{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.176-94.88.1","kernel-default-devel":"4.4.176-94.88.1","kernel-default-extra":"4.4.176-94.88.1","kernel-devel":"4.4.176-94.88.1","kernel-macros":"4.4.176-94.88.1","kernel-source":"4.4.176-94.88.1","kernel-syms":"4.4.176-94.88.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP3","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.176-94.88.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.176-94.88.1","kernel-default-devel":"4.4.176-94.88.1","kernel-default-extra":"4.4.176-94.88.1","kernel-devel":"4.4.176-94.88.1","kernel-macros":"4.4.176-94.88.1","kernel-source":"4.4.176-94.88.1","kernel-syms":"4.4.176-94.88.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP3","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.176-94.88.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.176-94.88.1","kernel-default-devel":"4.4.176-94.88.1","kernel-default-extra":"4.4.176-94.88.1","kernel-devel":"4.4.176-94.88.1","kernel-macros":"4.4.176-94.88.1","kernel-source":"4.4.176-94.88.1","kernel-syms":"4.4.176-94.88.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP3","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.176-94.88.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.4.176-94.88.1","dlm-kmp-default":"4.4.176-94.88.1","gfs2-kmp-default":"4.4.176-94.88.1","ocfs2-kmp-default":"4.4.176-94.88.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Availability Extension 12 SP3","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.176-94.88.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_176-94_88-default":"1-4.9.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP3","name":"kgraft-patch-SLE12-SP3_Update_24","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_24&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-4.9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-docs":"4.4.176-94.88.1","kernel-obs-build":"4.4.176-94.88.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP3","name":"kernel-docs","purl":"pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.176-94.88.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-docs":"4.4.176-94.88.1","kernel-obs-build":"4.4.176-94.88.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP3","name":"kernel-obs-build","purl":"pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.176-94.88.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.176-94.88.1","kernel-default-base":"4.4.176-94.88.1","kernel-default-devel":"4.4.176-94.88.1","kernel-default-man":"4.4.176-94.88.1","kernel-devel":"4.4.176-94.88.1","kernel-macros":"4.4.176-94.88.1","kernel-source":"4.4.176-94.88.1","kernel-syms":"4.4.176-94.88.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP3","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.176-94.88.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.176-94.88.1","kernel-default-base":"4.4.176-94.88.1","kernel-default-devel":"4.4.176-94.88.1","kernel-default-man":"4.4.176-94.88.1","kernel-devel":"4.4.176-94.88.1","kernel-macros":"4.4.176-94.88.1","kernel-source":"4.4.176-94.88.1","kernel-syms":"4.4.176-94.88.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP3","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.176-94.88.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.176-94.88.1","kernel-default-base":"4.4.176-94.88.1","kernel-default-devel":"4.4.176-94.88.1","kernel-default-man":"4.4.176-94.88.1","kernel-devel":"4.4.176-94.88.1","kernel-macros":"4.4.176-94.88.1","kernel-source":"4.4.176-94.88.1","kernel-syms":"4.4.176-94.88.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP3","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.176-94.88.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.176-94.88.1","kernel-default-base":"4.4.176-94.88.1","kernel-default-devel":"4.4.176-94.88.1","kernel-default-man":"4.4.176-94.88.1","kernel-devel":"4.4.176-94.88.1","kernel-macros":"4.4.176-94.88.1","kernel-source":"4.4.176-94.88.1","kernel-syms":"4.4.176-94.88.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.176-94.88.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.176-94.88.1","kernel-default-base":"4.4.176-94.88.1","kernel-default-devel":"4.4.176-94.88.1","kernel-default-man":"4.4.176-94.88.1","kernel-devel":"4.4.176-94.88.1","kernel-macros":"4.4.176-94.88.1","kernel-source":"4.4.176-94.88.1","kernel-syms":"4.4.176-94.88.