Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-10876 (GCVE-0-2018-10876)
Vulnerability from cvelistv5
Published
2018-07-26 18:00
Modified
2024-08-05 07:46
Severity ?
EPSS score ?
Summary
A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T07:46:47.413Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://patchwork.ozlabs.org/patch/929239/", }, { name: "USN-3753-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3753-2/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8844618d8aa7a9973e7b527d038a2a589665002c", }, { name: "USN-3871-5", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3871-5/", }, { name: "USN-3871-4", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3871-4/", }, { name: "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10876", }, { name: "USN-3871-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3871-1/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.kernel.org/show_bug.cgi?id=199403", }, { name: "RHSA-2019:0525", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:0525", }, { name: "106503", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106503", }, { name: "USN-3753-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3753-1/", }, { name: "USN-3871-3", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3871-3/", }, { name: "104904", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104904", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "kernel", vendor: "[UNKNOWN]", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2018-04-16T00:00:00", descriptions: [ { lang: "en", value: "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-416", description: "CWE-416", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-04-01T18:06:04", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://patchwork.ozlabs.org/patch/929239/", }, { name: "USN-3753-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3753-2/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8844618d8aa7a9973e7b527d038a2a589665002c", }, { name: "USN-3871-5", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3871-5/", }, { name: "USN-3871-4", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3871-4/", }, { name: "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10876", }, { name: "USN-3871-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3871-1/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.kernel.org/show_bug.cgi?id=199403", }, { name: "RHSA-2019:0525", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:0525", }, { name: "106503", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106503", }, { name: "USN-3753-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3753-1/", }, { name: "USN-3871-3", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3871-3/", }, { name: "104904", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104904", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2018-10876", datePublished: "2018-07-26T18:00:00", dateReserved: "2018-05-09T00:00:00", dateUpdated: "2024-08-05T07:46:47.413Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"B5A6F2F3-4894-4392-8296-3B8DD2679084\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.\"}, {\"lang\": \"es\", \"value\": \"Se ha detectado una vulnerabilidad en el kernel de Linux en el c\\u00f3digo del sistema de archivos ext4. Es posible un uso de memoria previamente liberada en la funci\\u00f3n ext4_ext_remove_space() cuando se monta y opera una imagen ext4 manipulada.\"}]", id: "CVE-2018-10876", lastModified: "2024-11-21T03:42:11.993", metrics: "{\"cvssMetricV30\": [{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H\", \"baseScore\": 5.0, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.3, \"impactScore\": 3.6}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 4.9, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2018-07-26T18:29:00.260", references: "[{\"url\": \"http://patchwork.ozlabs.org/patch/929239/\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securityfocus.com/bid/104904\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/106503\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:0525\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.kernel.org/show_bug.cgi?id=199403\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Exploit\", \"Issue Tracking\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10876\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8844618d8aa7a9973e7b527d038a2a589665002c\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3753-1/\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3753-2/\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3871-1/\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3871-3/\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3871-4/\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3871-5/\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://patchwork.ozlabs.org/patch/929239/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securityfocus.com/bid/104904\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/106503\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:0525\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.kernel.org/show_bug.cgi?id=199403\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Issue Tracking\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10876\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8844618d8aa7a9973e7b527d038a2a589665002c\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3753-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3753-2/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3871-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3871-3/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3871-4/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3871-5/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]", sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: "[{\"source\": \"secalert@redhat.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2018-10876\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2018-07-26T18:29:00.260\",\"lastModified\":\"2024-11-21T03:42:11.993\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.\"},{\"lang\":\"es\",\"value\":\"Se ha detectado una vulnerabilidad en el kernel de Linux en el código del sistema de archivos ext4. Es posible un uso de memoria previamente liberada en la función ext4_ext_remove_space() cuando se monta y opera una imagen ext4 manipulada.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":5.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.3,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":4.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}],\"references\":[{\"url\":\"http://patchwork.ozlabs.org/patch/929239/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/104904\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/106503\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0525\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.kernel.org/show_bug.cgi?id=199403\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10876\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8844618d8aa7a9973e7b527d038a2a589665002c\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3753-1/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3753-2/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3871-1/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3871-3/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3871-4/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3871-5/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://patchwork.ozlabs.org/patch/929239/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/104904\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/106503\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0525\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.kernel.org/show_bug.cgi?id=199403\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10876\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8844618d8aa7a9973e7b527d038a2a589665002c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3753-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3753-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3871-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3871-3/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3871-4/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3871-5/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", }, }
gsd-2018-10876
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.
Aliases
Aliases
{ GSD: { alias: "CVE-2018-10876", description: "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", id: "GSD-2018-10876", references: [ "https://www.suse.com/security/cve/CVE-2018-10876.html", "https://access.redhat.com/errata/RHSA-2019:0525", "https://ubuntu.com/security/CVE-2018-10876", "https://advisories.mageia.org/CVE-2018-10876.html", "https://linux.oracle.com/cve/CVE-2018-10876.html", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2018-10876", ], details: "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", id: "GSD-2018-10876", modified: "2023-12-13T01:22:41.103032Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2018-10876", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "kernel", version: { version_data: [ { version_affected: "=", version_value: "n/a", }, ], }, }, ], }, vendor_name: "[UNKNOWN]", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", }, ], }, impact: { cvss: [ { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, ], }, problemtype: { problemtype_data: [ { description: [ { cweId: "CWE-416", lang: "eng", value: "CWE-416", }, ], }, ], }, references: { reference_data: [ { name: "http://www.securityfocus.com/bid/106503", refsource: "MISC", url: "http://www.securityfocus.com/bid/106503", }, { name: "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html", refsource: "MISC", url: "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html", }, { name: "https://usn.ubuntu.com/3871-1/", refsource: "MISC", url: "https://usn.ubuntu.com/3871-1/", }, { name: "https://usn.ubuntu.com/3871-3/", refsource: "MISC", url: "https://usn.ubuntu.com/3871-3/", }, { name: "https://usn.ubuntu.com/3871-4/", refsource: "MISC", url: "https://usn.ubuntu.com/3871-4/", }, { name: "https://usn.ubuntu.com/3871-5/", refsource: "MISC", url: "https://usn.ubuntu.com/3871-5/", }, { name: "https://usn.ubuntu.com/3753-1/", refsource: "MISC", url: "https://usn.ubuntu.com/3753-1/", }, { name: "https://usn.ubuntu.com/3753-2/", refsource: "MISC", url: "https://usn.ubuntu.com/3753-2/", }, { name: "http://patchwork.ozlabs.org/patch/929239/", refsource: "MISC", url: "http://patchwork.ozlabs.org/patch/929239/", }, { name: "http://www.securityfocus.com/bid/104904", refsource: "MISC", url: "http://www.securityfocus.com/bid/104904", }, { name: "https://access.redhat.com/errata/RHSA-2019:0525", refsource: "MISC", url: "https://access.redhat.com/errata/RHSA-2019:0525", }, { name: "https://bugzilla.kernel.org/show_bug.cgi?id=199403", refsource: "MISC", url: "https://bugzilla.kernel.org/show_bug.cgi?id=199403", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10876", refsource: "MISC", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10876", }, { name: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8844618d8aa7a9973e7b527d038a2a589665002c", refsource: "MISC", url: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8844618d8aa7a9973e7b527d038a2a589665002c", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2018-10876", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-416", }, ], }, ], }, references: { reference_data: [ { name: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8844618d8aa7a9973e7b527d038a2a589665002c", refsource: "CONFIRM", tags: [ "Patch", ], url: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8844618d8aa7a9973e7b527d038a2a589665002c", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10876", refsource: "CONFIRM", tags: [ "Issue Tracking", "Patch", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10876", }, { name: "https://bugzilla.kernel.org/show_bug.cgi?id=199403", refsource: "CONFIRM", tags: [ "Exploit", "Issue Tracking", ], url: "https://bugzilla.kernel.org/show_bug.cgi?id=199403", }, { name: "http://patchwork.ozlabs.org/patch/929239/", refsource: "CONFIRM", tags: [ "Patch", ], url: "http://patchwork.ozlabs.org/patch/929239/", }, { name: "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package", refsource: "MLIST", tags: [ "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html", }, { name: "USN-3753-2", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3753-2/", }, { name: "USN-3753-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3753-1/", }, { name: "106503", refsource: "BID", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106503", }, { name: "USN-3871-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3871-1/", }, { name: "USN-3871-4", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3871-4/", }, { name: "USN-3871-3", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3871-3/", }, { name: "USN-3871-5", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3871-5/", }, { name: "RHSA-2019:0525", refsource: "REDHAT", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:0525", }, { name: "104904", refsource: "BID", tags: [], url: "http://www.securityfocus.com/bid/104904", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 4.9, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 3.6, }, }, lastModifiedDate: "2023-02-13T04:51Z", publishedDate: "2018-07-26T18:29Z", }, }, }
rhsa-2019:0525
Vulnerability from csaf_redhat
Published
2019-03-13 02:11
Modified
2024-11-22 12:41
Summary
Red Hat Security Advisory: kernel-alt security and bug fix update
Notes
Topic
An update for kernel-alt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-alt packages provide the Linux kernel version 4.x.
Security Fix(es):
* kernel: out-of-bounds memcpy in fs/ext4/inline.c:ext4_read_inline_data() with crafted ext4 image (CVE-2018-11412)
* kernel: use-after-free in jbd2_journal_commit_transaction funtion (CVE-2018-10876)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* blk-mq IO hang in null_blk test (BZ#1581223)
* lpfc remove lpfc_enable_pbde module parameter. (BZ#1615875)
* RHEL-Alt-7.6 - [Power9][DD2.2][4.14.0-109]package installation segfaults inside debian chroot env in P9 KVM guest with HTM enabled (kvm) (BZ#1628817)
* Pegas1.1 - [P9] "threads=2" or higher is required to boot up VM with above 256 vcpu [rhel-alt-7.6.z] (BZ#1634653)
* RHEL-Alt-7.6 Snapshot5 - System crashed under stress-ng & HTX on the mix mode guest (kvm) (BZ#1637890)
* RHEL-Alt-7.6 - BostonESS:P9:DD2.01 - Testing Ethtool options 'r' and 'p' for the i40e driver causes the kernel to crash and reboots the server (i40e) (CORAL) (BZ#1644606)
* RHEL-Alt-7.6 Host/RHV4.2: system crashed and kdump failed to collect CPUs in KVM guests (BZ#1649196)
* RHEL-Alt-7.6 Host:BostonLC:P9:boslcp1: system crashed in __find_linux_pte+0xac (kvm) (BZ#1651065)
* [LLNL 7.7 Bug] Rasdaemon doesn’t seem to collect APEI errors (BZ#1664495)
Users of kernel are advised to upgrade to these updated packages, which fix these bugs.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for kernel-alt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The kernel-alt packages provide the Linux kernel version 4.x.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds memcpy in fs/ext4/inline.c:ext4_read_inline_data() with crafted ext4 image (CVE-2018-11412)\n\n* kernel: use-after-free in jbd2_journal_commit_transaction funtion (CVE-2018-10876)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* blk-mq IO hang in null_blk test (BZ#1581223)\n\n* lpfc remove lpfc_enable_pbde module parameter. (BZ#1615875)\n\n* RHEL-Alt-7.6 - [Power9][DD2.2][4.14.0-109]package installation segfaults inside debian chroot env in P9 KVM guest with HTM enabled (kvm) (BZ#1628817)\n\n* Pegas1.1 - [P9] \"threads=2\" or higher is required to boot up VM with above 256 vcpu [rhel-alt-7.6.z] (BZ#1634653)\n\n* RHEL-Alt-7.6 Snapshot5 - System crashed under stress-ng & HTX on the mix mode guest (kvm) (BZ#1637890)\n\n* RHEL-Alt-7.6 - BostonESS:P9:DD2.01 - Testing Ethtool options 'r' and 'p' for the i40e driver causes the kernel to crash and reboots the server (i40e) (CORAL) (BZ#1644606)\n\n* RHEL-Alt-7.6 Host/RHV4.2: system crashed and kdump failed to collect CPUs in KVM guests (BZ#1649196)\n\n* RHEL-Alt-7.6 Host:BostonLC:P9:boslcp1: system crashed in __find_linux_pte+0xac (kvm) (BZ#1651065)\n\n* [LLNL 7.7 Bug] Rasdaemon doesn’t seem to collect APEI errors (BZ#1664495)\n\nUsers of kernel are advised to upgrade to these updated packages, which fix these bugs.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:0525", url: "https://access.redhat.com/errata/RHSA-2019:0525", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1582358", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1582358", }, { category: "external", summary: "1596773", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1596773", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0525.json", }, ], title: "Red Hat Security Advisory: kernel-alt security and bug fix update", tracking: { current_release_date: "2024-11-22T12:41:28+00:00", generator: { date: "2024-11-22T12:41:28+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:0525", initial_release_date: "2019-03-13T02:11:50+00:00", revision_history: [ { date: "2019-03-13T02:11:50+00:00", number: "1", summary: "Initial version", }, { date: "2019-03-13T02:11:50+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T12:41:28+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product: { name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-devel@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/perf-debuginfo@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "perf-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "perf-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "perf-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/perf@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "python-perf-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "python-perf-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "python-perf-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/python-perf@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-devel@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-headers@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-bootwrapper@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", product: { name: "kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", product_id: "kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-abi-whitelists@4.14.0-115.6.1.el7a?arch=noarch", }, }, }, { category: "product_version", name: "kernel-doc-0:4.14.0-115.6.1.el7a.noarch", product: { name: "kernel-doc-0:4.14.0-115.6.1.el7a.noarch", product_id: "kernel-doc-0:4.14.0-115.6.1.el7a.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-doc@4.14.0-115.6.1.el7a?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-alt-0:4.14.0-115.6.1.el7a.src", product: { name: "kernel-alt-0:4.14.0-115.6.1.el7a.src", product_id: "kernel-alt-0:4.14.0-115.6.1.el7a.src", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-alt@4.14.0-115.6.1.el7a?arch=src", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", }, product_reference: "kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-alt-0:4.14.0-115.6.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", }, product_reference: "kernel-alt-0:4.14.0-115.6.1.el7a.src", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-doc-0:4.14.0-115.6.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", }, product_reference: "kernel-doc-0:4.14.0-115.6.1.el7a.noarch", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "perf-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "python-perf-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "python-perf-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", }, product_reference: "kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-alt-0:4.14.0-115.6.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", }, product_reference: "kernel-alt-0:4.14.0-115.6.1.el7a.src", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-doc-0:4.14.0-115.6.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", }, product_reference: "kernel-doc-0:4.14.0-115.6.1.el7a.noarch", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "perf-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "python-perf-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "python-perf-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, ], }, vulnerabilities: [ { cve: "CVE-2018-10876", cwe: { id: "CWE-416", name: "Use After Free", }, discovery_date: "2018-06-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1596773", }, ], notes: [ { category: "description", text: "A flaw was found in the Linux kernel's ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", title: "Vulnerability description", }, { category: "summary", text: "kernel: use-after-free in jbd2_journal_commit_transaction funtion", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-10876", }, { category: "external", summary: "RHBZ#1596773", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1596773", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-10876", url: "https://www.cve.org/CVERecord?id=CVE-2018-10876", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-10876", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-10876", }, ], release_date: "2018-04-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-03-13T02:11:50+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:0525", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "kernel: use-after-free in jbd2_journal_commit_transaction funtion", }, { cve: "CVE-2018-11412", cwe: { id: "CWE-805", name: "Buffer Access with Incorrect Length Value", }, discovery_date: "2018-05-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1582358", }, ], notes: [ { category: "description", text: "The fs/ext4/inline.c:ext4_read_inline_data() function in the Linux kernel performs a memcpy with an untrusted length value in certain circumstances involving a crafted filesystem that stores the system.data extended attribute value in a dedicated inode. The unbound copy can cause memory corruption or possible privilege escalation.", title: "Vulnerability description", }, { category: "summary", text: "kernel: out-of-bounds memcpy in fs/ext4/inline.c:ext4_read_inline_data() with crafted ext4 image", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-11412", }, { category: "external", summary: "RHBZ#1582358", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1582358", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-11412", url: "https://www.cve.org/CVERecord?id=CVE-2018-11412", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-11412", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-11412", }, ], release_date: "2018-05-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-03-13T02:11:50+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:0525", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "PHYSICAL", availabilityImpact: "HIGH", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "kernel: out-of-bounds memcpy in fs/ext4/inline.c:ext4_read_inline_data() with crafted ext4 image", }, ], }
RHSA-2019:0525
Vulnerability from csaf_redhat
Published
2019-03-13 02:11
Modified
2024-11-22 12:41
Summary
Red Hat Security Advisory: kernel-alt security and bug fix update
Notes
Topic
An update for kernel-alt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-alt packages provide the Linux kernel version 4.x.
