suse-su-2018:2362-1
Vulnerability from csaf_suse
Published
2018-08-16 07:08
Modified
2018-08-16 07:08
Summary
Security update for the Linux Kernel

Notes

Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 GA LTSS kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924). - CVE-2018-13405: The inode_init_owner function in fs/inode.c allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416). - CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 bnc#1100418). - CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119). - CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081). - CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343). The following non-security bugs were fixed: - bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232). - bcache: Annotate switch fall-through (bsc#1064232). - bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232). - bcache: Fix indentation (bsc#1064232). - bcache: Fix kernel-doc warnings (bsc#1064232). - bcache: Fix, improve efficiency of closure_sync() (bsc#1064232). - bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232). - bcache: Remove an unused variable (bsc#1064232). - bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232). - bcache: Use PTR_ERR_OR_ZERO() (bsc#1064232). - bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232). - bcache: add backing_request_endio() for bi_end_io (bsc#1064232). - bcache: add io_disable to struct cached_dev (bsc#1064232). - bcache: add journal statistic (bsc#1064232). - bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232). - bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232). - bcache: closures: move control bits one bit right (bsc#1064232). - bcache: correct flash only vols (check all uuids) (bsc#1064232). - bcache: count backing device I/O error for writeback I/O (bsc#1064232). - bcache: do not attach backing with duplicate UUID (bsc#1064232). - bcache: fix cached_dev->count usage for bch_cache_set_error() (bsc#1064232). - bcache: fix crashes in duplicate cache device register (bsc#1064232). - bcache: fix error return value in memory shrink (bsc#1064232). - bcache: fix for allocator and register thread race (bsc#1064232). - bcache: fix for data collapse after re-attaching an attached device (bsc#1064232). - bcache: fix high CPU occupancy during journal (bsc#1064232). - bcache: fix incorrect sysfs output value of strip size (bsc#1064232). - bcache: fix kcrashes with fio in RAID5 backend dev (bsc#1064232). - bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232). - bcache: fix using of loop variable in memory shrink (bsc#1064232). - bcache: fix writeback target calc on large devices (bsc#1064232). - bcache: fix wrong return value in bch_debug_init() (bsc#1064232). - bcache: mark closure_sync() __sched (bsc#1064232). - bcache: move closure debug file into debug directory (bsc#1064232). - bcache: properly set task state in bch_writeback_thread() (bsc#1064232). - bcache: quit dc->writeback_thread when BCACHE_DEV_DETACHING is set (bsc#1064232). - bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232). - bcache: ret IOERR when read meets metadata error (bsc#1064232). - bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232). - bcache: return attach error when no cache set exist (bsc#1064232). - bcache: segregate flash only volume write streams (bsc#1064232). - bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232). - bcache: set dc->io_disable to true in conditional_stop_bcache_device() (bsc#1064232). - bcache: set error_limit correctly (bsc#1064232). - bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232). - bcache: stop bcache device when backing device is offline (bsc#1064232). - bcache: stop dc->writeback_rate_update properly (bsc#1064232). - bcache: stop writeback thread after detaching (bsc#1064232). - bcache: store disk name in struct cache and struct cached_dev (bsc#1064232). - bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232). - cpu/hotplug: Add sysfs state interface (bsc#1089343). - cpu/hotplug: Provide knobs to control SMT (bsc#1089343). - cpu/hotplug: Provide knobs to control SMT (bsc#1089343). - cpu/hotplug: Split do_cpu_down() (bsc#1089343). - x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343). - x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). - x86/Xen: disable IBRS around CPU stopper function invocation (none so far). - x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343). - x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343). - x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343). - x86/cpu/common: Provide detect_ht_early() (bsc#1089343). - x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343). - x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343). - x86/cpu: Remove the pointless CPU printout (bsc#1089343). - x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382). - x86/mm: Simplify p[g4um]xen: d_page() macros (bnc#1087081). - x86/smp: Provide topology_is_primary_thread() (bsc#1089343). - x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343). - x86/topology: Add topology_max_smt_threads() (bsc#1089343). - x86/topology: Provide topology_smt_supported() (bsc#1089343). - xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343). - xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343). - xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343). - xen/x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382). - xen/x86/cpufeatures: Make CPU bugs sticky (bnc#1012382). - xen/x86/entry: Add a function to overwrite the RSB (bsc#1068032). - xen/x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032). - xen/x86/entry: Use IBRS on entry to kernel space (bsc#1068032). - xen/x86/mm: Set IBPB upon context switch (bsc#1068032). - xen/x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).