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.176-94.88.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.176-94.88.1","kernel-default-base":"4.4.176-94.88.1","kernel-default-devel":"4.4.176-94.88.1","kernel-default-man":"4.4.176-94.88.1","kernel-devel":"4.4.176-94.88.1","kernel-macros":"4.4.176-94.88.1","kernel-source":"4.4.176-94.88.1","kernel-syms":"4.4.176-94.88.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.176-94.88.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-extra":"4.4.176-94.88.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Workstation Extension 12 SP3","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.176-94.88.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\n\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.176 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).\n- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).\n\nThe following non-security bugs were fixed:\n\n- ax25: fix possible use-after-free (bnc#1012382).\n- block_dev: fix crash on chained bios with O_DIRECT (bsc#1090435).\n- block: do not use bio->bi_vcnt to figure out segment number (bsc#1128893).\n- bnxt_re: Fix couple of memory leaks that could lead to IOMMU call traces (bsc#1020413).\n- bpf: fix replace_map_fd_with_map_ptr's ldimm64 second imm field (bsc#1012382).\n- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128452).\n- ceph: avoid repeatedly adding inode to mdsc->snap_flush_list (bsc#1126773).\n- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).\n- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).\n- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).\n- device property: Fix the length used in PROPERTY_ENTRY_STRING() (bsc#1129770).\n- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389).\n- drm: Fix error handling in drm_legacy_addctx (bsc#1106929)\n- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1106929)\n- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1106929)\n- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1106929)\n- drm/vmwgfx: Do not double-free the mode stored in par->set_mode (bsc#1103429)\n- enic: add wq clean up budget (bsc#1075697, bsc#1120691. bsc#1102959).\n- enic: do not overwrite error code (bnc#1012382).\n- fbdev: chipsfb: remove set but not used variable 'size' (bsc#1106929)\n- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).\n- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- input: mms114 - fix license module information (bsc#1087092).\n- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129237).\n- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129238).\n- iommu/vt-d: Check identity map for hot-added devices (bsc#1129239).\n- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129240).\n- ixgbe: fix crash in build_skb Rx code path (git-fixes).\n- kabi: protect struct inet_peer (kabi).\n- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).\n- KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).\n- kvm: arm/arm64: vgic-its: Check CBASER/BASER validity before enabling the ITS (bsc#1109248).\n- kvm: arm/arm64: vgic-its: Check GITS_BASER Valid bit before saving tables (bsc#1109248).\n- kvm: arm/arm64: vgic-its: Fix return value for device table restore (bsc#1109248).\n- kvm: arm/arm64: vgic-its: Fix vgic_its_restore_collection_table returned value (bsc#1109248).\n- kvm: nVMX: Do not halt vcpu when L1 is injecting events to L2 (bsc#1129413).\n- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129414).\n- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129415).\n- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129416).\n- kvm: VMX: Do not allow reexecute_instruction() when skipping MMIO instr (bsc#1129417).\n- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129418).\n- kvm: x86: Add AMD's EX_CFG to the list of ignored MSRs (bsc#1127082).\n- kvm: x86: IA32_ARCH_CAPABILITIES is always supported (bsc#1129419).\n- libceph: handle an empty authorize reply (bsc#1126772).\n- mdio_bus: Fix use-after-free on device_register fails (git-fixes).\n- mfd: as3722: Handle interrupts on suspend (bnc#1012382).\n- mfd: as3722: Mark PM functions as __maybe_unused (bnc#1012382).\n- mISDN: fix a race in dev_expire_timer() (bnc#1012382).