Security Fix(es):
* kernel: out-of-bounds memcpy in fs/ext4/inline.c:ext4_read_inline_data() with crafted ext4 image (CVE-2018-11412)
* kernel: use-after-free in jbd2_journal_commit_transaction funtion (CVE-2018-10876)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* blk-mq IO hang in null_blk test (BZ#1581223)
* lpfc remove lpfc_enable_pbde module parameter. (BZ#1615875)
* RHEL-Alt-7.6 - [Power9][DD2.2][4.14.0-109]package installation segfaults inside debian chroot env in P9 KVM guest with HTM enabled (kvm) (BZ#1628817)
* Pegas1.1 - [P9] "threads=2" or higher is required to boot up VM with above 256 vcpu [rhel-alt-7.6.z] (BZ#1634653)
* RHEL-Alt-7.6 Snapshot5 - System crashed under stress-ng & HTX on the mix mode guest (kvm) (BZ#1637890)
* RHEL-Alt-7.6 - BostonESS:P9:DD2.01 - Testing Ethtool options 'r' and 'p' for the i40e driver causes the kernel to crash and reboots the server (i40e) (CORAL) (BZ#1644606)
* RHEL-Alt-7.6 Host/RHV4.2: system crashed and kdump failed to collect CPUs in KVM guests (BZ#1649196)
* RHEL-Alt-7.6 Host:BostonLC:P9:boslcp1: system crashed in __find_linux_pte+0xac (kvm) (BZ#1651065)
* [LLNL 7.7 Bug] Rasdaemon doesn’t seem to collect APEI errors (BZ#1664495)
Users of kernel are advised to upgrade to these updated packages, which fix these bugs.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for kernel-alt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The kernel-alt packages provide the Linux kernel version 4.x.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds memcpy in fs/ext4/inline.c:ext4_read_inline_data() with crafted ext4 image (CVE-2018-11412)\n\n* kernel: use-after-free in jbd2_journal_commit_transaction funtion (CVE-2018-10876)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* blk-mq IO hang in null_blk test (BZ#1581223)\n\n* lpfc remove lpfc_enable_pbde module parameter. (BZ#1615875)\n\n* RHEL-Alt-7.6 - [Power9][DD2.2][4.14.0-109]package installation segfaults inside debian chroot env in P9 KVM guest with HTM enabled (kvm) (BZ#1628817)\n\n* Pegas1.1 - [P9] \"threads=2\" or higher is required to boot up VM with above 256 vcpu [rhel-alt-7.6.z] (BZ#1634653)\n\n* RHEL-Alt-7.6 Snapshot5 - System crashed under stress-ng & HTX on the mix mode guest (kvm) (BZ#1637890)\n\n* RHEL-Alt-7.6 - BostonESS:P9:DD2.01 - Testing Ethtool options 'r' and 'p' for the i40e driver causes the kernel to crash and reboots the server (i40e) (CORAL) (BZ#1644606)\n\n* RHEL-Alt-7.6 Host/RHV4.2: system crashed and kdump failed to collect CPUs in KVM guests (BZ#1649196)\n\n* RHEL-Alt-7.6 Host:BostonLC:P9:boslcp1: system crashed in __find_linux_pte+0xac (kvm) (BZ#1651065)\n\n* [LLNL 7.7 Bug] Rasdaemon doesn’t seem to collect APEI errors (BZ#1664495)\n\nUsers of kernel are advised to upgrade to these updated packages, which fix these bugs.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:0525", url: "https://access.redhat.com/errata/RHSA-2019:0525", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1582358", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1582358", }, { category: "external", summary: "1596773", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1596773", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0525.json", }, ], title: "Red Hat Security Advisory: kernel-alt security and bug fix update", tracking: { current_release_date: "2024-11-22T12:41:28+00:00", generator: { date: "2024-11-22T12:41:28+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:0525", initial_release_date: "2019-03-13T02:11:50+00:00", revision_history: [ { date: "2019-03-13T02:11:50+00:00", number: "1", summary: "Initial version", }, { date: "2019-03-13T02:11:50+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T12:41:28+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product: { name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-devel@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/perf-debuginfo@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "perf-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "perf-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "perf-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/perf@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "python-perf-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "python-perf-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "python-perf-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/python-perf@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-devel@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-headers@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-bootwrapper@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", product: { name: "kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", product_id: "kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-abi-whitelists@4.14.0-115.6.1.el7a?arch=noarch", }, }, }, { category: "product_version", name: "kernel-doc-0:4.14.0-115.6.1.el7a.noarch", product: { name: "kernel-doc-0:4.14.0-115.6.1.el7a.noarch", product_id: "kernel-doc-0:4.14.0-115.6.1.el7a.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-doc@4.14.0-115.6.1.el7a?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-alt-0:4.14.0-115.6.1.el7a.src", product: { name: "kernel-alt-0:4.14.0-115.6.1.el7a.src", product_id: "kernel-alt-0:4.14.0-115.6.1.el7a.src", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-alt@4.14.0-115.6.1.el7a?arch=src", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", }, product_reference: "kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-alt-0:4.14.0-115.6.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", }, product_reference: "kernel-alt-0:4.14.0-115.6.1.el7a.src", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-doc-0:4.14.0-115.6.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", }, product_reference: "kernel-doc-0:4.14.0-115.6.1.el7a.noarch", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "perf-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "python-perf-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "python-perf-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", }, product_reference: "kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-alt-0:4.14.0-115.6.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", }, product_reference: "kernel-alt-0:4.14.0-115.6.1.el7a.src", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-doc-0:4.14.0-115.6.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", }, product_reference: "kernel-doc-0:4.14.0-115.6.1.el7a.noarch", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "perf-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "python-perf-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "python-perf-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, ], }, vulnerabilities: [ { cve: "CVE-2018-10876", cwe: { id: "CWE-416", name: "Use After Free", }, discovery_date: "2018-06-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1596773", }, ], notes: [ { category: "description", text: "A flaw was found in the Linux kernel's ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", title: "Vulnerability description", }, { category: "summary", text: "kernel: use-after-free in jbd2_journal_commit_transaction funtion", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-10876", }, { category: "external", summary: "RHBZ#1596773", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1596773", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-10876", url: "https://www.cve.org/CVERecord?id=CVE-2018-10876", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-10876", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-10876", }, ], release_date: "2018-04-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-03-13T02:11:50+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:0525", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "kernel: use-after-free in jbd2_journal_commit_transaction funtion", }, { cve: "CVE-2018-11412", cwe: { id: "CWE-805", name: "Buffer Access with Incorrect Length Value", }, discovery_date: "2018-05-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1582358", }, ], notes: [ { category: "description", text: "The fs/ext4/inline.c:ext4_read_inline_data() function in the Linux kernel performs a memcpy with an untrusted length value in certain circumstances involving a crafted filesystem that stores the system.data extended attribute value in a dedicated inode. The unbound copy can cause memory corruption or possible privilege escalation.", title: "Vulnerability description", }, { category: "summary", text: "kernel: out-of-bounds memcpy in fs/ext4/inline.c:ext4_read_inline_data() with crafted ext4 image", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-11412", }, { category: "external", summary: "RHBZ#1582358", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1582358", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-11412", url: "https://www.cve.org/CVERecord?id=CVE-2018-11412", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-11412", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-11412", }, ], release_date: "2018-05-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-03-13T02:11:50+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:0525", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "PHYSICAL", availabilityImpact: "HIGH", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "kernel: out-of-bounds memcpy in fs/ext4/inline.c:ext4_read_inline_data() with crafted ext4 image", }, ], }
rhsa-2019_0525
Vulnerability from csaf_redhat
Published
2019-03-13 02:11
Modified
2024-11-22 12:41
Summary
Red Hat Security Advisory: kernel-alt security and bug fix update
Notes
Topic
An update for kernel-alt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-alt packages provide the Linux kernel version 4.x.
Security Fix(es):
* kernel: out-of-bounds memcpy in fs/ext4/inline.c:ext4_read_inline_data() with crafted ext4 image (CVE-2018-11412)
* kernel: use-after-free in jbd2_journal_commit_transaction funtion (CVE-2018-10876)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* blk-mq IO hang in null_blk test (BZ#1581223)
* lpfc remove lpfc_enable_pbde module parameter. (BZ#1615875)
* RHEL-Alt-7.6 - [Power9][DD2.2][4.14.0-109]package installation segfaults inside debian chroot env in P9 KVM guest with HTM enabled (kvm) (BZ#1628817)
* Pegas1.1 - [P9] "threads=2" or higher is required to boot up VM with above 256 vcpu [rhel-alt-7.6.z] (BZ#1634653)
* RHEL-Alt-7.6 Snapshot5 - System crashed under stress-ng & HTX on the mix mode guest (kvm) (BZ#1637890)
* RHEL-Alt-7.6 - BostonESS:P9:DD2.01 - Testing Ethtool options 'r' and 'p' for the i40e driver causes the kernel to crash and reboots the server (i40e) (CORAL) (BZ#1644606)
* RHEL-Alt-7.6 Host/RHV4.2: system crashed and kdump failed to collect CPUs in KVM guests (BZ#1649196)
* RHEL-Alt-7.6 Host:BostonLC:P9:boslcp1: system crashed in __find_linux_pte+0xac (kvm) (BZ#1651065)
* [LLNL 7.7 Bug] Rasdaemon doesn’t seem to collect APEI errors (BZ#1664495)
Users of kernel are advised to upgrade to these updated packages, which fix these bugs.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for kernel-alt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The kernel-alt packages provide the Linux kernel version 4.x.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds memcpy in fs/ext4/inline.c:ext4_read_inline_data() with crafted ext4 image (CVE-2018-11412)\n\n* kernel: use-after-free in jbd2_journal_commit_transaction funtion (CVE-2018-10876)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* blk-mq IO hang in null_blk test (BZ#1581223)\n\n* lpfc remove lpfc_enable_pbde module parameter. (BZ#1615875)\n\n* RHEL-Alt-7.6 - [Power9][DD2.2][4.14.0-109]package installation segfaults inside debian chroot env in P9 KVM guest with HTM enabled (kvm) (BZ#1628817)\n\n* Pegas1.1 - [P9] \"threads=2\" or higher is required to boot up VM with above 256 vcpu [rhel-alt-7.6.z] (BZ#1634653)\n\n* RHEL-Alt-7.6 Snapshot5 - System crashed under stress-ng & HTX on the mix mode guest (kvm) (BZ#1637890)\n\n* RHEL-Alt-7.6 - BostonESS:P9:DD2.01 - Testing Ethtool options 'r' and 'p' for the i40e driver causes the kernel to crash and reboots the server (i40e) (CORAL) (BZ#1644606)\n\n* RHEL-Alt-7.6 Host/RHV4.2: system crashed and kdump failed to collect CPUs in KVM guests (BZ#1649196)\n\n* RHEL-Alt-7.6 Host:BostonLC:P9:boslcp1: system crashed in __find_linux_pte+0xac (kvm) (BZ#1651065)\n\n* [LLNL 7.7 Bug] Rasdaemon doesn’t seem to collect APEI errors (BZ#1664495)\n\nUsers of kernel are advised to upgrade to these updated packages, which fix these bugs.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:0525", url: "https://access.redhat.com/errata/RHSA-2019:0525", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1582358", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1582358", }, { category: "external", summary: "1596773", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1596773", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0525.json", }, ], title: "Red Hat Security Advisory: kernel-alt security and bug fix update", tracking: { current_release_date: "2024-11-22T12:41:28+00:00", generator: { date: "2024-11-22T12:41:28+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:0525", initial_release_date: "2019-03-13T02:11:50+00:00", revision_history: [ { date: "2019-03-13T02:11:50+00:00", number: "1", summary: "Initial version", }, { date: "2019-03-13T02:11:50+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T12:41:28+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product: { name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug-devel@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/perf-debuginfo@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debuginfo@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "perf-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "perf-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "perf-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/perf@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "python-perf-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "python-perf-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "python-perf-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/python-perf@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-devel@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-tools-libs@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-headers@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-debug@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, { category: "product_version", name: "kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", product: { name: "kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", product_id: "kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-bootwrapper@4.14.0-115.6.1.el7a?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", product: { name: "kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", product_id: "kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-abi-whitelists@4.14.0-115.6.1.el7a?arch=noarch", }, }, }, { category: "product_version", name: "kernel-doc-0:4.14.0-115.6.1.el7a.noarch", product: { name: "kernel-doc-0:4.14.0-115.6.1.el7a.noarch", product_id: "kernel-doc-0:4.14.0-115.6.1.el7a.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-doc@4.14.0-115.6.1.el7a?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-alt-0:4.14.0-115.6.1.el7a.src", product: { name: "kernel-alt-0:4.14.0-115.6.1.el7a.src", product_id: "kernel-alt-0:4.14.0-115.6.1.el7a.src", product_identification_helper: { purl: "pkg:rpm/redhat/kernel-alt@4.14.0-115.6.1.el7a?arch=src", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", }, product_reference: "kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-alt-0:4.14.0-115.6.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", }, product_reference: "kernel-alt-0:4.14.0-115.6.1.el7a.src", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-doc-0:4.14.0-115.6.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", }, product_reference: "kernel-doc-0:4.14.0-115.6.1.el7a.noarch", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "perf-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "python-perf-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "python-perf-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", product_id: "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", }, product_reference: "kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-alt-0:4.14.0-115.6.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", }, product_reference: "kernel-alt-0:4.14.0-115.6.1.el7a.src", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-doc-0:4.14.0-115.6.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", }, product_reference: "kernel-doc-0:4.14.0-115.6.1.el7a.noarch", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "perf-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "perf-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "python-perf-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "python-perf-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, { category: "default_component_of", full_product_name: { name: "python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", }, product_reference: "python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", relates_to_product_reference: "7Server-optional-RHELALT-7.6", }, ], }, vulnerabilities: [ { cve: "CVE-2018-10876", cwe: { id: "CWE-416", name: "Use After Free", }, discovery_date: "2018-06-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1596773", }, ], notes: [ { category: "description", text: "A flaw was found in the Linux kernel's ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", title: "Vulnerability description", }, { category: "summary", text: "kernel: use-after-free in jbd2_journal_commit_transaction funtion", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-10876", }, { category: "external", summary: "RHBZ#1596773", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1596773", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-10876", url: "https://www.cve.org/CVERecord?id=CVE-2018-10876", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-10876", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-10876", }, ], release_date: "2018-04-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-03-13T02:11:50+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:0525", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "kernel: use-after-free in jbd2_journal_commit_transaction funtion", }, { cve: "CVE-2018-11412", cwe: { id: "CWE-805", name: "Buffer Access with Incorrect Length Value", }, discovery_date: "2018-05-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1582358", }, ], notes: [ { category: "description", text: "The fs/ext4/inline.c:ext4_read_inline_data() function in the Linux kernel performs a memcpy with an untrusted length value in certain circumstances involving a crafted filesystem that stores the system.data extended attribute value in a dedicated inode. The unbound copy can cause memory corruption or possible privilege escalation.", title: "Vulnerability description", }, { category: "summary", text: "kernel: out-of-bounds memcpy in fs/ext4/inline.c:ext4_read_inline_data() with crafted ext4 image", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-11412", }, { category: "external", summary: "RHBZ#1582358", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1582358", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-11412", url: "https://www.cve.org/CVERecord?id=CVE-2018-11412", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-11412", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-11412", }, ], release_date: "2018-05-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-03-13T02:11:50+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", product_ids: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:0525", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "PHYSICAL", availabilityImpact: "HIGH", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.6.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.6.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.6.1.el7a.ppc64le", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "kernel: out-of-bounds memcpy in fs/ext4/inline.c:ext4_read_inline_data() with crafted ext4 image", }, ], }
fkie_cve-2018-10876
Vulnerability from fkie_nvd
Published
2018-07-26 18:29
Modified
2024-11-21 03:42
Severity ?
