{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.104.1","kernel-default-base":"4.4.121-92.104.1","kernel-default-devel":"4.4.121-92.104.1","kernel-default-man":"4.4.121-92.104.1","kernel-devel":"4.4.121-92.104.1","kernel-macros":"4.4.121-92.104.1","kernel-source":"4.4.121-92.104.1","kernel-syms":"4.4.121-92.104.1","kgraft-patch-4_4_121-92_104-default":"1-3.3.1"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 7","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%207"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.121-92.104.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.104.1","kernel-default-base":"4.4.121-92.104.1","kernel-default-devel":"4.4.121-92.104.1","kernel-default-man":"4.4.121-92.104.1","kernel-devel":"4.4.121-92.104.1","kernel-macros":"4.4.121-92.104.1","kernel-source":"4.4.121-92.104.1","kernel-syms":"4.4.121-92.104.1","kgraft-patch-4_4_121-92_104-default":"1-3.3.1"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 7","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%207"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.121-92.104.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.104.1","kernel-default-base":"4.4.121-92.104.1","kernel-default-devel":"4.4.121-92.104.1","kernel-default-man":"4.4.121-92.104.1","kernel-devel":"4.4.121-92.104.1","kernel-macros":"4.4.121-92.104.1","kernel-source":"4.4.121-92.104.1","kernel-syms":"4.4.121-92.104.1","kgraft-patch-4_4_121-92_104-default":"1-3.3.1"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 7","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%207"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.121-92.104.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.104.1","kernel-default-base":"4.4.121-92.104.1","kernel-default-devel":"4.4.121-92.104.1","kernel-default-man":"4.4.121-92.104.1","kernel-devel":"4.4.121-92.104.1","kernel-macros":"4.4.121-92.104.1","kernel-source":"4.4.121-92.104.1","kernel-syms":"4.4.121-92.104.1","kgraft-patch-4_4_121-92_104-default":"1-3.3.1"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 7","name":"kgraft-patch-SLE12-SP2_Update_28","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_28&distro=SUSE%20OpenStack%20Cloud%207"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.4.121-92.104.1","cluster-network-kmp-default":"4.4.121-92.104.1","dlm-kmp-default":"4.4.121-92.104.1","gfs2-kmp-default":"4.4.121-92.104.1","ocfs2-kmp-default":"4.4.121-92.104.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Availability Extension 12 SP2","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.121-92.104.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.104.1","kernel-default-base":"4.4.121-92.104.1","kernel-default-devel":"4.4.121-92.104.1","kernel-devel":"4.4.121-92.104.1","kernel-macros":"4.4.121-92.104.1","kernel-source":"4.4.121-92.104.1","kernel-syms":"4.4.121-92.104.1","kgraft-patch-4_4_121-92_104-default":"1-3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.121-92.104.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.104.1","kernel-default-base":"4.4.121-92.104.1","kernel-default-devel":"4.4.121-92.104.1","kernel-devel":"4.4.121-92.104.1","kernel-macros":"4.4.121-92.104.1","kernel-source":"4.4.121-92.104.1","kernel-syms":"4.4.121-92.104.1","kgraft-patch-4_4_121-92_104-default":"1-3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.121-92.104.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.104.1","kernel-default-base":"4.4.121-92.104.1","kernel-default-devel":"4.4.121-92.104.1","kernel-devel":"4.4.121-92.104.1","kernel-macros":"4.4.121-92.104.1","kernel-source":"4.4.121-92.104.1","kernel-syms":"4.4.121-92.104.1","kgraft-patch-4_4_121-92_104-default":"1-3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.121-92.104.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.104.1","kernel-default-base":"4.4.121-92.104.1","kernel-default-devel":"4.4.121-92.104.1","kernel-devel":"4.4.121-92.104.1","kernel-macros":"4.4.121-92.104.1","kernel-source":"4.4.121-92.104.1","kernel-syms":"4.4.121-92.104.1","kgraft-patch-4_4_121-92_104-default":"1-3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"kgraft-patch-SLE12-SP2_Update_28","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_28&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.104.1","kernel-default-base":"4.4.121-92.104.1","kernel-default-devel":"4.4.121-92.104.1","kernel-default-man":"4.4.121-92.104.1","kernel-devel":"4.4.121-92.104.1","kernel-macros":"4.4.121-92.104.1","kernel-source":"4.4.121-92.104.1","kernel-syms":"4.4.121-92.104.1","kgraft-patch-4_4_121-92_104-default":"1-3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-LTSS","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.121-92.104.