Patchnames
SUSE-SLE-Module-Public-Cloud-12-2018-1605,SUSE-SLE-SERVER-12-2018-1605
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\n\nThe SUSE Linux Enterprise 12 GA LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).\n- CVE-2018-13405: The inode_init_owner function in fs/inode.c allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416).\n- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 bnc#1100418).\n- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).\n- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).\n\nThe following non-security bugs were fixed:\n\n- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).\n- bcache: Annotate switch fall-through (bsc#1064232).\n- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).\n- bcache: Fix indentation (bsc#1064232).\n- bcache: Fix kernel-doc warnings (bsc#1064232).\n- bcache: Fix, improve efficiency of closure_sync() (bsc#1064232).\n- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).\n- bcache: Remove an unused variable (bsc#1064232).\n- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).\n- bcache: Use PTR_ERR_OR_ZERO() (bsc#1064232).\n- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).\n- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).\n- bcache: add io_disable to struct cached_dev (bsc#1064232).\n- bcache: add journal statistic (bsc#1064232).\n- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).\n- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).\n- bcache: closures: move control bits one bit right (bsc#1064232).\n- bcache: correct flash only vols (check all uuids) (bsc#1064232).\n- bcache: count backing device I/O error for writeback I/O (bsc#1064232).\n- bcache: do not attach backing with duplicate UUID (bsc#1064232).\n- bcache: fix cached_dev-\u003ecount usage for bch_cache_set_error() (bsc#1064232).\n- bcache: fix crashes in duplicate cache device register (bsc#1064232).\n- bcache: fix error return value in memory shrink (bsc#1064232).\n- bcache: fix for allocator and register thread race (bsc#1064232).\n- bcache: fix for data collapse after re-attaching an attached device (bsc#1064232).\n- bcache: fix high CPU occupancy during journal (bsc#1064232).\n- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).\n- bcache: fix kcrashes with fio in RAID5 backend dev (bsc#1064232).\n- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).\n- bcache: fix using of loop variable in memory shrink (bsc#1064232).\n- bcache: fix writeback target calc on large devices (bsc#1064232).\n- bcache: fix wrong return value in bch_debug_init() (bsc#1064232).\n- bcache: mark closure_sync() __sched (bsc#1064232).\n- bcache: move closure debug file into debug directory (bsc#1064232).\n- bcache: properly set task state in bch_writeback_thread() (bsc#1064232).\n- bcache: quit dc-\u003ewriteback_thread when BCACHE_DEV_DETACHING is set (bsc#1064232).\n- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).\n- bcache: ret IOERR when read meets metadata error (bsc#1064232).\n- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).\n- bcache: return attach error when no cache set exist (bsc#1064232).\n- bcache: segregate flash only volume write streams (bsc#1064232).\n- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).\n- bcache: set dc-\u003eio_disable to true in conditional_stop_bcache_device() (bsc#1064232).\n- bcache: set error_limit correctly (bsc#1064232).\n- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).\n- bcache: stop bcache device when backing device is offline (bsc#1064232).\n- bcache: stop dc-\u003ewriteback_rate_update properly (bsc#1064232).\n- bcache: stop writeback thread after detaching (bsc#1064232).\n- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).\n- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).\n- cpu/hotplug: Add sysfs state interface (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).\n- x86/Xen: disable IBRS around CPU stopper function invocation (none so far).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382).\n- x86/mm: Simplify p[g4um]xen: d_page() macros (bnc#1087081).\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).\n- x86/topology: Add topology_max_smt_threads() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- xen/x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382).\n- xen/x86/cpufeatures: Make CPU bugs sticky (bnc#1012382).\n- xen/x86/entry: Add a function to overwrite the RSB (bsc#1068032).\n- xen/x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).\n- xen/x86/entry: Use IBRS on entry to kernel space (bsc#1068032).\n- xen/x86/mm: Set IBPB upon context switch (bsc#1068032).\n- xen/x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-SLE-Module-Public-Cloud-12-2018-1605,SUSE-SLE-SERVER-12-2018-1605",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2362-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2018:2362-1",
        "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182362-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2018:2362-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004442.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1012382",
        "url": "https://bugzilla.suse.com/1012382"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1064232",
        "url": "https://bugzilla.suse.com/1064232"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1068032",
        "url": "https://bugzilla.suse.com/1068032"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1087081",
        "url": "https://bugzilla.suse.com/1087081"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1089343",
        "url": "https://bugzilla.suse.com/1089343"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1098016",
        "url": "https://bugzilla.suse.com/1098016"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1099924",
        "url": "https://bugzilla.suse.com/1099924"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1100416",
        "url": "https://bugzilla.suse.com/1100416"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1100418",
        "url": "https://bugzilla.suse.com/1100418"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1103119",