5.0 (Medium) - CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | - | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
debian | debian_linux | 8.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", matchCriteriaId: "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", }, { lang: "es", value: "Se ha detectado una vulnerabilidad en el kernel de Linux en el código del sistema de archivos ext4. Es posible un uso de memoria previamente liberada en la función ext4_ext_remove_space() cuando se monta y opera una imagen ext4 manipulada.", }, ], id: "CVE-2018-10876", lastModified: "2024-11-21T03:42:11.993", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 4.9, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 1.3, impactScore: 3.6, source: "secalert@redhat.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-07-26T18:29:00.260", references: [ { source: "secalert@redhat.com", tags: [ "Patch", ], url: "http://patchwork.ozlabs.org/patch/929239/", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/bid/104904", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106503", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:0525", }, { source: "secalert@redhat.com", tags: [ "Exploit", "Issue Tracking", ], url: "https://bugzilla.kernel.org/show_bug.cgi?id=199403", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Patch", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10876", }, { source: "secalert@redhat.com", tags: [ "Patch", ], url: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8844618d8aa7a9973e7b527d038a2a589665002c", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3753-1/", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3753-2/", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3871-1/", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3871-3/", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3871-4/", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3871-5/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://patchwork.ozlabs.org/patch/929239/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/104904", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106503", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:0525", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Issue Tracking", ], url: "https://bugzilla.kernel.org/show_bug.cgi?id=199403", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10876", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8844618d8aa7a9973e7b527d038a2a589665002c", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3753-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3753-2/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3871-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3871-3/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3871-4/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3871-5/", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-416", }, ], source: "secalert@redhat.com", type: "Primary", }, { description: [ { lang: "en", value: "CWE-416", }, ], source: "nvd@nist.gov", type: "Secondary", }, ], }
suse-su-2018:2380-1
Vulnerability from csaf_suse
Published
2018-08-16 12:30
Modified
2018-08-16 12:30
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-5391 aka 'FragmentSmack': A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).
- CVE-2018-10876: A flaw was found in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image. (bnc#1099811)
- CVE-2018-10877: The ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image. (bnc#1099846)
- CVE-2018-10878: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image. (bnc#1099813)
- CVE-2018-10879: A flaw was found in the ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image. (bnc#1099844)
- CVE-2018-10880: Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service. (bnc#1099845)
- CVE-2018-10881: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099864)
- CVE-2018-10882: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image. (bnc#1099849)
- CVE-2018-10883: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099863)
The following non-security bugs were fixed:
- acpi / lpss: Only call pwm_add_table() for Bay Trail PWM if PMIC HRV is 2 (bsc#1051510).
- af_key: Always verify length of provided sadb_key (bsc#1051510).
- af_key: fix buffer overread in parse_exthdrs() (bsc#1051510).
- af_key: fix buffer overread in verify_address_len() (bsc#1051510).
- afs: Fix directory permissions check (bsc#1101828).
- agp: uninorth: make two functions static (bsc#1051510).
- alsa: emu10k1: add error handling for snd_ctl_add (bsc#1051510).
- alsa: emu10k1: Rate-limit error messages about page errors (bsc#1051510).
- alsa: fm801: add error handling for snd_ctl_add (bsc#1051510).
- alsa: usb-audio: Apply rate limit to warning messages in URB complete callback (bsc#1051510).
- arm64: Correct type for PUD macros (bsc#1103723).
- arm64: Disable unhandled signal log messages by default (bsc#1103724).
- arm64: kvm: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1103725).
- arm64: mm: Fix set_memory_valid() declaration (bsc#1103726).
- arm64: perf: correct PMUVer probing (bsc#1103727).
- arm64: ptrace: Avoid setting compat FPR to garbage if get_user fails (bsc#1103728).
- arm64: spinlock: Fix theoretical trylock() A-B-A with LSE atomics (bsc#1103729).
- arm64: vdso: fix clock_getres for 4GiB-aligned res (bsc#1103730).
- arm: 8715/1: add a private asm/unaligned.h (bsc#1051510).
- arm: 8720/1: ensure dump_instr() checks addr_limit (bsc#1051510).
- arm: 8721/1: mm: dump: check hardware RO bit for LPAE (bsc#1051510).
- arm: 8722/1: mm: make STRICT_KERNEL_RWX effective for LPAE (bsc#1051510).
- arm: 8731/1: Fix csum_partial_copy_from_user() stack mismatch (bsc#1051510).
- arm: 8743/1: bL_switcher: add MODULE_LICENSE tag (bsc#1051510).
- arm: 8746/1: vfp: Go back to clearing vfp_current_hw_state[] (bsc#1051510).
- arm: 8748/1: mm: Define vdso_start, vdso_end as array (bsc#1051510).
- arm: 8753/1: decompressor: add a missing parameter to the addruart macro (bsc#1051510).
- arm: 8758/1: decompressor: restore r1 and r2 just before jumping to the kernel (bsc#1051510).
- arm: 8764/1: kgdb: fix NUMREGBYTES so that gdb_regs[] is the correct size (bsc#1051510).
- arm: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed (bsc#1051510).
- arm: 8770/1: kprobes: Prohibit probing on optimized_callback (bsc#1051510).
- arm: 8771/1: kprobes: Prohibit kprobes on do_undefinstr (bsc#1051510).
- arm: 8772/1: kprobes: Prohibit kprobes on get_user functions (bsc#1051510).
- arm: AM33xx: PRM: Remove am33xx_pwrdm_read_prev_pwrst function (bsc#1051510).
- arm: amba: Fix race condition with driver_override (bsc#1051510).
- arm: amba: Fix wrong indentation in driver_override_store() (bsc#1051510).
- arm: amba: Make driver_override output consistent with other buses (bsc#1051510).
- arm: at91: do not select CONFIG_ARM_CPU_SUSPEND for old platforms (bsc#1051510).
- arm: avoid faulting on qemu (bsc#1051510).
- arm: BUG if jumping to usermode address in kernel mode (bsc#1051510).
- arm-ccn: perf: Prevent module unload while PMU is in use (bsc#1051510).
- arm: davinci: Add dma_mask to dm365's eDMA device (bsc#1051510).
- arm: davinci: board-da830-evm: fix GPIO lookup for MMC/SD (bsc#1051510).
- arm: davinci: board-da850-evm: fix GPIO lookup for MMC/SD (bsc#1051510).
- arm: davinci: board-da850-evm: fix WP pin polarity for MMC/SD (bsc#1051510).
- arm: davinci: board-dm355-evm: fix broken networking (bsc#1051510).
- arm: davinci: board-dm646x-evm: pass correct I2C adapter id for VPIF (bsc#1051510).
- arm: davinci: board-dm646x-evm: set VPIF capture card name (bsc#1051510).
- arm: davinci: board-omapl138-hawk: fix GPIO numbers for MMC/SD lookup (bsc#1051510).
- arm: davinci: dm646x: fix timer interrupt generation (bsc#1051510).
- arm: davinci: fix mmc entries in dm365's dma_slave_map (bsc#1051510).
- arm: davinci: fix the GPIO lookup for omapl138-hawk (bsc#1051510).
- arm: davinci: Use platform_device_register_full() to create pdev for dm365's eDMA (bsc#1051510).
- arm: DRA722: remove redundant definition of 1.0 device (bsc#1051510).
- arm: fix return value of parse_cpu_capacity (bsc#1051510).
- arm: kexec: fix failure to boot crash kernel (bsc#1051510).
- arm: kexec: fix kdump register saving on panic() (bsc#1051510).
- arm: keystone: fix platform_domain_notifier array overrun (bsc#1051510).
- arm: kvm: fix building with gcc-8 (bsc#1051510).
- arm: multi_v7_defconfig: Replace DRM_RCAR_HDMI by generic bridge options (bsc#1051510).
- arm: multi_v7_defconfig: Replace SND_SOC_RSRC_CARD by SND_SIMPLE_SCU_CARD (bsc#1051510).
- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bsc#1051510).
- arm: OMAP1: clock: Fix debugfs_create_*() usage (bsc#1051510).
- arm: OMAP2+: Fix SRAM virt to phys translation for save_secure_ram_context (bsc#1051510).
- arm: omap2: hide omap3_save_secure_ram on non-OMAP3 builds (bsc#1051510).
- arm: OMAP2+: omap_device: drop broken RPM status update from suspend_noirq (bsc#1051510).
- arm: OMAP2+: powerdomain: use raw_smp_processor_id() for trace (bsc#1051510).
- arm: OMAP2+: timer: fix a kmemleak caused in omap_get_timer_dt (bsc#1051510).
- arm: OMAP3: Fix prm wake interrupt for resume (bsc#1051510).
- arm: OMAP3: hwmod_data: add missing module_offs for MMC3 (bsc#1051510).
- arm: OMAP3+: PRM: fix of_irq_get() result check (bsc#1051510).
- arm: OMAP4+: PRM: fix of_irq_get() result checks (bsc#1051510).
- arm: OMAP: Fix dmtimer init for omap1 (bsc#1051510).
- arm: OMAP: Fix SRAM W+X mapping (bsc#1051510).
- arm: orion5x: Revert commit 4904dbda41c8 (bsc#1051510).
- arm: orion: fix orion_ge00_switch_board_info initialization (bsc#1051510).
- arm: pxa: select both FB and FB_W100 for eseries (bsc#1051510).
- arm: pxa/tosa-bt: add MODULE_LICENSE tag (bsc#1051510).
- arm: remove wrong CONFIG_PROC_SYSCTL ifdef (bsc#1051510).
- arm: s3c24xx: Fix NAND ECC mode for mini2440 board (bsc#1051510).
- arm: shmobile: defconfig: Enable missing PCIE_RCAR dependency (bsc#1051510).
- arm: shmobile: defconfig: Replace DRM_RCAR_HDMI by generic bridge options (bsc#1051510).
- arm: shmobile: defconfig: Replace SND_SOC_RSRC_CARD by SND_SIMPLE_SCU_CARD (bsc#1051510).
- arm: shmobile: defconfig: Replace USB_XHCI_RCAR by USB_XHCI_PLATFORM (bsc#1051510).
- arm: shmobile: rcar-gen2: Fix deadlock in regulator quirk (bsc#1051510).
- arm: socfpga_defconfig: Remove QSPI Sector 4K size force (bsc#1051510).
- arm: spear13xx: Fix dmas cells (bsc#1051510).
- arm: sunxi_defconfig: Enable CMA (bsc#1051510).
- arm: sunxi: fix the core number of V3s in sunxi README (bsc#1051510).
- asoc: dpcm: fix BE dai not hw_free and shutdown (bsc#1051510).
- asoc: topology: Add missing clock gating parameter when parsing hw_configs (bsc#1051510).
- asoc: topology: Fix bclk and fsync inversion in set_link_hw_format() (bsc#1051510).
- ata: do not schedule hot plug if it is a sas host ().
- ath: Add regulatory mapping for APL13_WORLD (bsc#1051510).
- ath: Add regulatory mapping for APL2_FCCA (bsc#1051510).