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.104.1","kernel-default-base":"4.4.121-92.104.1","kernel-default-devel":"4.4.121-92.104.1","kernel-default-man":"4.4.121-92.104.1","kernel-devel":"4.4.121-92.104.1","kernel-macros":"4.4.121-92.104.1","kernel-source":"4.4.121-92.104.1","kernel-syms":"4.4.121-92.104.1","kgraft-patch-4_4_121-92_104-default":"1-3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-LTSS","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.121-92.104.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.104.1","kernel-default-base":"4.4.121-92.104.1","kernel-default-devel":"4.4.121-92.104.1","kernel-default-man":"4.4.121-92.104.1","kernel-devel":"4.4.121-92.104.1","kernel-macros":"4.4.121-92.104.1","kernel-source":"4.4.121-92.104.1","kernel-syms":"4.4.121-92.104.1","kgraft-patch-4_4_121-92_104-default":"1-3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-LTSS","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.121-92.104.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.104.1","kernel-default-base":"4.4.121-92.104.1","kernel-default-devel":"4.4.121-92.104.1","kernel-default-man":"4.4.121-92.104.1","kernel-devel":"4.4.121-92.104.1","kernel-macros":"4.4.121-92.104.1","kernel-source":"4.4.121-92.104.1","kernel-syms":"4.4.121-92.104.1","kgraft-patch-4_4_121-92_104-default":"1-3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-LTSS","name":"kgraft-patch-SLE12-SP2_Update_28","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_28&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.104.1","kernel-default-base":"4.4.121-92.104.1","kernel-default-devel":"4.4.121-92.104.1","kernel-devel":"4.4.121-92.104.1","kernel-macros":"4.4.121-92.104.1","kernel-source":"4.4.121-92.104.1","kernel-syms":"4.4.121-92.104.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-BCL","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.121-92.104.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.104.1","kernel-default-base":"4.4.121-92.104.1","kernel-default-devel":"4.4.121-92.104.1","kernel-devel":"4.4.121-92.104.1","kernel-macros":"4.4.121-92.104.1","kernel-source":"4.4.121-92.104.1","kernel-syms":"4.4.121-92.104.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-BCL","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.121-92.104.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.104.1","kernel-default-base":"4.4.121-92.104.1","kernel-default-devel":"4.4.121-92.104.1","kernel-devel":"4.4.121-92.104.1","kernel-macros":"4.4.121-92.104.1","kernel-source":"4.4.121-92.104.1","kernel-syms":"4.4.121-92.104.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-BCL","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.121-92.104.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.104.1","kernel-default-base":"4.4.121-92.104.1","kernel-default-devel":"4.4.121-92.104.1","kernel-devel":"4.4.121-92.104.1","kernel-macros":"4.4.121-92.104.1","kernel-source":"4.4.121-92.104.1","kernel-syms":"4.4.121-92.104.1","kgraft-patch-4_4_121-92_104-default":"1-3.3.1"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 4","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Enterprise%20Storage%204"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.121-92.104.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.104.1","kernel-default-base":"4.4.121-92.104.1","kernel-default-devel":"4.4.121-92.104.1","kernel-devel":"4.4.121-92.104.1","kernel-macros":"4.4.121-92.104.1","kernel-source":"4.4.121-92.104.1","kernel-syms":"4.4.121-92.104.1","kgraft-patch-4_4_121-92_104-default":"1-3.3.1"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 4","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Enterprise%20Storage%204"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.121-92.104.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.104.1","kernel-default-base":"4.4.121-92.104.1","kernel-default-devel":"4.4.121-92.104.1","kernel-devel":"4.4.121-92.104.1","kernel-macros":"4.4.121-92.104.1","kernel-source":"4.4.121-92.104.1","kernel-syms":"4.4.121-92.104.1","kgraft-patch-4_4_121-92_104-default":"1-3.3.1"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 4","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Enterprise%20Storage%204"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.121-92.104.