        "url": "https://bugzilla.suse.com/1103119"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-13053 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-13053/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-13405 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-13405/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-13406 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-13406/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-14734 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-14734/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-3620 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-3620/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-3646 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-3646/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2018-08-16T07:08:37Z",
      "generator": {
        "date": "2018-08-16T07:08:37Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2018:2362-1",
      "initial_release_date": "2018-08-16T07:08:37Z",
      "revision_history": [
        {
          "date": "2018-08-16T07:08:37Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-3.12.61-52.141.1.noarch",
                "product": {
                  "name": "kernel-devel-3.12.61-52.141.1.noarch",
                  "product_id": "kernel-devel-3.12.61-52.141.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-3.12.61-52.141.1.noarch",
                "product": {
                  "name": "kernel-macros-3.12.61-52.141.1.noarch",
                  "product_id": "kernel-macros-3.12.61-52.141.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-3.12.61-52.141.1.noarch",
                "product": {
                  "name": "kernel-source-3.12.61-52.141.1.noarch",
                  "product_id": "kernel-source-3.12.61-52.141.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-default-3.12.61-52.141.1.ppc64le",
                "product": {
                  "name": "kernel-default-3.12.61-52.141.1.ppc64le",
                  "product_id": "kernel-default-3.12.61-52.141.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-3.12.61-52.141.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-3.12.61-52.141.1.ppc64le",
                  "product_id": "kernel-default-base-3.12.61-52.141.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-3.12.61-52.141.1.ppc64le",
                "product": {
                  "name": "kernel-default-devel-3.12.61-52.141.1.ppc64le",
                  "product_id": "kernel-default-devel-3.12.61-52.141.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-3.12.61-52.141.1.ppc64le",
                "product": {
                  "name": "kernel-syms-3.12.61-52.141.1.ppc64le",
                  "product_id": "kernel-syms-3.12.61-52.141.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-default-3.12.61-52.141.1.s390x",
                "product": {
                  "name": "kernel-default-3.12.61-52.141.1.s390x",
                  "product_id": "kernel-default-3.12.61-52.141.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-3.12.61-52.141.1.s390x",
                "product": {
                  "name": "kernel-default-base-3.12.61-52.141.1.s390x",
                  "product_id": "kernel-default-base-3.12.61-52.141.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-3.12.61-52.141.1.s390x",
                "product": {
                  "name": "kernel-default-devel-3.12.61-52.141.1.s390x",
                  "product_id": "kernel-default-devel-3.12.61-52.141.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-3.12.61-52.141.1.s390x",
                "product": {
                  "name": "kernel-default-man-3.12.61-52.141.1.s390x",
                  "product_id": "kernel-default-man-3.12.61-52.141.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-3.12.61-52.141.1.s390x",
                "product": {
                  "name": "kernel-syms-3.12.61-52.141.1.s390x",
                  "product_id": "kernel-syms-3.12.61-52.141.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-ec2-3.12.61-52.141.1.x86_64",
                "product": {
                  "name": "kernel-ec2-3.12.61-52.141.1.x86_64",
                  "product_id": "kernel-ec2-3.12.61-52.141.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ec2-devel-3.12.61-52.141.1.x86_64",
                "product": {
                  "name": "kernel-ec2-devel-3.12.61-52.141.1.x86_64",
                  "product_id": "kernel-ec2-devel-3.12.61-52.141.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ec2-extra-3.12.61-52.141.1.x86_64",
                "product": {
                  "name": "kernel-ec2-extra-3.12.61-52.141.1.x86_64",
                  "product_id": "kernel-ec2-extra-3.12.61-52.141.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-3.12.61-52.141.1.x86_64",
                "product": {
                  "name": "kernel-default-3.12.61-52.141.1.x86_64",
                  "product_id": "kernel-default-3.12.61-52.141.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-3.12.61-52.141.1.x86_64",
                "product": {
                  "name": "kernel-default-base-3.12.61-52.141.1.x86_64",
                  "product_id": "kernel-default-base-3.12.61-52.141.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-3.12.61-52.141.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-3.12.61-52.141.1.x86_64",
                  "product_id": "kernel-default-devel-3.12.61-52.141.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-3.12.61-52.141.1.x86_64",
                "product": {
                  "name": "kernel-syms-3.12.61-52.141.1.x86_64",
                  "product_id": "kernel-syms-3.12.61-52.141.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-3.12.61-52.141.1.x86_64",
                "product": {
                  "name": "kernel-xen-3.12.61-52.141.1.x86_64",
                  "product_id": "kernel-xen-3.12.61-52.141.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-base-3.12.61-52.141.1.x86_64",
                "product": {
                  "name": "kernel-xen-base-3.12.61-52.141.1.x86_64",
                  "product_id": "kernel-xen-base-3.12.61-52.141.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-3.12.61-52.141.1.x86_64",
                "product": {
                  "name": "kernel-xen-devel-3.12.61-52.141.1.x86_64",