- ath: Add regulatory mapping for Bahamas (bsc#1051510).
- ath: Add regulatory mapping for Bermuda (bsc#1051510).
- ath: Add regulatory mapping for ETSI8_WORLD (bsc#1051510).
- ath: Add regulatory mapping for FCC3_ETSIC (bsc#1051510).
- ath: Add regulatory mapping for Serbia (bsc#1051510).
- ath: Add regulatory mapping for Tanzania (bsc#1051510).
- ath: Add regulatory mapping for Uganda (bsc#1051510).
- audit: fix potential null dereference 'context->module.name' (bsc#1051510).
- backlight: pwm_bl: Do not use GPIOF_* with gpiod_get_direction (bsc#1051510).
- bdi: Move cgroup bdi_writeback to a dedicated low concurrency workqueue (bsc#1101867).
- befs_lookup(): use d_splice_alias() (bsc#1101844).
- block: Fix transfer when chunk sectors exceeds max (bsc#1101874).
- bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bsc#1051510).
- bluetooth: btusb: add ID for LiteOn 04ca:301a (bsc#1051510).
- bluetooth: hci_qca: Fix 'Sleep inside atomic section' warning (bsc#1051510).
- branch-check: fix long->int truncation when profiling branches (bsc#1101116,).
- brcmfmac: Add support for bcm43364 wireless chipset (bsc#1051510).
- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).
- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).
- cachefiles: Wait rather than BUG'ing on 'Unexpected object collision' (bsc#1099858).
- can: dev: increase bus-off message severity (bsc#1051510).
- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bsc#1051510).
- can: m_can: change comparison to bitshift when dealing with a mask (bsc#1051510).
- cdrom: do not call check_disk_change() inside cdrom_open() (bsc#1101872).
- clk: at91: fix clk-generated compilation (bsc#1051510).
- clk: renesas: cpg-mssr: Stop using printk format %pCr (bsc#1051510).
- coccinelle: fix parallel build with CHECK=scripts/coccicheck (bsc#1051510).
- compiler.h: enable builtin overflow checkers and add fallback code (bsc#1101116,).
- cpufreq: intel_pstate: Limit the scope of HWP dynamic boost platforms (bsc#1066110).
- cpu/hotplug: Make bringup/teardown of smp threads symmetric (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- crypto: authenc - do not leak pointers to authenc keys (bsc#1051510).
- crypto: authencesn - do not leak pointers to authenc keys (bsc#1051510).
- crypto: padlock-aes - Fix Nano workaround data corruption (bsc#1051510).
- delayacct: fix crash in delayacct_blkio_end() after delayacct init failure (bsc#1104066).
- dm: add writecache target (bsc#1101116,).
- dm: prevent DAX mounts if not supported (bsc#1103917).
- dm writecache: support optional offset for start of device (bsc#1101116,).
- dm writecache: use 2-factor allocator arguments (bsc#1101116,).
- doc: Add vendor prefix for Kieback & Peter GmbH (bsc#1051510).
- drivers: soc: sunxi: fix error processing on base address when claiming (bsc#1051510).
- drm: Add DP PSR2 sink enable bit (bsc#1051510).
- drm/amdgpu: Remove VRAM from shared bo domains (bsc#1051510).
- drm/atomic: Check old_plane_state->crtc in drm_atomic_helper_async_check() (bsc#1051510).
- drm/atomic: Handling the case when setting old crtc for plane (bsc#1051510).
- drm/atomic-helper: Drop plane->fb references only for drm_atomic_helper_shutdown() (bsc#1051510).
- drm/atomic: Initialize variables in drm_atomic_helper_async_check() to make gcc happy (bsc#1051510).
- drm/atomic: Make async plane update checks work as intended, v2 (bsc#1051510).
- drm/atomic: Make atomic helper track newly assigned planes correctly, v2 (bsc#1051510).
- drm/atomic: Make atomic iterators less surprising (bsc#1051510).
- drm/dp/mst: Fix off-by-one typo when dump payload table (bsc#1051510).
- drm/gma500: fix psb_intel_lvds_mode_valid()'s return type (bsc#1051510).
- drm/nouveau/fifo/gk104-: poll for runlist update completion (bsc#1051510).
- drm/radeon: fix mode_valid's return type (bsc#1051510).
- drm: re-enable error handling (bsc#1051510).
- drm/vc4: Reset ->{x, y}_scaling[1] when dealing with uniplanar formats (bsc#1051510).
- Enable / support pinctrl-lewisburg ()
- ext2: fix a block leak (bsc#1101875).
- ext4: add more mount time checks of the superblock (bsc#1101900).
- ext4: bubble errors from ext4_find_inline_data_nolock() up to ext4_iget() (bsc#1101896).
- ext4: check superblock mapped prior to committing (bsc#1101902).
- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).
- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix fencepost error in check for inode count overflow during resize (bsc#1101853).
- ext4: include the illegal physical block in the bad map ext4_error msg (bsc#1101903).
- ext4: report delalloc reserve as non-free in statfs for project quota (bsc#1101843).
- ext4: update mtime in ext4_punch_hole even if no blocks are released (bsc#1101895).
- f2fs: call unlock_new_inode() before d_instantiate() (bsc#1101837).
- fix io_destroy()/aio_complete() race (bsc#1101852).
- Force log to disk before reading the AGF during a fstrim (bsc#1101893).
- fs: allow per-device dax status checking for filesystems (bsc#1103917).
- fscache: Allow cancelled operations to be enqueued (bsc#1099858).
- fscache: Fix hanging wait on page discarded by writeback (bsc#1101885).
- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).
- fs: clear writeback errors in inode_init_always (bsc#1101882).
- fs: do not scan the inode cache before SB_BORN is set (bsc#1101883).
- genirq: Check __free_irq() return value for NULL (bsc#1103517).
- hid: hid-plantronics: Re-resend Update to map button for PTT products (bsc#1051510).
- hid: i2c-hid: check if device is there before really probing (bsc#1051510).
- hippi: Fix a Fix a possible sleep-in-atomic bug in rr_close (bsc#1051510).
- hv_netvsc: Ensure correct teardown message sequence order ().
- hv/netvsc: fix handling of fallback to single queue mode ().
- hv_netvsc: Fix net device attach on older Windows hosts ().
- hv_netvsc: set master device (bsc#1051979).
- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() ().
- hv_netvsc: split sub-channel setup into async and sync ().
- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown ().
- ibmasm: do not write out of bounds in read handler (bsc#1051510).
- ibmvnic: Remove code to request error information (bsc#1104174).
- ibmvnic: Revise RX/TX queue error messages (bsc#1101331).
- ibmvnic: Update firmware error reporting with cause string (bsc#1104174).
- input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bsc#1051510).
- input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bsc#1051510).
- input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bsc#1051510).
- irqchip: brcmstb-l2: Define an irq_pm_shutdown function (bsc#1051510).
- irqchip/gic: Take lock when updating irq type (bsc#1051510).
- irqchip/gic-v3: Change pr_debug message to pr_devel (bsc#1051510).
- irqchip/gic-v3: Fix the driver probe() fail due to disabled GICC entry (bsc#1051510).
- irqchip/gic-v3: Ignore disabled ITS nodes (bsc#1051510).
- irqchip/gic-v3: Use wmb() instead of smb_wmb() in gic_raise_softirq() (bsc#1051510).
- irqchip/qcom: Fix check for spurious interrupts (bsc#1051510).
- irqchip/qcom: Fix u32 comparison with value less than zero (bsc#1051510).
- isofs: fix potential memory leak in mount option parsing (bsc#1101887).
- iwlwifi: add more card IDs for 9000 series (bsc#1051510).
- iwlwifi: pcie: fix race in Rx buffer allocator (bsc#1051510).
- jump_label: Fix concurrent static_key_enable/disable() (bsc#1089343).
- jump_label: Provide hotplug context variants (bsc#1089343).
- jump_label: Reorder hotplug lock and jump_label_lock (bsc#1089343).
- kabi protect bdev_dax_supported (bsc#1103917).
- kabi protect struct ccw_device_private (bsc#1103421).
- kabi/severities: do not complain on hisi_sas internal changes ().
- kabi/severities: ignore x86_kvm_ops; lttng-modules would have to be adjusted in case they depend on this particular change
- kbuild: add '-fno-stack-check' to kernel build options (bsc#1051510).
- kbuild: Handle builtin dtb file names containing hyphens (bsc#1051510).
- kbuild: pkg: use --transform option to prefix paths in tar (bsc#1051510).
- kconfig: display recursive dependency resolution hint just once (bsc#1051510).
- kmemleak: add scheduling point to kmemleak_scan() (bsc#1051510).
- kvm: SVM: Add pause filter threshold ().
- kvm: SVM: Implement pause loop exit logic in SVM ().
- kvm: VMX: Bring the common code to header file ().
- kvm: VMX: Fix the module parameters for vmx ().
- kvm: VMX: Remove ple_window_actual_max ().
- libata: add refcounting to ata_host (git-fixes).
- libata: ensure host is free'd on error exit paths (git-fixes).
- libnvdimm, dimm: fix dpa reservation vs uninitialized label area (git-fixes).
- linvdimm, pmem: Preserve read-only setting for pmem devices (git-fixes).
- media: media-device: fix ioctl function types (bsc#1051510).
- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bsc#1051510).
- media: saa7164: Fix driver name in debug output (bsc#1051510).
- media: si470x: fix __be16 annotations (bsc#1051510).
- media: siano: get rid of __le32/__le16 cast warnings (bsc#1051510).
- media: tw686x: Fix incorrect vb2_mem_ops GFP flags (bsc#1051510).
- mfd: cros_ec: Fail early if we cannot identify the EC (bsc#1051510).
- mfd: fsl-imx25: Clean up irq settings during removal (bsc#1051510).
- mfd: mxs-lradc: Fix error handling in mxs_lradc_probe() (bsc#1051510).
- misc: pci_endpoint_test: Avoid triggering a BUG() (bsc#1051510).
- mmc: dw_mmc: update actual clock for mmc debugfs (bsc#1051510).
- mmc: pwrseq: Use kmalloc_array instead of stack VLA (bsc#1051510).
- mm: fix __gup_device_huge vs unmap (bsc#1101839).
- mm/kmemleak.c: make cond_resched() rate-limiting more efficient (bsc#1051510).
- mwifiex: correct histogram data with appropriate index (bsc#1051510).
- mwifiex: handle race during mwifiex_usb_disconnect (bsc#1051510).
- nohz: Fix local_timer_softirq_pending() (bsc#1051510).
- nvme: ensure forward progress during Admin passthru (git-fixes).
- nvme-fabrics: Ignore nr_io_queues option for discovery controllers (bsc#1102633).
- nvme: fixup crash on failed discovery (bsc#1103920).
- nvme.h: fixup ANA group descriptor format (bsc#1104111).
- nvme: use hw qid in trace events (bsc#1102633).
- orangefs: report attributes_mask and attributes for statx (bsc#1101832).
- orangefs: set i_size on new symlink (bsc#1101845).
- overflow.h: Add allocation size calculation helpers (bsc#1101116,).
- pci: pciehp: Assume NoCompl+ for Thunderbolt ports (bsc#1051510).
- pci: pciehp: Request control of native hotplug only if supported (bsc#1051510).
- pci: Prevent sysfs disable of device while driver is attached (bsc#1051510).
- pinctrl: at91-pio4: add missing of_node_put (bsc#1051510).
- pinctrl: intel: Add Intel Lewisburg GPIO support ().
- pinctrl: nand: meson-gxl: fix missing data pins (bsc#1051510).
- pmem: only set QUEUE_FLAG_DAX for fsdax mode (bsc#1103917).
- qed*: Add link change count value to ethtool statistics display (bsc#1086314).
- qed: Add qed APIs for PHY module query (bsc#1086314 ).
- qed: Add srq core support for RoCE and iWARP (bsc#1086314 ).
- qede: Add driver callbacks for eeprom module query (bsc#1086314 ).
- qed: fix spelling mistake 'successffuly' -> 'successfully' (bsc#1086314).
- qed: Make some functions static (bsc#1086314).
- qed: remove redundant functions qed_get_cm_pq_idx_rl (bsc#1086314).
- qed: remove redundant functions qed_set_gft_event_id_cm_hdr (bsc#1086314).
- qed: remove redundant pointer 'name' (bsc#1086314).
- qed: use dma_zalloc_coherent instead of allocator/memset (bsc#1086314).
- qed*: Utilize FW 8.37.2.0 (bsc#1086314).
- RDMA/qedr: Fix NULL pointer dereference when running over iWARP without RDMA-CM (bsc#1086314).
- RDMA/qedr: fix spelling mistake: 'adrresses' -> 'addresses' (bsc#1086314).
- RDMA/qedr: fix spelling mistake: 'failes' -> 'fails' (bsc#1086314).
- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bsc#1051510).
- reiserfs: fix buffer overflow with long warning messages (bsc#1101847).
- Revert 'drm/nouveau/drm/therm/fan: add a fallback if no fan control is specified in the vbios' (bsc#1103356).
- s390/cio: clear timer when terminating driver I/O (bsc#1103421).
- s390/cio: fix return code after missing interrupt (bsc#1103421).
- s390/dasd: fix handling of internal requests (bsc#1103421).
- s390/dasd: fix wrongly assigned configuration data (bsc#1103421).
- s390/dasd: prevent prefix I/O error (bsc#1103421).
- s390/eadm: fix CONFIG_BLOCK include dependency (bsc#1103421).
- s390/ipl: ensure loadparm valid flag is set (bsc#1103421).
- s390/pci: do not require AIS facility (bsc#1103421).
- s390/qdio: do not release memory in qdio_setup_irq() (bsc#1103421).
- sc16is7xx: Check for an error when the clock is enabled (bsc#1051510).
- sched/fair: Consider RT/IRQ pressure in capacity_spare_wake() (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Fix find_idlest_group() when local group is not allowed (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Fix usage of find_idlest_group() when no groups are allowed (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Fix usage of find_idlest_group() when the local group is idlest (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Move select_task_rq_fair() slow-path into its own function (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Remove impossible condition from find_idlest_group_cpu() (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Remove unnecessary comparison with -1 (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Spare idle load balancing on nohz_full CPUs (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Use 'unsigned long' for utilization, consistently (bnc#1101669 optimise numa balancing for fast migrate).
- sched/smt: Update sched_smt_present at runtime (bsc#1089343).
- scsi: ata: enhance the definition of SET MAX feature field value ().
- scsi: hisi_sas: add an mechanism to do reset work synchronously ().