\n- mlxsw: pci: Correctly determine if descriptor queue is full (git-fixes).\n- mlxsw: reg: Use correct offset in field definiton (git-fixes).\n- mm, devm_memremap_pages: mark devm_memremap_pages() EXPORT_SYMBOL_GPL (bnc#1012382).\n- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).\n- net: Add header for usage of fls64() (bnc#1012382).\n- net: Do not allocate page fragments that are not skb aligned (bnc#1012382).\n- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).\n- net: dsa: mv88e6xxx: fix port VLAN maps (git-fixes).\n- net: Fix for_each_netdev_feature on Big endian (bnc#1012382).\n- net: fix IPv6 prefix route residue (bnc#1012382).\n- net/hamradio/6pack: Convert timers to use timer_setup() (git-fixes).\n- net/hamradio/6pack: use mod_timer() to rearm timers (git-fixes).\n- net: ipv4: use a dedicated counter for icmp_v4 redirect packets (bnc#1012382).\n- net: lan78xx: Fix race in tx pending skb size calculation (git-fixes).\n- net/mlx4_core: drop useless LIST_HEAD (git-fixes).\n- net/mlx4_core: Fix qp mtt size calculation (git-fixes).\n- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).\n- net/mlx4: Fix endianness issue in qp context params (git-fixes).\n- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).\n- net/mlx5e: Fix TCP checksum in LRO buffers (git-fixes).\n- net/mlx5: Fix driver load bad flow when having fw initializing timeout (git-fixes).\n- net/mlx5: fix uaccess beyond 'count' in debugfs read/write handlers (git-fixes).\n- net/mlx5: Fix use-after-free in self-healing flow (git-fixes).\n- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).\n- net: mv643xx_eth: fix packet corruption with TSO and tiny unaligned packets (git-fixes).\n- net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS (git-fixes).\n- net: phy: bcm7xxx: Fix shadow mode 2 disabling (git-fixes).\n- net: qca_spi: Fix race condition in spi transfers (git-fixes).\n- net: stmmac: Fix a race in EEE enable callback (bnc#1012382).\n- net: stmmac: Fix a race in EEE enable callback (git-fixes).\n- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (git-fixes).\n- net/x25: do not hold the cpu too long in x25_new_lci() (bnc#1012382).\n- PCI/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1129241).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- phy: micrel: Ensure interrupts are reenabled on resume (git-fixes).\n- powerpc/pseries: Add CPU dlpar remove functionality (bsc#1128756).\n- powerpc/pseries: Consolidate CPU hotplug code to hotplug-cpu.c (bsc#1128756).\n- powerpc/pseries: Factor out common cpu hotplug code (bsc#1128756).\n- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1128756).\n- pppoe: fix reception of frames with no mac header (git-fixes).\n- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).\n- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).\n- rdma/bnxt_re: Synchronize destroy_qp with poll_cq (bsc#1125446).\n- Revert 'mm, devm_memremap_pages: mark devm_memremap_pages() EXPORT_SYMBOL_GPL' (bnc#1012382).\n- Revert 'x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls' (bsc#1128565).\n- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).\n- scsi: aacraid: Fix missing break in switch statement (bsc#1128696).\n- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- scsi: lpfc: do not set queue->page_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1127725).\n- scsi: qla2xxx: Fix early srb free on abort (bsc#1121713).\n- scsi: qla2xxx: Fix for double free of SRB structure (bsc#1121713).\n- scsi: qla2xxx: Increase abort timeout value (bsc#1121713).\n- scsi: qla2xxx: Move {get|rel}_sp to base_qpair struct (bsc#1121713).\n- scsi: qla2xxx: Return switch command on a timeout (bsc#1121713).\n- scsi: qla2xxx: Turn off IOCB timeout timer on IOCB completion (bsc#1121713).\n- scsi: qla2xxx: Use correct qpair for ABTS/CMD (bsc#1121713).\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- sky2: Increase D3 delay again (bnc#1012382).\n- tcp: clear icsk_backoff in tcp_write_queue_purge() (bnc#1012382).\n- tcp: tcp_v4_err() should be more careful (bnc#1012382).\n- team: avoid complex list operations in team_nl_cmd_options_set() (bnc#1012382).\n- team: Free BPF filter when unregistering netdev (git-fixes).\n- tracing: Do not free iter->trace in fail path of tracing_open_pipe() (bsc#1129581).