15&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"12-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_103-92_53-default":"11-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"kgraft-patch-SLE12-SP2_Update_16","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_16&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"11-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_103-92_56-default":"11-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"kgraft-patch-SLE12-SP2_Update_17","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_17&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"11-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_90-92_50-default":"12-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"kgraft-patch-SLE12-SP2_Update_15","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_15&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"12-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_103-92_53-default":"11-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"kgraft-patch-SLE12-SP2_Update_16","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_16&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"11-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_103-92_56-default":"11-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"kgraft-patch-SLE12-SP2_Update_17","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_17&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"11-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_90-92_50-default":"12-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"kgraft-patch-SLE12-SP2_Update_15","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_15&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"12-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_103-92_53-default":"11-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-LTSS","name":"kgraft-patch-SLE12-SP2_Update_16","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_16&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"11-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_103-92_56-default":"11-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-LTSS","name":"kgraft-patch-SLE12-SP2_Update_17","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_17&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"11-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_90-92_50-default":"12-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-LTSS","name":"kgraft-patch-SLE12-SP2_Update_15","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_15&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"12-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_103-92_53-default":"11-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-LTSS","name":"kgraft-patch-SLE12-SP2_Update_16","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_16&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"11-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_103-92_56-default":"11-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-LTSS","name":"kgraft-patch-SLE12-SP2_Update_17","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_17&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"11-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_90-92_50-default":"12-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-LTSS","name":"kgraft-patch-SLE12-SP2_Update_15","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_15&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"12-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_103-92_53-default":"11-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-LTSS","name":"kgraft-patch-SLE12-SP2_Update_16","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_16&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"11-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_103-92_56-default":"11-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-LTSS","name":"kgraft-patch-SLE12-SP2_Update_17","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_17&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"11-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_90-92_50-default":"12-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-LTSS","name":"kgraft-patch-SLE12-SP2_Update_15","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_15&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"12-2.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for the Linux Kernel 4.4.90-92_50 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-5391: Fixed a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may have caused a denial of service condition by sending specially crafted IP fragments. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bsc#1103098).\n- CVE-2018-18386: The drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bsc#1112039).\n","id":"SUSE-SU-2018:3787-1","modified":"2018-11-16T15:01:01Z","published":"2018-11-16T15:01:01Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20183787-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1103098"},{"type":"REPORT","url":"https://bugzilla.suse.com/1112039"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-18386"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-5391"}],"related":["CVE-2018-18386","CVE-2018-5391"],"summary":"Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP2)","upstream":["CVE-2018-18386","CVE-2018-5391"]}