- scsi: hisi_sas: add check of device in hisi_sas_task_exec() ().
- scsi: hisi_sas: add internal abort dev in some places ().
- scsi: hisi_sas: Add LED feature for v3 hw ().
- scsi: hisi_sas: add RAS feature for v3 hw ().
- scsi: hisi_sas: add readl poll timeout helper wrappers ().
- scsi: hisi_sas: Add some checks to avoid free'ing a sas_task twice ().
- scsi: hisi_sas: add some print to enhance debugging ().
- scsi: hisi_sas: Add v2 hw force PHY function for internal ATA command ().
- scsi: hisi_sas: add v2 hw port AXI error handling support ().
- scsi: hisi_sas: add v3 hw MODULE_DEVICE_TABLE() ().
- scsi: hisi_sas: add v3 hw suspend and resume ().
- scsi: hisi_sas: allocate slot buffer earlier ().
- scsi: hisi_sas: Change common allocation mode of device id ().
- scsi: hisi_sas: Change frame type for SET MAX commands ().
- scsi: hisi_sas: change ncq process for v3 hw ().
- scsi: hisi_sas: change slot index allocation mode ().
- scsi: hisi_sas: check host frozen before calling 'done' function ().
- scsi: hisi_sas: check IPTT is valid before using it for v3 hw ().
- scsi: hisi_sas: check sas_dev gone earlier in hisi_sas_abort_task() ().
- scsi: hisi_sas: Code cleanup and minor bug fixes ().
- scsi: hisi_sas: config ATA de-reset as an constrained command for v3 hw ().
- scsi: hisi_sas: consolidate command check in hisi_sas_get_ata_protocol() ().
- scsi: hisi_sas: Create a scsi_host_template per HW module ().
- scsi: hisi_sas: delete timer when removing hisi_sas driver ().
- scsi: hisi_sas: do link reset for some CHL_INT2 ints ().
- scsi: hisi_sas: Do not lock DQ for complete task sending ().
- scsi: hisi_sas: dt-bindings: add an property of signal attenuation ().
- scsi: hisi_sas: fix a bug in hisi_sas_dev_gone() ().
- scsi: hisi_sas: fix a typo in hisi_sas_task_prep() ().
- scsi: hisi_sas: fix dma_unmap_sg() parameter ().
- scsi: hisi_sas: fix PI memory size ().
- scsi: hisi_sas: fix return value of hisi_sas_task_prep() ().
- scsi: hisi_sas: Fix return value when get_free_slot() failed ().
- scsi: hisi_sas: fix SAS_QUEUE_FULL problem while running IO ().
- scsi: hisi_sas: fix the issue of link rate inconsistency ().
- scsi: hisi_sas: fix the issue of setting linkrate register ().
- scsi: hisi_sas: improve int_chnl_int_v2_hw() consistency with v3 hw ().
- scsi: hisi_sas: Include TMF elements in struct hisi_sas_slot ().
- scsi: hisi_sas: increase timer expire of internal abort task ().
- scsi: hisi_sas: Init disks after controller reset ().
- scsi: hisi_sas: initialize dq spinlock before use ().
- scsi: hisi_sas: Introduce hisi_sas_phy_set_linkrate() ().
- scsi: hisi_sas: judge result of internal abort ().
- scsi: hisi_sas: make local symbol host_attrs static ().
- scsi: hisi_sas: make return type of prep functions void ().
- scsi: hisi_sas: make SAS address of SATA disks unique ().
- scsi: hisi_sas: Mark PHY as in reset for nexus reset ().
- scsi: hisi_sas: modify hisi_sas_dev_gone() for reset ().
- scsi: hisi_sas: modify some register config for hip08 ().
- scsi: hisi_sas: optimise port id refresh function ().
- scsi: hisi_sas: optimise the usage of DQ locking ().
- scsi: hisi_sas: print device id for errors ().
- scsi: hisi_sas: re-add the lldd_port_deformed() ().
- scsi: hisi_sas: relocate clearing ITCT and freeing device ().
- scsi: hisi_sas: relocate smp sg map ().
- scsi: hisi_sas: Remove depends on HAS_DMA in case of platform dependency ().
- scsi: hisi_sas: remove redundant handling to event95 for v3 ().
- scsi: hisi_sas: remove some unneeded structure members ().
- scsi: hisi_sas: remove unused variable hisi_sas_devices.running_req ().
- scsi: hisi_sas: Reset disks when discovered ().
- scsi: hisi_sas: some optimizations of host controller reset ().
- scsi: hisi_sas: stop controller timer for reset ().
- scsi: hisi_sas: support the property of signal attenuation for v2 hw ().
- scsi: hisi_sas: Terminate STP reject quickly for v2 hw ().
- scsi: hisi_sas: Try wait commands before before controller reset ().
- scsi: hisi_sas: update PHY linkrate after a controller reset ().
- scsi: hisi_sas: update RAS feature for later revision of v3 HW ().
- scsi: hisi_sas: use an general way to delay PHY work ().
- scsi: hisi_sas: Use device lock to protect slot alloc/free ().
- scsi: hisi_sas: use dma_zalloc_coherent() ().
- scsi: hisi_sas: workaround a v3 hw hilink bug ().
- scsi: libsas: defer ata device eh commands to libata ().
- scsi: lpfc: Add Buffer overflow check, when nvme_info larger than PAGE_SIZE (bsc#1102658).
- scsi: lpfc: Correct LCB ACCept payload (bsc#1102658).
- scsi: lpfc: devloss timeout race condition caused null pointer reference (bsc#1102658).
- scsi: lpfc: Fix abort error path for NVMET (bsc#1102658).
- scsi: lpfc: Fix driver crash when re-registering NVME rports (bsc#1102658).
- scsi: lpfc: Fix driver not setting dpp bits correctly in doorbell word (bsc#1102658).
- scsi: lpfc: Fix ELS abort on SLI-3 adapters (bsc#1102658).
- scsi: lpfc: Fix list corruption on the completion queue (bsc#1102658).
- scsi: lpfc: Fix NVME Target crash in defer rcv logic (bsc#1102658).
- scsi: lpfc: Fix panic if driver unloaded when port is offline (bsc#1102658).
- scsi: lpfc: Fix sysfs Speed value on CNA ports (bsc#1102658).
- scsi: lpfc: Limit tracking of tgt queue depth in fast path (bsc#1102658).
- scsi: lpfc: Make PBDE optimizations configurable (bsc#1102658).
- scsi: lpfc: Remove lpfc_enable_pbde as module parameter (bsc#1102658).
- scsi: lpfc: Revise copyright for new company language (bsc#1102658).
- scsi: lpfc: Support duration field in Link Cable Beacon V1 command (bsc#1102658).
- scsi: lpfc: update driver version to 12.0.0.5 (bsc#1102658).
- scsi: lpfc: update driver version to 12.0.0.6 (bsc#1102658).
- scsi: qla2xxx: Avoid double completion of abort command (git-fixes).
- scsi: qla2xxx: Fix driver unload by shutting down chip (git-fixes).
- scsi: qla2xxx: Fix NPIV deletion by calling wait_for_sess_deletion (git-fixes).
- scsi: qla2xxx: Fix NULL pointer dereference for fcport search (git-fixes).
- scsi: qla2xxx: Fix unintialized List head crash (git-fixes).
- scsi: qla2xxx: Return error when TMF returns (git-fixes).
- scsi: smartpqi: add in new supported controllers (bsc#1086274).
- scsi: smartpqi: add inspur advantech ids (bsc#1086274).
- scsi: smartpqi: bump driver version to 1.1.4-130 (bsc#1086274).
- scsi: smartpqi: fix critical ARM issue reading PQI index registers (bsc#1086274).
- scsi: smartpqi: improve error checking for sync requests (bsc#1086274).
- scsi: smartpqi: improve handling for sync requests (bsc#1086274).
- scsi: smartpqi: update driver version (bsc#1086274).
- scsi: smartpqi: workaround fw bug for oq deletion (bsc#1086274).
- sctp: fix the issue that pathmtu may be set lower than MINSEGMENT (git-fixes).
- sctp: introduce sctp_dst_mtu (git-fixes).
- soc: bcm2835: Make !RASPBERRYPI_FIRMWARE dummies return failure (bsc#1051510).
- soc: bcm: raspberrypi-power: Fix use of __packed (bsc#1051510).
- soc: imx: gpc: de-register power domains only if initialized (bsc#1051510).
- soc: imx: gpc: restrict register range for regmap access (bsc#1051510).
- soc: imx: gpcv2: correct PGC offset (bsc#1051510).
- soc: imx: gpcv2: Do not pass static memory as platform data (bsc#1051510).
- soc: imx: gpcv2: fix regulator deferred probe (bsc#1051510).
- soc: mediatek: pwrap: fix compiler errors (bsc#1051510).
- soc: qcom: wcnss_ctrl: Fix increment in NV upload (bsc#1051510).
- soc: rockchip: power-domain: Fix wrong value when power up pd with writemask (bsc#1051510).
- soc/tegra: Fix bad of_node_put() in powergate init (bsc#1051510).
- soc/tegra: flowctrl: Fix error handling (bsc#1051510).
- soc: ti: ti_sci_pm_domains: Populate name for genpd (bsc#1051510).
- soc: zte: Restrict SOC_ZTE to ARCH_ZX or COMPILE_TEST (bsc#1051510).
- spi: bcm2835aux: ensure interrupts are enabled for shared handler (bsc#1051510).
- spi/bcm63xx-hspi: Enable the clock before calling clk_get_rate() (bsc#1051510).
- spi: bcm-qspi: Always read and set BSPI_MAST_N_BOOT_CTRL (bsc#1051510).
- spi: bcm-qspi: Avoid setting MSPI_CDRAM_PCS for spi-nor master (bsc#1051510).
- spi: cadence: Add usleep_range() for cdns_spi_fill_tx_fifo() (bsc#1051510).
- spi: pxa2xx: Allow 64-bit DMA (bsc#1051510).
- spi: pxa2xx: check clk_prepare_enable() return value (bsc#1051510).
- sr: pass down correctly sized SCSI sense buffer (git-fixes).
- staging: ks7010: Use constants from ieee80211_eid instead of literal ints (bsc#1051510).
- staging: speakup: fix wraparound in uaccess length check (bsc#1051510).
- supported.conf: add drivers/md/dm-writecache
- sysrq : fix Show Regs call trace on ARM (bsc#1051510).
- thermal: exynos: fix setting rising_threshold for Exynos5433 (bsc#1051510).
- tty: Fix data race in tty_insert_flip_string_fixed_flag (bsc#1051510).
- typec: tcpm: Fix a msecs vs jiffies bug (bsc#1100132).
- udf: Detect incorrect directory size (bsc#1101891).
- udf: Provide saner default for invalid uid / gid (bsc#1101890).
- Update config files to add CONFIG_DM_WRITECACHE=m
- Update patches.arch/KVM-PPC-Check-if-IOMMU-page-is-contained-in-the-pinn.patch (bsc#1077761, git-fixes, bsc#1103948, bsc#1103949).
- usb: hub: Do not wait for connect state at resume for powered-off ports (bsc#1051510).
- usbip: usbip_detach: Fix memory, udev context and udev leak (bsc#1051510).
- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).
- virtio_balloon: fix another race between migration and ballooning (bsc#1051510).
- wlcore: sdio: check for valid platform device data before suspend (bsc#1051510).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/KVM/VMX: Add module argument for L1TF mitigation.
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- x86: Treat R_X86_64_PLT32 as R_X86_64_PC32 (binutils_2.31).
- xfs: catch inode allocation state mismatch corruption (bsc#1104211).
- xfs: prevent creating negative-sized file via INSERT_RANGE (bsc#1101833).