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.104.1","kernel-default-base":"4.4.121-92.104.1","kernel-default-devel":"4.4.121-92.104.1","kernel-devel":"4.4.121-92.104.1","kernel-macros":"4.4.121-92.104.1","kernel-source":"4.4.121-92.104.1","kernel-syms":"4.4.121-92.104.1","kgraft-patch-4_4_121-92_104-default":"1-3.3.1"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 4","name":"kgraft-patch-SLE12-SP2_Update_28","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_28&distro=SUSE%20Enterprise%20Storage%204"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-3.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\n\nThe SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).\n- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).\n- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. (bnc#1107829).\n- CVE-2019-7221: The KVM implementation in the Linux kernel had a Use-after-Free (bnc#1124732).\n- CVE-2019-7222: The KVM implementation in the Linux kernel had an Information Leak (bnc#1124735).\n- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, which led to a use-after-free (bnc#1124728).\n\nThe following non-security bugs were fixed:\n\n- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).\n- enic: add wq clean up budget (bsc#1075697, bsc#1120691. bsc#1102959).\n- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- ipv4: ipv6: Adjust the frag mem limit after truesize has been changed (bsc#1110286).\n- kmps: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).\n- netfilter: ipv6: Adjust the frag mem limit after truesize has been changed (bsc#1110286).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).\n- restore cond_resched() in shrink_dcache_parent() (bsc#1098599, bsc#1105402, bsc#1127758).\n- rps: flow_dissector: Fix uninitialized flow_keys used in __skb_get_hash possibly (bsc#1108145).\n- scsi: megaraid_sas: Send SYNCHRONIZE_CACHE for VD to firmware (bsc#1121698).\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86: respect memory size limiting via mem= parameter (bsc#1117645).\n- x86/spectre_v2: Do not check microcode versions when running under hypervisors (bsc#1122821).\n- x86/xen: dont add memory above max allowed allocation (bsc#1117645).\n- xen-netfront: Fix hang on device removal (bnc#1012382).\n- xfrm: use complete IPv6 addresses for hash (bsc#1109330).\n- xfs: remove filestream item xfs_inode reference (bsc#1127961).\n","id":"SUSE-SU-2019:0828-1","modified":"2019-04-01T09:28:05Z","published":"2019-04-01T09:28:05Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2019/suse-su-20190828-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1012382"},{"type":"REPORT","url":"https://bugzilla.suse.com/1075697"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082943"},{"type":"REPORT","url":"https://bugzilla.suse.com/1098599"},{"type":"REPORT","url":"https://bugzilla.suse.com/1102959"},{"type":"REPORT","url":"https://bugzilla.suse.com/1105402"},{"type":"REPORT","url":"https://bugzilla.suse.com/1107829"},{"type":"REPORT","url":"https://bugzilla.suse.com/1108145"},{"type":"REPORT","url":"https://bugzilla.suse.com/1109137"},{"type":"REPORT","url":"https://bugzilla.suse.com/1109330"},{"type":"REPORT","url":"https://bugzilla.suse.com/1110286"},{"type":"REPORT","url":"https://bugzilla.suse.com/1117645"},{"type":"REPORT","url":"https://bugzilla.suse.com/1119019"},{"type":"REPORT","url":"https://bugzilla.suse.com/1120691"},{"type":"REPORT","url":"https://bugzilla.suse.com/1121698"},{"type":"REPORT","url":"https://bugzilla.suse.com/1121805"},{"type":"REPORT","url":"https://bugzilla.suse.com/1122821"},{"type":"REPORT","url":"https://bugzilla.suse.com/1124728"},{"type":"REPORT","url":"https://bugzilla.suse.com/1124732"},{"type":"REPORT","url":"https://bugzilla.suse.com/1124735"},{"type":"REPORT","url":"https://bugzilla.suse.com/1125315"},{"type":"REPORT","url":"https://bugzilla.suse.com/1127155"},{"type":"REPORT","url":"https://bugzilla.suse.com/1127758"},{"type":"REPORT","url":"https://bugzilla.suse.com/1127961"},{"type":"REPORT","url":"https://bugzilla.suse.com/1128166"},{"type":"REPORT","url":"https://bugzilla.suse.com/1129080"},{"type":"REPORT","url":"https://bugzilla.suse.com/1129179"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14633"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-2024"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-6974"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-7221"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-7222"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-9213"}],"related":["CVE-2018-14633","CVE-2019-2024","CVE-2019-6974","CVE-2019-7221","CVE-2019-7222","CVE-2019-9213"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2018-14633","CVE-2019-2024","CVE-2019-6974","CVE-2019-7221","CVE-2019-7222","CVE-2019-9213"]}