{"affected":[{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_103-6_33-default":"11-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP3","name":"kgraft-patch-SLE12-SP3_Update_6","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_6&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"11-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_103-6_38-default":"11-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP3","name":"kgraft-patch-SLE12-SP3_Update_7","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_7&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"11-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_92-6_30-default":"11-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP3","name":"kgraft-patch-SLE12-SP3_Update_5","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_5&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"11-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_103-6_33-default":"11-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP3","name":"kgraft-patch-SLE12-SP3_Update_6","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_6&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"11-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_103-6_38-default":"11-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP3","name":"kgraft-patch-SLE12-SP3_Update_7","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_7&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"11-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_92-6_30-default":"11-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP3","name":"kgraft-patch-SLE12-SP3_Update_5","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_5&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"11-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_103-6_33-default":"11-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP3","name":"kgraft-patch-SLE12-SP3_Update_6","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_6&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"11-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_103-6_38-default":"11-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP3","name":"kgraft-patch-SLE12-SP3_Update_7","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_7&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"11-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_92-6_30-default":"11-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP3","name":"kgraft-patch-SLE12-SP3_Update_5","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_5&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"11-2.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for the Linux Kernel 4.4.92-6_30 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-5391: Fixed a possible denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bsc#1103098).\n- CVE-2018-18386: The drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bsc#1112039).\n","id":"SUSE-SU-2018:3865-1","modified":"2018-11-22T15:20:29Z","published":"2018-11-22T15:20:29Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20183865-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1103098"},{"type":"REPORT","url":"https://bugzilla.suse.com/1112039"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-18386"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-5391"}],"related":["CVE-2018-18386","CVE-2018-5391"],"summary":"Security update for the Linux Kernel (Live Patch 5 for SLE 12 SP3)","upstream":["CVE-2018-18386","CVE-2018-5391"]}