Patchnames
SUSE-SLE-Module-Basesystem-15-2018-1614,SUSE-SLE-Module-Development-Tools-15-2018-1614,SUSE-SLE-Module-Legacy-15-2018-1614,SUSE-SLE-Product-HA-15-2018-1614,SUSE-SLE-Product-WE-15-2018-1614
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).\n- CVE-2018-5391 aka 'FragmentSmack': A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).\n- CVE-2018-10876: A flaw was found in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image. (bnc#1099811)\n- CVE-2018-10877: The ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image. (bnc#1099846)\n- CVE-2018-10878: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image. (bnc#1099813)\n- CVE-2018-10879: A flaw was found in the ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image. (bnc#1099844)\n- CVE-2018-10880: Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service. (bnc#1099845)\n- CVE-2018-10881: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099864)\n- CVE-2018-10882: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image. (bnc#1099849)\n- CVE-2018-10883: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099863)\n\nThe following non-security bugs were fixed:\n\n- acpi / lpss: Only call pwm_add_table() for Bay Trail PWM if PMIC HRV is 2 (bsc#1051510).\n- af_key: Always verify length of provided sadb_key (bsc#1051510).\n- af_key: fix buffer overread in parse_exthdrs() (bsc#1051510).\n- af_key: fix buffer overread in verify_address_len() (bsc#1051510).\n- afs: Fix directory permissions check (bsc#1101828).\n- agp: uninorth: make two functions static (bsc#1051510).\n- alsa: emu10k1: add error handling for snd_ctl_add (bsc#1051510).\n- alsa: emu10k1: Rate-limit error messages about page errors (bsc#1051510).\n- alsa: fm801: add error handling for snd_ctl_add (bsc#1051510).\n- alsa: usb-audio: Apply rate limit to warning messages in URB complete callback (bsc#1051510).\n- arm64: Correct type for PUD macros (bsc#1103723).\n- arm64: Disable unhandled signal log messages by default (bsc#1103724).\n- arm64: kvm: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1103725).\n- arm64: mm: Fix set_memory_valid() declaration (bsc#1103726).\n- arm64: perf: correct PMUVer probing (bsc#1103727).\n- arm64: ptrace: Avoid setting compat FPR to garbage if get_user fails (bsc#1103728).\n- arm64: spinlock: Fix theoretical trylock() A-B-A with LSE atomics (bsc#1103729).\n- arm64: vdso: fix clock_getres for 4GiB-aligned res (bsc#1103730).\n- arm: 8715/1: add a private asm/unaligned.h (bsc#1051510).\n- arm: 8720/1: ensure dump_instr() checks addr_limit (bsc#1051510).\n- arm: 8721/1: mm: dump: check hardware RO bit for LPAE (bsc#1051510).\n- arm: 8722/1: mm: make STRICT_KERNEL_RWX effective for LPAE (bsc#1051510).\n- arm: 8731/1: Fix csum_partial_copy_from_user() stack mismatch (bsc#1051510).\n- arm: 8743/1: bL_switcher: add MODULE_LICENSE tag (bsc#1051510).\n- arm: 8746/1: vfp: Go back to clearing vfp_current_hw_state[] (bsc#1051510).\n- arm: 8748/1: mm: Define vdso_start, vdso_end as array (bsc#1051510).\n- arm: 8753/1: decompressor: add a missing parameter to the addruart macro (bsc#1051510).\n- arm: 8758/1: decompressor: restore r1 and r2 just before jumping to the kernel (bsc#1051510).\n- arm: 8764/1: kgdb: fix NUMREGBYTES so that gdb_regs[] is the correct size (bsc#1051510).\n- arm: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed (bsc#1051510).\n- arm: 8770/1: kprobes: Prohibit probing on optimized_callback (bsc#1051510).\n- arm: 8771/1: kprobes: Prohibit kprobes on do_undefinstr (bsc#1051510).\n- arm: 8772/1: kprobes: Prohibit kprobes on get_user functions (bsc#1051510).\n- arm: AM33xx: PRM: Remove am33xx_pwrdm_read_prev_pwrst function (bsc#1051510).\n- arm: amba: Fix race condition with driver_override (bsc#1051510).\n- arm: amba: Fix wrong indentation in driver_override_store() (bsc#1051510).\n- arm: amba: Make driver_override output consistent with other buses (bsc#1051510).\n- arm: at91: do not select CONFIG_ARM_CPU_SUSPEND for old platforms (bsc#1051510).\n- arm: avoid faulting on qemu (bsc#1051510).\n- arm: BUG if jumping to usermode address in kernel mode (bsc#1051510).\n- arm-ccn: perf: Prevent module unload while PMU is in use (bsc#1051510).\n- arm: davinci: Add dma_mask to dm365's eDMA device (bsc#1051510).\n- arm: davinci: board-da830-evm: fix GPIO lookup for MMC/SD (bsc#1051510).\n- arm: davinci: board-da850-evm: fix GPIO lookup for MMC/SD (bsc#1051510).\n- arm: davinci: board-da850-evm: fix WP pin polarity for MMC/SD (bsc#1051510).\n- arm: davinci: board-dm355-evm: fix broken networking (bsc#1051510).\n- arm: davinci: board-dm646x-evm: pass correct I2C adapter id for VPIF (bsc#1051510).\n- arm: davinci: board-dm646x-evm: set VPIF capture card name (bsc#1051510).\n- arm: davinci: board-omapl138-hawk: fix GPIO numbers for MMC/SD lookup (bsc#1051510).\n- arm: davinci: dm646x: fix timer interrupt generation (bsc#1051510).\n- arm: davinci: fix mmc entries in dm365's dma_slave_map (bsc#1051510).\n- arm: davinci: fix the GPIO lookup for omapl138-hawk (bsc#1051510).\n- arm: davinci: Use platform_device_register_full() to create pdev for dm365's eDMA (bsc#1051510).\n- arm: DRA722: remove redundant definition of 1.0 device (bsc#1051510).\n- arm: fix return value of parse_cpu_capacity (bsc#1051510).\n- arm: kexec: fix failure to boot crash kernel (bsc#1051510).\n- arm: kexec: fix kdump register saving on panic() (bsc#1051510).\n- arm: keystone: fix platform_domain_notifier array overrun (bsc#1051510).\n- arm: kvm: fix building with gcc-8 (bsc#1051510).\n- arm: multi_v7_defconfig: Replace DRM_RCAR_HDMI by generic bridge options (bsc#1051510).\n- arm: multi_v7_defconfig: Replace SND_SOC_RSRC_CARD by SND_SIMPLE_SCU_CARD (bsc#1051510).\n- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bsc#1051510).\n- arm: OMAP1: clock: Fix debugfs_create_*() usage (bsc#1051510).\n- arm: OMAP2+: Fix SRAM virt to phys translation for save_secure_ram_context (bsc#1051510).\n- arm: omap2: hide omap3_save_secure_ram on non-OMAP3 builds (bsc#1051510).\n- arm: OMAP2+: omap_device: drop broken RPM status update from suspend_noirq (bsc#1051510).\n- arm: OMAP2+: powerdomain: use raw_smp_processor_id() for trace (bsc#1051510).\n- arm: OMAP2+: timer: fix a kmemleak caused in omap_get_timer_dt (bsc#1051510).\n- arm: OMAP3: Fix prm wake interrupt for resume (bsc#1051510).\n- arm: OMAP3: hwmod_data: add missing module_offs for MMC3 (bsc#1051510).\n- arm: OMAP3+: PRM: fix of_irq_get() result check (bsc#1051510).\n- arm: OMAP4+: PRM: fix of_irq_get() result checks (bsc#1051510).\n- arm: OMAP: Fix dmtimer init for omap1 (bsc#1051510).\n- arm: OMAP: Fix SRAM W+X mapping (bsc#1051510).\n- arm: orion5x: Revert commit 4904dbda41c8 (bsc#1051510).\n- arm: orion: fix orion_ge00_switch_board_info initialization (bsc#1051510).\n- arm: pxa: select both FB and FB_W100 for eseries (bsc#1051510).\n- arm: pxa/tosa-bt: add MODULE_LICENSE tag (bsc#1051510).\n- arm: remove wrong CONFIG_PROC_SYSCTL ifdef (bsc#1051510).\n- arm: s3c24xx: Fix NAND ECC mode for mini2440 board (bsc#1051510).\n- arm: shmobile: defconfig: Enable missing PCIE_RCAR dependency (bsc#1051510).\n- arm: shmobile: defconfig: Replace DRM_RCAR_HDMI by generic bridge options (bsc#1051510).\n- arm: shmobile: defconfig: Replace SND_SOC_RSRC_CARD by SND_SIMPLE_SCU_CARD (bsc#1051510).\n- arm: shmobile: defconfig: Replace USB_XHCI_RCAR by USB_XHCI_PLATFORM (bsc#1051510).\n- arm: shmobile: rcar-gen2: Fix deadlock in regulator quirk (bsc#1051510).\n- arm: socfpga_defconfig: Remove QSPI Sector 4K size force (bsc#1051510).\n- arm: spear13xx: Fix dmas cells (bsc#1051510).\n- arm: sunxi_defconfig: Enable CMA (bsc#1051510).\n- arm: sunxi: fix the core number of V3s in sunxi README (bsc#1051510).\n- asoc: dpcm: fix BE dai not hw_free and shutdown (bsc#1051510).\n- asoc: topology: Add missing clock gating parameter when parsing hw_configs (bsc#1051510).\n- asoc: topology: Fix bclk and fsync inversion in set_link_hw_format() (bsc#1051510).\n- ata: do not schedule hot plug if it is a sas host ().\n- ath: Add regulatory mapping for APL13_WORLD (bsc#1051510).\n- ath: Add regulatory mapping for APL2_FCCA (bsc#1051510).\n- ath: Add regulatory mapping for Bahamas (bsc#1051510).\n- ath: Add regulatory mapping for Bermuda (bsc#1051510).\n- ath: Add regulatory mapping for ETSI8_WORLD (bsc#1051510).\n- ath: Add regulatory mapping for FCC3_ETSIC (bsc#1051510).\n- ath: Add regulatory mapping for Serbia (bsc#1051510).\n- ath: Add regulatory mapping for Tanzania (bsc#1051510).\n- ath: Add regulatory mapping for Uganda (bsc#1051510).\n- audit: fix potential null dereference 'context->module.name' (bsc#1051510).\n- backlight: pwm_bl: Do not use GPIOF_* with gpiod_get_direction (bsc#1051510).\n- bdi: Move cgroup bdi_writeback to a dedicated low concurrency workqueue (bsc#1101867).\n- befs_lookup(): use d_splice_alias() (bsc#1101844).\n- block: Fix transfer when chunk sectors exceeds max (bsc#1101874).\n- bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bsc#1051510).\n- bluetooth: btusb: add ID for LiteOn 04ca:301a (bsc#1051510).\n- bluetooth: hci_qca: Fix 'Sleep inside atomic section' warning (bsc#1051510).\n- branch-check: fix long->int truncation when profiling branches (bsc#1101116,).\n- brcmfmac: Add support for bcm43364 wireless chipset (bsc#1051510).\n- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).\n- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).\n- cachefiles: Wait rather than BUG'ing on 'Unexpected object collision' (bsc#1099858).\n- can: dev: increase bus-off message severity (bsc#1051510).\n- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bsc#1051510).\n- can: m_can: change comparison to bitshift when dealing with a mask (bsc#1051510).\n- cdrom: do not call check_disk_change() inside cdrom_open() (bsc#1101872).\n- clk: at91: fix clk-generated compilation (bsc#1051510).\n- clk: renesas: cpg-mssr: Stop using printk format %pCr (bsc#1051510).\n- coccinelle: fix parallel build with CHECK=scripts/coccicheck (bsc#1051510).\n- compiler.h: enable builtin overflow checkers and add fallback code (bsc#1101116,).\n- cpufreq: intel_pstate: Limit the scope of HWP dynamic boost platforms (bsc#1066110).\n- cpu/hotplug: Make bringup/teardown of smp threads symmetric (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- crypto: authenc - do not leak pointers to authenc keys (bsc#1051510).\n- crypto: authencesn - do not leak pointers to authenc keys (bsc#1051510).\n- crypto: padlock-aes - Fix Nano workaround data corruption (bsc#1051510).\n- delayacct: fix crash in delayacct_blkio_end() after delayacct init failure (bsc#1104066).\n- dm: add writecache target (bsc#1101116,).\n- dm: prevent DAX mounts if not supported (bsc#1103917).\n- dm writecache: support optional offset for start of device (bsc#1101116,).\n- dm writecache: use 2-factor allocator arguments (bsc#1101116,).\n- doc: Add vendor prefix for Kieback & Peter GmbH (bsc#1051510).\n- drivers: soc: sunxi: fix error processing on base address when claiming (bsc#1051510).\n- drm: Add DP PSR2 sink enable bit (bsc#1051510).\n- drm/amdgpu: Remove VRAM from shared bo domains (bsc#1051510).\n- drm/atomic: Check old_plane_state->crtc in drm_atomic_helper_async_check() (bsc#1051510).\n- drm/atomic: Handling the case when setting old crtc for plane (bsc#1051510).\n- drm/atomic-helper: Drop plane->fb references only for drm_atomic_helper_shutdown() (bsc#1051510).\n- drm/atomic: Initialize variables in drm_atomic_helper_async_check() to make gcc happy (bsc#1051510).\n- drm/atomic: Make async plane update checks work as intended, v2 (bsc#1051510).\n- drm/atomic: Make atomic helper track newly assigned planes correctly, v2 (bsc#1051510).\n- drm/atomic: Make atomic iterators less surprising (bsc#1051510).\n- drm/dp/mst: Fix off-by-one typo when dump payload table (bsc#1051510).\n- drm/gma500: fix psb_intel_lvds_mode_valid()'s return type (bsc#1051510).\n- drm/nouveau/fifo/gk104-: poll for runlist update completion (bsc#1051510).\n- drm/radeon: fix mode_valid's return type (bsc#1051510).\n- drm: re-enable error handling (bsc#1051510).\n- drm/vc4: Reset ->{x, y}_scaling[1] when dealing with uniplanar formats (bsc#1051510).\n- Enable / support pinctrl-lewisburg ()\n- ext2: fix a block leak (bsc#1101875).\n- ext4: add more mount time checks of the superblock (bsc#1101900).\n- ext4: bubble errors from ext4_find_inline_data_nolock() up to ext4_iget() (bsc#1101896).\n- ext4: check superblock mapped prior to committing (bsc#1101902).\n- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).\n- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).\n- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).\n- ext4: fix fencepost error in check for inode count overflow during resize (bsc#1101853).\n- ext4: include the illegal physical block in the bad map ext4_error msg (bsc#1101903).\n- ext4: report delalloc reserve as non-free in statfs for project quota (bsc#1101843).\n- ext4: update mtime in ext4_punch_hole even if no blocks are released (bsc#1101895).\n- f2fs: call unlock_new_inode() before d_instantiate() (bsc#1101837).\n- fix io_destroy()/aio_complete() race (bsc#1101852).\n- Force log to disk before reading the AGF during a fstrim (bsc#1101893).\n- fs: allow per-device dax status checking for filesystems (bsc#1103917).\n- fscache: Allow cancelled operations to be enqueued (bsc#1099858).\n- fscache: Fix hanging wait on page discarded by writeback (bsc#1101885).\n- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).\n- fs: clear writeback errors in inode_init_always (bsc#1101882).\n- fs: do not scan the inode cache before SB_BORN is set (bsc#1101883).\n- genirq: Check __free_irq() return value for NULL (bsc#1103517).\n- hid: hid-plantronics: Re-resend Update to map button for PTT products (bsc#1051510).