\n- vsock: cope with memory allocation failure at socket creation time (bnc#1012382).\n- vxlan: test dev->flags & IFF_UP before calling netif_rx() (bnc#1012382).\n- wireless: airo: potential buffer overflow in sprintf() (bsc#1120902).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86: Fix incorrect value for X86_FEATURE_TSX_FORCE_ABORT\n- x86: livepatch: Treat R_X86_64_PLT32 as R_X86_64_PC32 (bnc#1012382).\n- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).\n- xen: remove pre-xen3 fallback handlers (bsc#1065600).\n- xfs: remove filestream item xfs_inode reference (bsc#1127961).\n","id":"SUSE-SU-2019:0801-1","modified":"2019-03-29T06:09:20Z","published":"2019-03-29T06:09:20Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2019/suse-su-20190801-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1012382"},{"type":"REPORT","url":"https://bugzilla.suse.com/1020413"},{"type":"REPORT","url":"https://bugzilla.suse.com/1065600"},{"type":"REPORT","url":"https://bugzilla.suse.com/1070767"},{"type":"REPORT","url":"https://bugzilla.suse.com/1075697"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082943"},{"type":"REPORT","url":"https://bugzilla.suse.com/1087092"},{"type":"REPORT","url":"https://bugzilla.suse.com/1090435"},{"type":"REPORT","url":"https://bugzilla.suse.com/1102959"},{"type":"REPORT","url":"https://bugzilla.suse.com/1103429"},{"type":"REPORT","url":"https://bugzilla.suse.com/1106929"},{"type":"REPORT","url":"https://bugzilla.suse.com/1109137"},{"type":"REPORT","url":"https://bugzilla.suse.com/1109248"},{"type":"REPORT","url":"https://bugzilla.suse.com/1119019"},{"type":"REPORT","url":"https://bugzilla.suse.com/1119843"},{"type":"REPORT","url":"https://bugzilla.suse.com/1120691"},{"type":"REPORT","url":"https://bugzilla.suse.com/1120902"},{"type":"REPORT","url":"https://bugzilla.suse.com/1121713"},{"type":"REPORT","url":"https://bugzilla.suse.com/1121805"},{"type":"REPORT","url":"https://bugzilla.suse.com/1124235"},{"type":"REPORT","url":"https://bugzilla.suse.com/1125315"},{"type":"REPORT","url":"https://bugzilla.suse.com/1125446"},{"type":"REPORT","url":"https://bugzilla.suse.com/1126389"},{"type":"REPORT","url":"https://bugzilla.suse.com/1126772"},{"type":"REPORT","url":"https://bugzilla.suse.com/1126773"},{"type":"REPORT","url":"https://bugzilla.suse.com/1126805"},{"type":"REPORT","url":"https://bugzilla.suse.com/1127082"},{"type":"REPORT","url":"https://bugzilla.suse.com/1127155"},{"type":"REPORT","url":"https://bugzilla.suse.com/1127561"},{"type":"REPORT","url":"https://bugzilla.suse.com/1127725"},{"type":"REPORT","url":"https://bugzilla.suse.com/1127731"},{"type":"REPORT","url":"https://bugzilla.suse.com/1127961"},{"type":"REPORT","url":"https://bugzilla.suse.com/1128166"},{"type":"REPORT","url":"https://bugzilla.suse.com/1128452"},{"type":"REPORT","url":"https://bugzilla.suse.com/1128565"},{"type":"REPORT","url":"https://bugzilla.suse.com/1128696"},{"type":"REPORT","url":"https://bugzilla.suse.com/1128756"},{"type":"REPORT","url":"https://bugzilla.suse.com/1128893"},{"type":"REPORT","url":"https://bugzilla.suse.com/1129080"},{"type":"REPORT","url":"https://bugzilla.suse.com/1129179"},{"type":"REPORT","url":"https://bugzilla.suse.com/1129237"},{"type":"REPORT","url":"https://bugzilla.suse.com/1129238"},{"type":"REPORT","url":"https://bugzilla.suse.com/1129239"},{"type":"REPORT","url":"https://bugzilla.suse.com/1129240"},{"type":"REPORT","url":"https://bugzilla.suse.com/1129241"},{"type":"REPORT","url":"https://bugzilla.suse.com/1129413"},{"type":"REPORT","url":"https://bugzilla.suse.com/1129414"},{"type":"REPORT","url":"https://bugzilla.suse.com/1129415"},{"type":"REPORT","url":"https://bugzilla.suse.com/1129416"},{"type":"REPORT","url":"https://bugzilla.suse.com/1129417"},{"type":"REPORT","url":"https://bugzilla.suse.com/1129418"},{"type":"REPORT","url":"https://bugzilla.suse.com/1129419"},{"type":"REPORT","url":"https://bugzilla.suse.com/1129581"},{"type":"REPORT","url":"https://bugzilla.suse.com/1129770"},{"type":"REPORT","url":"https://bugzilla.suse.com/1129923"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-2024"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-9213"}],"related":["CVE-2019-2024","CVE-2019-9213"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2019-2024","CVE-2019-9213"]}