{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_13-default":"6-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_3","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_3&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_22-default":"4-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_6","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_6&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_19-default":"5-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_5","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_5&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_16-default":"5-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_4","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_4&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_6-default":"8-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_2","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_2&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"8-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_13-default":"6-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_3","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_3&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_22-default":"4-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_6","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_6&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_19-default":"5-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_5","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_5&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_16-default":"5-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_4","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_4&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_6-default":"8-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_2","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_2&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"8-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_13-default":"6-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_3","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_3&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_22-default":"4-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_6","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_6&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_19-default":"5-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_5","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_5&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_16-default":"5-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_4","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_4&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_6-default":"8-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_2","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_2&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"8-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_13-default":"6-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_3","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_3&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_22-default":"4-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_6","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_6&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_19-default":"5-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_5","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_5&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_16-default":"5-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_4","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_4&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_6-default":"8-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_2","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_2&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"8-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_13-default":"6-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_3","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_3&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_22-default":"4-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_6","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_6&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_19-default":"5-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_5","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_5&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_16-default":"5-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_4","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_4&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-4_12_14-25_6-default":"8-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-SLE15_Update_2","purl":"pkg:rpm/suse/kernel-livepatch-SLE15_Update_2&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"8-2.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for the Linux Kernel 4.12.14-25_6 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-9213: Expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bsc#1128378).\n- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglected to set a NULL value for a certain structure member, which could have led to a use-after-free in sockfs_setattr (bsc#1126284).\n- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124734).\n- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bsc#1124729).\n","id":"SUSE-SU-2019:0745-1","modified":"2019-03-26T13:34:23Z","published":"2019-03-26T13:34:23Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2019/suse-su-20190745-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1124729"},{"type":"REPORT","url":"https://bugzilla.suse.com/1124734"},{"type":"REPORT","url":"https://bugzilla.suse.com/1126284"},{"type":"REPORT","url":"https://bugzilla.suse.com/1128378"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-6974"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-7221"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-8912"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-9213"}],"related":["CVE-2019-6974","CVE-2019-7221","CVE-2019-8912","CVE-2019-9213"],"summary":"Security update for the Linux Kernel (Live Patch 2 for SLE 15)","upstream":["CVE-2019-6974","CVE-2019-7221","CVE-2019-8912","CVE-2019-9213"]}