\n- hid: i2c-hid: check if device is there before really probing (bsc#1051510).\n- hippi: Fix a Fix a possible sleep-in-atomic bug in rr_close (bsc#1051510).\n- hv_netvsc: Ensure correct teardown message sequence order ().\n- hv/netvsc: fix handling of fallback to single queue mode ().\n- hv_netvsc: Fix net device attach on older Windows hosts ().\n- hv_netvsc: set master device (bsc#1051979).\n- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() ().\n- hv_netvsc: split sub-channel setup into async and sync ().\n- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown ().\n- ibmasm: do not write out of bounds in read handler (bsc#1051510).\n- ibmvnic: Remove code to request error information (bsc#1104174).\n- ibmvnic: Revise RX/TX queue error messages (bsc#1101331).\n- ibmvnic: Update firmware error reporting with cause string (bsc#1104174).\n- input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bsc#1051510).\n- input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bsc#1051510).\n- input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bsc#1051510).\n- irqchip: brcmstb-l2: Define an irq_pm_shutdown function (bsc#1051510).\n- irqchip/gic: Take lock when updating irq type (bsc#1051510).\n- irqchip/gic-v3: Change pr_debug message to pr_devel (bsc#1051510).\n- irqchip/gic-v3: Fix the driver probe() fail due to disabled GICC entry (bsc#1051510).\n- irqchip/gic-v3: Ignore disabled ITS nodes (bsc#1051510).\n- irqchip/gic-v3: Use wmb() instead of smb_wmb() in gic_raise_softirq() (bsc#1051510).\n- irqchip/qcom: Fix check for spurious interrupts (bsc#1051510).\n- irqchip/qcom: Fix u32 comparison with value less than zero (bsc#1051510).\n- isofs: fix potential memory leak in mount option parsing (bsc#1101887).\n- iwlwifi: add more card IDs for 9000 series (bsc#1051510).\n- iwlwifi: pcie: fix race in Rx buffer allocator (bsc#1051510).\n- jump_label: Fix concurrent static_key_enable/disable() (bsc#1089343).\n- jump_label: Provide hotplug context variants (bsc#1089343).\n- jump_label: Reorder hotplug lock and jump_label_lock (bsc#1089343).\n- kabi protect bdev_dax_supported (bsc#1103917).\n- kabi protect struct ccw_device_private (bsc#1103421).\n- kabi/severities: do not complain on hisi_sas internal changes ().\n- kabi/severities: ignore x86_kvm_ops; lttng-modules would have to be adjusted in case they depend on this particular change\n- kbuild: add '-fno-stack-check' to kernel build options (bsc#1051510).\n- kbuild: Handle builtin dtb file names containing hyphens (bsc#1051510).\n- kbuild: pkg: use --transform option to prefix paths in tar (bsc#1051510).\n- kconfig: display recursive dependency resolution hint just once (bsc#1051510).\n- kmemleak: add scheduling point to kmemleak_scan() (bsc#1051510).\n- kvm: SVM: Add pause filter threshold ().\n- kvm: SVM: Implement pause loop exit logic in SVM ().\n- kvm: VMX: Bring the common code to header file ().\n- kvm: VMX: Fix the module parameters for vmx ().\n- kvm: VMX: Remove ple_window_actual_max ().\n- libata: add refcounting to ata_host (git-fixes).\n- libata: ensure host is free'd on error exit paths (git-fixes).\n- libnvdimm, dimm: fix dpa reservation vs uninitialized label area (git-fixes).\n- linvdimm, pmem: Preserve read-only setting for pmem devices (git-fixes).\n- media: media-device: fix ioctl function types (bsc#1051510).\n- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bsc#1051510).\n- media: saa7164: Fix driver name in debug output (bsc#1051510).\n- media: si470x: fix __be16 annotations (bsc#1051510).\n- media: siano: get rid of __le32/__le16 cast warnings (bsc#1051510).\n- media: tw686x: Fix incorrect vb2_mem_ops GFP flags (bsc#1051510).\n- mfd: cros_ec: Fail early if we cannot identify the EC (bsc#1051510).\n- mfd: fsl-imx25: Clean up irq settings during removal (bsc#1051510).\n- mfd: mxs-lradc: Fix error handling in mxs_lradc_probe() (bsc#1051510).\n- misc: pci_endpoint_test: Avoid triggering a BUG() (bsc#1051510).\n- mmc: dw_mmc: update actual clock for mmc debugfs (bsc#1051510).\n- mmc: pwrseq: Use kmalloc_array instead of stack VLA (bsc#1051510).\n- mm: fix __gup_device_huge vs unmap (bsc#1101839).\n- mm/kmemleak.c: make cond_resched() rate-limiting more efficient (bsc#1051510).\n- mwifiex: correct histogram data with appropriate index (bsc#1051510).\n- mwifiex: handle race during mwifiex_usb_disconnect (bsc#1051510).\n- nohz: Fix local_timer_softirq_pending() (bsc#1051510).\n- nvme: ensure forward progress during Admin passthru (git-fixes).\n- nvme-fabrics: Ignore nr_io_queues option for discovery controllers (bsc#1102633).\n- nvme: fixup crash on failed discovery (bsc#1103920).\n- nvme.h: fixup ANA group descriptor format (bsc#1104111).\n- nvme: use hw qid in trace events (bsc#1102633).\n- orangefs: report attributes_mask and attributes for statx (bsc#1101832).\n- orangefs: set i_size on new symlink (bsc#1101845).\n- overflow.h: Add allocation size calculation helpers (bsc#1101116,).\n- pci: pciehp: Assume NoCompl+ for Thunderbolt ports (bsc#1051510).\n- pci: pciehp: Request control of native hotplug only if supported (bsc#1051510).\n- pci: Prevent sysfs disable of device while driver is attached (bsc#1051510).\n- pinctrl: at91-pio4: add missing of_node_put (bsc#1051510).\n- pinctrl: intel: Add Intel Lewisburg GPIO support ().\n- pinctrl: nand: meson-gxl: fix missing data pins (bsc#1051510).\n- pmem: only set QUEUE_FLAG_DAX for fsdax mode (bsc#1103917).\n- qed*: Add link change count value to ethtool statistics display (bsc#1086314).\n- qed: Add qed APIs for PHY module query (bsc#1086314 ).\n- qed: Add srq core support for RoCE and iWARP (bsc#1086314 ).\n- qede: Add driver callbacks for eeprom module query (bsc#1086314 ).\n- qed: fix spelling mistake 'successffuly' -> 'successfully' (bsc#1086314).\n- qed: Make some functions static (bsc#1086314).\n- qed: remove redundant functions qed_get_cm_pq_idx_rl (bsc#1086314).\n- qed: remove redundant functions qed_set_gft_event_id_cm_hdr (bsc#1086314).\n- qed: remove redundant pointer 'name' (bsc#1086314).\n- qed: use dma_zalloc_coherent instead of allocator/memset (bsc#1086314).\n- qed*: Utilize FW 8.37.2.0 (bsc#1086314).\n- RDMA/qedr: Fix NULL pointer dereference when running over iWARP without RDMA-CM (bsc#1086314).\n- RDMA/qedr: fix spelling mistake: 'adrresses' -> 'addresses' (bsc#1086314).\n- RDMA/qedr: fix spelling mistake: 'failes' -> 'fails' (bsc#1086314).\n- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bsc#1051510).\n- reiserfs: fix buffer overflow with long warning messages (bsc#1101847).\n- Revert 'drm/nouveau/drm/therm/fan: add a fallback if no fan control is specified in the vbios' (bsc#1103356).\n- s390/cio: clear timer when terminating driver I/O (bsc#1103421).\n- s390/cio: fix return code after missing interrupt (bsc#1103421).\n- s390/dasd: fix handling of internal requests (bsc#1103421).\n- s390/dasd: fix wrongly assigned configuration data (bsc#1103421).\n- s390/dasd: prevent prefix I/O error (bsc#1103421).\n- s390/eadm: fix CONFIG_BLOCK include dependency (bsc#1103421).\n- s390/ipl: ensure loadparm valid flag is set (bsc#1103421).\n- s390/pci: do not require AIS facility (bsc#1103421).\n- s390/qdio: do not release memory in qdio_setup_irq() (bsc#1103421).\n- sc16is7xx: Check for an error when the clock is enabled (bsc#1051510).\n- sched/fair: Consider RT/IRQ pressure in capacity_spare_wake() (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Fix find_idlest_group() when local group is not allowed (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Fix usage of find_idlest_group() when no groups are allowed (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Fix usage of find_idlest_group() when the local group is idlest (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Move select_task_rq_fair() slow-path into its own function (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Remove impossible condition from find_idlest_group_cpu() (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Remove unnecessary comparison with -1 (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Spare idle load balancing on nohz_full CPUs (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Use 'unsigned long' for utilization, consistently (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/smt: Update sched_smt_present at runtime (bsc#1089343).\n- scsi: ata: enhance the definition of SET MAX feature field value ().\n- scsi: hisi_sas: add an mechanism to do reset work synchronously ().\n- scsi: hisi_sas: add check of device in hisi_sas_task_exec() ().\n- scsi: hisi_sas: add internal abort dev in some places ().\n- scsi: hisi_sas: Add LED feature for v3 hw ().\n- scsi: hisi_sas: add RAS feature for v3 hw ().\n- scsi: hisi_sas: add readl poll timeout helper wrappers ().\n- scsi: hisi_sas: Add some checks to avoid free'ing a sas_task twice ().\n- scsi: hisi_sas: add some print to enhance debugging ().\n- scsi: hisi_sas: Add v2 hw force PHY function for internal ATA command ().\n- scsi: hisi_sas: add v2 hw port AXI error handling support ().\n- scsi: hisi_sas: add v3 hw MODULE_DEVICE_TABLE() ().\n- scsi: hisi_sas: add v3 hw suspend and resume ().\n- scsi: hisi_sas: allocate slot buffer earlier ().\n- scsi: hisi_sas: Change common allocation mode of device id ().\n- scsi: hisi_sas: Change frame type for SET MAX commands ().\n- scsi: hisi_sas: change ncq process for v3 hw ().\n- scsi: hisi_sas: change slot index allocation mode ().\n- scsi: hisi_sas: check host frozen before calling 'done' function ().\n- scsi: hisi_sas: check IPTT is valid before using it for v3 hw ().\n- scsi: hisi_sas: check sas_dev gone earlier in hisi_sas_abort_task() ().\n- scsi: hisi_sas: Code cleanup and minor bug fixes ().\n- scsi: hisi_sas: config ATA de-reset as an constrained command for v3 hw ().\n- scsi: hisi_sas: consolidate command check in hisi_sas_get_ata_protocol() ().\n- scsi: hisi_sas: Create a scsi_host_template per HW module ().\n- scsi: hisi_sas: delete timer when removing hisi_sas driver ().\n- scsi: hisi_sas: do link reset for some CHL_INT2 ints ().\n- scsi: hisi_sas: Do not lock DQ for complete task sending ().\n- scsi: hisi_sas: dt-bindings: add an property of signal attenuation ().\n- scsi: hisi_sas: fix a bug in hisi_sas_dev_gone() ().\n- scsi: hisi_sas: fix a typo in hisi_sas_task_prep() ().\n- scsi: hisi_sas: fix dma_unmap_sg() parameter ().\n- scsi: hisi_sas: fix PI memory size ().\n- scsi: hisi_sas: fix return value of hisi_sas_task_prep() ().\n- scsi: hisi_sas: Fix return value when get_free_slot() failed ().\n- scsi: hisi_sas: fix SAS_QUEUE_FULL problem while running IO ().\n- scsi: hisi_sas: fix the issue of link rate inconsistency ().\n- scsi: hisi_sas: fix the issue of setting linkrate register ().\n- scsi: hisi_sas: improve int_chnl_int_v2_hw() consistency with v3 hw ().\n- scsi: hisi_sas: Include TMF elements in struct hisi_sas_slot ().\n- scsi: hisi_sas: increase timer expire of internal abort task ().\n- scsi: hisi_sas: Init disks after controller reset ().\n- scsi: hisi_sas: initialize dq spinlock before use ().\n- scsi: hisi_sas: Introduce hisi_sas_phy_set_linkrate() ().\n- scsi: hisi_sas: judge result of internal abort ().\n- scsi: hisi_sas: make local symbol host_attrs static ().\n- scsi: hisi_sas: make return type of prep functions void ().\n- scsi: hisi_sas: make SAS address of SATA disks unique ().\n- scsi: hisi_sas: Mark PHY as in reset for nexus reset ().\n- scsi: hisi_sas: modify hisi_sas_dev_gone() for reset ().\n- scsi: hisi_sas: modify some register config for hip08 ().\n- scsi: hisi_sas: optimise port id refresh function ().\n- scsi: hisi_sas: optimise the usage of DQ locking ().\n- scsi: hisi_sas: print device id for errors ().\n- scsi: hisi_sas: re-add the lldd_port_deformed() ().\n- scsi: hisi_sas: relocate clearing ITCT and freeing device ().\n- scsi: hisi_sas: relocate smp sg map ().\n- scsi: hisi_sas: Remove depends on HAS_DMA in case of platform dependency ().\n- scsi: hisi_sas: remove redundant handling to event95 for v3 ().\n- scsi: hisi_sas: remove some unneeded structure members ().\n- scsi: hisi_sas: remove unused variable hisi_sas_devices.running_req ().\n- scsi: hisi_sas: Reset disks when discovered ().\n- scsi: hisi_sas: some optimizations of host controller reset ().\n- scsi: hisi_sas: stop controller timer for reset ().\n- scsi: hisi_sas: support the property of signal attenuation for v2 hw ().\n- scsi: hisi_sas: Terminate STP reject quickly for v2 hw ().\n- scsi: hisi_sas: Try wait commands before before controller reset ().\n- scsi: hisi_sas: update PHY linkrate after a controller reset ().\n- scsi: hisi_sas: update RAS feature for later revision of v3 HW ().\n- scsi: hisi_sas: use an general way to delay PHY work ().\n- scsi: hisi_sas: Use device lock to protect slot alloc/free ().\n- scsi: hisi_sas: use dma_zalloc_coherent() ().\n- scsi: hisi_sas: workaround a v3 hw hilink bug ().\n- scsi: libsas: defer ata device eh commands to libata ().\n- scsi: lpfc: Add Buffer overflow check, when nvme_info larger than PAGE_SIZE (bsc#1102658).\n- scsi: lpfc: Correct LCB ACCept payload (bsc#1102658).\n- scsi: lpfc: devloss timeout race condition caused null pointer reference (bsc#1102658).\n- scsi: lpfc: Fix abort error path for NVMET (bsc#1102658).\n- scsi: lpfc: Fix driver crash when re-registering NVME rports (bsc#1102658).\n- scsi: lpfc: Fix driver not setting dpp bits correctly in doorbell word (bsc#1102658).\n- scsi: lpfc: Fix ELS abort on SLI-3 adapters (bsc#1102658).\n- scsi: lpfc: Fix list corruption on the completion queue (bsc#1102658).\n- scsi: lpfc: Fix NVME Target crash in defer rcv logic (bsc#1102658).\n- scsi: lpfc: Fix panic if driver unloaded when port is offline (bsc#1102658).