                  "product_id": "kernel-xen-devel-3.12.61-52.141.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64",
                "product": {
                  "name": "kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64",
                  "product_id": "kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64",
                "product": {
                  "name": "kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64",
                  "product_id": "kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "lttng-modules-2.4.1-16.6.1.x86_64",
                "product": {
                  "name": "lttng-modules-2.4.1-16.6.1.x86_64",
                  "product_id": "lttng-modules-2.4.1-16.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64",
                "product": {
                  "name": "lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64",
                  "product_id": "lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Public Cloud 12",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Public Cloud 12",
                  "product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-public-cloud:12"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 12-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:12"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ec2-3.12.61-52.141.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64"
        },
        "product_reference": "kernel-ec2-3.12.61-52.141.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ec2-devel-3.12.61-52.141.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64"
        },
        "product_reference": "kernel-ec2-devel-3.12.61-52.141.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ec2-extra-3.12.61-52.141.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64"
        },
        "product_reference": "kernel-ec2-extra-3.12.61-52.141.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.12.61-52.141.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le"
        },
        "product_reference": "kernel-default-3.12.61-52.141.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.12.61-52.141.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x"
        },
        "product_reference": "kernel-default-3.12.61-52.141.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.12.61-52.141.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64"
        },
        "product_reference": "kernel-default-3.12.61-52.141.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.12.61-52.141.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le"
        },
        "product_reference": "kernel-default-base-3.12.61-52.141.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.12.61-52.141.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x"
        },
        "product_reference": "kernel-default-base-3.12.61-52.141.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.12.61-52.141.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64"
        },
        "product_reference": "kernel-default-base-3.12.61-52.141.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.12.61-52.141.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-3.12.61-52.141.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.12.61-52.141.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x"
        },
        "product_reference": "kernel-default-devel-3.12.61-52.141.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.12.61-52.141.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64"
        },
        "product_reference": "kernel-default-devel-3.12.61-52.141.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-3.12.61-52.141.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x"
        },
        "product_reference": "kernel-default-man-3.12.61-52.141.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-3.12.61-52.141.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch"
        },
        "product_reference": "kernel-devel-3.12.61-52.141.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-3.12.61-52.141.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch"
        },
        "product_reference": "kernel-macros-3.12.61-52.141.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-3.12.61-52.141.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch"
        },
        "product_reference": "kernel-source-3.12.61-52.141.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.12.61-52.141.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le"
        },
        "product_reference": "kernel-syms-3.12.61-52.141.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.12.61-52.141.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x"
        },
        "product_reference": "kernel-syms-3.12.61-52.141.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.12.61-52.141.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64"
        },
        "product_reference": "kernel-syms-3.12.61-52.141.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-3.12.61-52.141.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64"
        },
        "product_reference": "kernel-xen-3.12.61-52.141.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-base-3.12.61-52.141.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64"
        },
        "product_reference": "kernel-xen-base-3.12.61-52.141.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-3.12.61-52.141.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64"
        },
        "product_reference": "kernel-xen-devel-3.12.61-52.141.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64"
        },
        "product_reference": "kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64"
        },
        "product_reference": "kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lttng-modules-2.4.1-16.6.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64"
        },
        "product_reference": "lttng-modules-2.4.1-16.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64"
        },
        "product_reference": "lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2018-13053",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-13053"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-13053",
          "url": "https://www.suse.com/security/cve/CVE-2018-13053"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1099924 for CVE-2018-13053",
          "url": "https://bugzilla.suse.com/1099924"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2018-13053",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-08-16T07:08:37Z",
          "details": "low"
        }
      ],
      "title": "CVE-2018-13053"
    },
    {
      "cve": "CVE-2018-13405",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-13405"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-13405",
          "url": "https://www.suse.com/security/cve/CVE-2018-13405"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2018-13405",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1100416 for CVE-2018-13405",
          "url": "https://bugzilla.suse.com/1100416"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1129735 for CVE-2018-13405",
          "url": "https://bugzilla.suse.com/1129735"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195161 for CVE-2018-13405",
          "url": "https://bugzilla.suse.com/1195161"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1198702 for CVE-2018-13405",
          "url": "https://bugzilla.suse.com/1198702"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-08-16T07:08:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-13405"
    },
    {
      "cve": "CVE-2018-13406",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-13406"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-13406",
          "url": "https://www.suse.com/security/cve/CVE-2018-13406"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1098016 for CVE-2018-13406",
          "url": "https://bugzilla.suse.com/1098016"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1100418 for CVE-2018-13406",
          "url": "https://bugzilla.suse.com/1100418"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2018-13406",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-08-16T07:08:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-13406"
    },
    {
      "cve": "CVE-2018-14734",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-14734"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-14734",
          "url": "https://www.suse.com/security/cve/CVE-2018-14734"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1103119 for CVE-2018-14734",
          "url": "https://bugzilla.suse.com/1103119"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1131390 for CVE-2018-14734",
          "url": "https://bugzilla.suse.com/1131390"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-08-16T07:08:37Z",
          "details": "low"
        }
      ],
      "title": "CVE-2018-14734"
    },
    {
      "cve": "CVE-2018-3620",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-3620"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-3620",
          "url": "https://www.suse.com/security/cve/CVE-2018-3620"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087078 for CVE-2018-3620",
          "url": "https://bugzilla.suse.com/1087078"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087081 for CVE-2018-3620",
          "url": "https://bugzilla.suse.com/1087081"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1089343 for CVE-2018-3620",
          "url": "https://bugzilla.suse.com/1089343"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1090340 for CVE-2018-3620",
          "url": "https://bugzilla.suse.com/1090340"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1091107 for CVE-2018-3620",
          "url": "https://bugzilla.suse.com/1091107"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1099306 for CVE-2018-3620",
          "url": "https://bugzilla.suse.com/1099306"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1104894 for CVE-2018-3620",
          "url": "https://bugzilla.suse.com/1104894"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1136865 for CVE-2018-3620",
          "url": "https://bugzilla.suse.com/1136865"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201877 for CVE-2018-3620",
          "url": "https://bugzilla.suse.com/1201877"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-08-16T07:08:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-3620"
    },
    {
      "cve": "CVE-2018-3646",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-3646"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-3646",
          "url": "https://www.suse.com/security/cve/CVE-2018-3646"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087078 for CVE-2018-3646",
          "url": "https://bugzilla.suse.com/1087078"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087081 for CVE-2018-3646",
          "url": "https://bugzilla.suse.com/1087081"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1089343 for CVE-2018-3646",
          "url": "https://bugzilla.suse.com/1089343"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1091107 for CVE-2018-3646",
          "url": "https://bugzilla.suse.com/1091107"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1099306 for CVE-2018-3646",
          "url": "https://bugzilla.suse.com/1099306"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1104365 for CVE-2018-3646",
          "url": "https://bugzilla.suse.com/1104365"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1104894 for CVE-2018-3646",
          "url": "https://bugzilla.suse.com/1104894"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1106548 for CVE-2018-3646",
          "url": "https://bugzilla.suse.com/1106548"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1113534 for CVE-2018-3646",
          "url": "https://bugzilla.suse.com/1113534"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1136865 for CVE-2018-3646",
          "url": "https://bugzilla.suse.com/1136865"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2018-3646",
          "url": "https://bugzilla.suse.com/1178658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201877 for CVE-2018-3646",
          "url": "https://bugzilla.suse.com/1201877"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-08-16T07:08:37Z",
          "details": "important"
        }
      ],
      "title": "CVE-2018-3646"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…