\n- scsi: lpfc: Fix sysfs Speed value on CNA ports (bsc#1102658).\n- scsi: lpfc: Limit tracking of tgt queue depth in fast path (bsc#1102658).\n- scsi: lpfc: Make PBDE optimizations configurable (bsc#1102658).\n- scsi: lpfc: Remove lpfc_enable_pbde as module parameter (bsc#1102658).\n- scsi: lpfc: Revise copyright for new company language (bsc#1102658).\n- scsi: lpfc: Support duration field in Link Cable Beacon V1 command (bsc#1102658).\n- scsi: lpfc: update driver version to 12.0.0.5 (bsc#1102658).\n- scsi: lpfc: update driver version to 12.0.0.6 (bsc#1102658).\n- scsi: qla2xxx: Avoid double completion of abort command (git-fixes).\n- scsi: qla2xxx: Fix driver unload by shutting down chip (git-fixes).\n- scsi: qla2xxx: Fix NPIV deletion by calling wait_for_sess_deletion (git-fixes).\n- scsi: qla2xxx: Fix NULL pointer dereference for fcport search (git-fixes).\n- scsi: qla2xxx: Fix unintialized List head crash (git-fixes).\n- scsi: qla2xxx: Return error when TMF returns (git-fixes).\n- scsi: smartpqi: add in new supported controllers (bsc#1086274).\n- scsi: smartpqi: add inspur advantech ids (bsc#1086274).\n- scsi: smartpqi: bump driver version to 1.1.4-130 (bsc#1086274).\n- scsi: smartpqi: fix critical ARM issue reading PQI index registers (bsc#1086274).\n- scsi: smartpqi: improve error checking for sync requests (bsc#1086274).\n- scsi: smartpqi: improve handling for sync requests (bsc#1086274).\n- scsi: smartpqi: update driver version (bsc#1086274).\n- scsi: smartpqi: workaround fw bug for oq deletion (bsc#1086274).\n- sctp: fix the issue that pathmtu may be set lower than MINSEGMENT (git-fixes).\n- sctp: introduce sctp_dst_mtu (git-fixes).\n- soc: bcm2835: Make !RASPBERRYPI_FIRMWARE dummies return failure (bsc#1051510).\n- soc: bcm: raspberrypi-power: Fix use of __packed (bsc#1051510).\n- soc: imx: gpc: de-register power domains only if initialized (bsc#1051510).\n- soc: imx: gpc: restrict register range for regmap access (bsc#1051510).\n- soc: imx: gpcv2: correct PGC offset (bsc#1051510).\n- soc: imx: gpcv2: Do not pass static memory as platform data (bsc#1051510).\n- soc: imx: gpcv2: fix regulator deferred probe (bsc#1051510).\n- soc: mediatek: pwrap: fix compiler errors (bsc#1051510).\n- soc: qcom: wcnss_ctrl: Fix increment in NV upload (bsc#1051510).\n- soc: rockchip: power-domain: Fix wrong value when power up pd with writemask (bsc#1051510).\n- soc/tegra: Fix bad of_node_put() in powergate init (bsc#1051510).\n- soc/tegra: flowctrl: Fix error handling (bsc#1051510).\n- soc: ti: ti_sci_pm_domains: Populate name for genpd (bsc#1051510).\n- soc: zte: Restrict SOC_ZTE to ARCH_ZX or COMPILE_TEST (bsc#1051510).\n- spi: bcm2835aux: ensure interrupts are enabled for shared handler (bsc#1051510).\n- spi/bcm63xx-hspi: Enable the clock before calling clk_get_rate() (bsc#1051510).\n- spi: bcm-qspi: Always read and set BSPI_MAST_N_BOOT_CTRL (bsc#1051510).\n- spi: bcm-qspi: Avoid setting MSPI_CDRAM_PCS for spi-nor master (bsc#1051510).\n- spi: cadence: Add usleep_range() for cdns_spi_fill_tx_fifo() (bsc#1051510).\n- spi: pxa2xx: Allow 64-bit DMA (bsc#1051510).\n- spi: pxa2xx: check clk_prepare_enable() return value (bsc#1051510).\n- sr: pass down correctly sized SCSI sense buffer (git-fixes).\n- staging: ks7010: Use constants from ieee80211_eid instead of literal ints (bsc#1051510).\n- staging: speakup: fix wraparound in uaccess length check (bsc#1051510).\n- supported.conf: add drivers/md/dm-writecache\n- sysrq : fix Show Regs call trace on ARM (bsc#1051510).\n- thermal: exynos: fix setting rising_threshold for Exynos5433 (bsc#1051510).\n- tty: Fix data race in tty_insert_flip_string_fixed_flag (bsc#1051510).\n- typec: tcpm: Fix a msecs vs jiffies bug (bsc#1100132).\n- udf: Detect incorrect directory size (bsc#1101891).\n- udf: Provide saner default for invalid uid / gid (bsc#1101890).\n- Update config files to add CONFIG_DM_WRITECACHE=m\n- Update patches.arch/KVM-PPC-Check-if-IOMMU-page-is-contained-in-the-pinn.patch (bsc#1077761, git-fixes, bsc#1103948, bsc#1103949).\n- usb: hub: Do not wait for connect state at resume for powered-off ports (bsc#1051510).\n- usbip: usbip_detach: Fix memory, udev context and udev leak (bsc#1051510).\n- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).\n- virtio_balloon: fix another race between migration and ballooning (bsc#1051510).\n- wlcore: sdio: check for valid platform device data before suspend (bsc#1051510).\n- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).\n- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/KVM/VMX: Add module argument for L1TF mitigation.\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- x86: Treat R_X86_64_PLT32 as R_X86_64_PC32 (binutils_2.31).\n- xfs: catch inode allocation state mismatch corruption (bsc#1104211).\n- xfs: prevent creating negative-sized file via INSERT_RANGE (bsc#1101833).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-Module-Basesystem-15-2018-1614,SUSE-SLE-Module-Development-Tools-15-2018-1614,SUSE-SLE-Module-Legacy-15-2018-1614,SUSE-SLE-Product-HA-15-2018-1614,SUSE-SLE-Product-WE-15-2018-1614", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2380-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:2380-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20182380-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:2380-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html", }, { category: "self", summary: "SUSE Bug 1051510", url: "https://bugzilla.suse.com/1051510", }, { category: "self", summary: "SUSE Bug 1051979", url: "https://bugzilla.suse.com/1051979", }, { category: "self", summary: "SUSE Bug 1066110", url: "https://bugzilla.suse.com/1066110", }, { category: "self", summary: "SUSE Bug 1077761", url: "https://bugzilla.suse.com/1077761", }, { category: "self", summary: "SUSE Bug 1086274", url: "https://bugzilla.suse.com/1086274", }, { category: "self", summary: "SUSE Bug 1086314", url: "https://bugzilla.suse.com/1086314", }, { category: "self", summary: "SUSE Bug 1087081", url: "https://bugzilla.suse.com/1087081", }, { category: "self", summary: "SUSE Bug 1089343", url: "https://bugzilla.suse.com/1089343", }, { category: "self", summary: "SUSE Bug 1099811", url: "https://bugzilla.suse.com/1099811", }, { category: "self", summary: "SUSE Bug 1099813", url: "https://bugzilla.suse.com/1099813", }, { category: "self", summary: "SUSE Bug 1099844", url: "https://bugzilla.suse.com/1099844", }, { category: "self", summary: "SUSE Bug 1099845", url: "https://bugzilla.suse.com/1099845", }, { category: "self", summary: "SUSE Bug 1099846", url: "https://bugzilla.suse.com/1099846", }, { category: "self", summary: "SUSE Bug 1099849", url: "https://bugzilla.suse.com/1099849", }, { category: "self", summary: "SUSE Bug 1099858", url: "https://bugzilla.suse.com/1099858", }, { category: "self", summary: "SUSE Bug 1099863", url: "https://bugzilla.suse.com/1099863", }, { category: "self", summary: "SUSE Bug 1099864", url: "https://bugzilla.suse.com/1099864", }, { category: "self", summary: "SUSE Bug 1100132", url: "https://bugzilla.suse.com/1100132", }, { category: "self", summary: "SUSE Bug 1101116", url: "https://bugzilla.suse.com/1101116", }, { category: "self", summary: "SUSE Bug 1101331", url: "https://bugzilla.suse.com/1101331", }, { category: "self", summary: "SUSE Bug 1101669", url: "https://bugzilla.suse.com/1101669", }, { category: "self", summary: "SUSE Bug 1101828", url: "https://bugzilla.suse.com/1101828", }, { category: "self", summary: "SUSE Bug 1101832", url: "https://bugzilla.suse.com/1101832", }, { category: "self", summary: "SUSE Bug 1101833", url: "https://bugzilla.suse.com/1101833", }, { category: "self", summary: "SUSE Bug 1101837", url: "https://bugzilla.suse.com/1101837", }, { category: "self", summary: "SUSE Bug 1101839", url: "https://bugzilla.suse.com/1101839", }, { category: "self", summary: "SUSE Bug 1101841", url: "https://bugzilla.suse.com/1101841", }, { category: "self", summary: "SUSE Bug 1101843", url: "https://bugzilla.suse.com/1101843", }, { category: "self", summary: "SUSE Bug 1101844", url: "https://bugzilla.suse.com/1101844", }, { category: "self", summary: "SUSE Bug 1101845", url: "https://bugzilla.suse.com/1101845", }, { category: "self", summary: "SUSE Bug 1101847", url: "https://bugzilla.suse.com/1101847", }, { category: "self", summary: "SUSE Bug 1101852", url: "https://bugzilla.suse.com/1101852", }, { category: "self", summary: "SUSE Bug 1101853", url: "https://bugzilla.suse.com/1101853", }, { category: "self", summary: "SUSE Bug 1101867", url: "https://bugzilla.suse.com/1101867", }, { category: "self", summary: "SUSE Bug 1101872", url: "https://bugzilla.suse.com/1101872", }, { category: "self", summary: "SUSE Bug 1101874", url: "https://bugzilla.suse.com/1101874", }, { category: "self", summary: "SUSE Bug 1101875", url: "https://bugzilla.suse.com/1101875", }, { category: "self", summary: "SUSE Bug 1101882", url: "https://bugzilla.suse.com/1101882", }, { category: "self", summary: "SUSE Bug 1101883", url: "https://bugzilla.suse.com/1101883", }, { category: "self", summary: "SUSE Bug 1101885", url: "https://bugzilla.suse.com/1101885", }, { category: "self", summary: "SUSE Bug 1101887", url: "https://bugzilla.suse.com/1101887", }, { category: "self", summary: "SUSE Bug 1101890", url: "https://bugzilla.suse.com/1101890", }, { category: "self", summary: "SUSE Bug 1101891", url: "https://bugzilla.suse.com/1101891", }, { category: "self", summary: "SUSE Bug 1101893", url: "https://bugzilla.suse.com/1101893", }, { category: "self", summary: "SUSE Bug 1101895", url: "https://bugzilla.suse.com/1101895", }, { category: "self", summary: "SUSE Bug 1101896", url: "https://bugzilla.suse.com/1101896", }, { category: "self", summary: "SUSE Bug 1101900", url: "https://bugzilla.suse.com/1101900", }, { category: "self", summary: "SUSE Bug 1101902", url: "https://bugzilla.suse.com/1101902", }, { category: "self", summary: "SUSE Bug 1101903", url: "https://bugzilla.suse.com/1101903", }, { category: "self", summary: "SUSE Bug 1102633", url: "https://bugzilla.suse.com/1102633", }, { category: "self", summary: "SUSE Bug 1102658", url: "https://bugzilla.suse.com/1102658", }, { category: "self", summary: "SUSE Bug 1103097", url: "https://bugzilla.suse.com/1103097", }, { category: "self", summary: "SUSE Bug 1103356", url: "https://bugzilla.suse.com/1103356", }, { category: "self", summary: "SUSE Bug 1103421", url: "https://bugzilla.suse.com/1103421", }, { category: "self", summary: "SUSE Bug 1103517", url: "https://bugzilla.suse.com/1103517", }, { category: "self", summary: "SUSE Bug 1103723", url: "https://bugzilla.suse.com/1103723", }, { category: "self", summary: "SUSE Bug 1103724", url: "https://bugzilla.suse.com/1103724", }, { category: "self", summary: "SUSE Bug 1103725", url: "https://bugzilla.suse.com/1103725", }, { category: "self", summary: "SUSE Bug 1103726", url: "https://bugzilla.suse.com/1103726", }, { category: "self", summary: "SUSE Bug 1103727", url: "https://bugzilla.suse.com/1103727", }, { category: "self", summary: "SUSE Bug 1103728", url: "https://bugzilla.suse.com/1103728", }, { category: "self", summary: "SUSE Bug 1103729", url: "https://bugzilla.suse.com/1103729", }, { category: "self", summary: "SUSE Bug 1103730", url: "https://bugzilla.suse.com/1103730", }, { category: "self", summary: "SUSE Bug 1103917", url: "https://bugzilla.suse.com/1103917", }, { category: "self", summary: "SUSE Bug 1103920", url: "https://bugzilla.suse.com/1103920", }, { category: "self", summary: "SUSE Bug 1103948", url: "https://bugzilla.suse.com/1103948", }, { category: "self", summary: "SUSE Bug 1103949", url: "https://bugzilla.suse.com/1103949", }, { category: "self", summary: "SUSE Bug 1104066", url: "https://bugzilla.suse.com/1104066", }, { category: "self", summary: "SUSE Bug 1104111", url: "https://bugzilla.suse.com/1104111", }, { category: "self", summary: "SUSE Bug 1104174", url: "https://bugzilla.suse.com/1104174", }, { category: "self", summary: "SUSE Bug 1104211", url: "https://bugzilla.suse.com/1104211", }, { category: "self", summary: "SUSE Bug 1104319", url: "https://bugzilla.suse.com/1104319", }, { category: "self", summary: "SUSE CVE CVE-2018-10876 page", url: "https://www.suse.com/security/cve/CVE-2018-10876/", }, { category: "self", summary: "SUSE CVE CVE-2018-10877 page", url: "https://www.suse.com/security/cve/CVE-2018-10877/", }, { category: "self", summary: "SUSE CVE CVE-2018-10878 page", url: "https://www.suse.com/security/cve/CVE-2018-10878/", }, { category: "self", summary: "SUSE CVE CVE-2018-10879 page", url: "https://www.suse.com/security/cve/CVE-2018-10879/", }, { category: "self", summary: "SUSE CVE CVE-2018-10880 page", url: "https://www.suse.com/security/cve/CVE-2018-10880/", }, { category: "self", summary: "SUSE CVE CVE-2018-10881 page", url: "https://www.suse.com/security/cve/CVE-2018-10881/", }, { category: "self", summary: "SUSE CVE CVE-2018-10882 page", url: "https://www.suse.com/security/cve/CVE-2018-10882/", }, { category: "self", summary: "SUSE CVE CVE-2018-10883 page", url: "https://www.suse.com/security/cve/CVE-2018-10883/", }, { category: "self", summary: "SUSE CVE CVE-2018-3620 page", url: "https://www.suse.com/security/cve/CVE-2018-3620/", }, { category: "self", summary: "SUSE CVE CVE-2018-3646 page", url: "https://www.suse.com/security/cve/CVE-2018-3646/", }, { category: "self", summary: "SUSE CVE CVE-2018-5391 page", url: "https://www.suse.com/security/cve/CVE-2018-5391/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2018-08-16T12:30:10Z", generator: { date: "2018-08-16T12:30:10Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:2380-1", initial_release_date: "2018-08-16T12:30:10Z", revision_history: [ { date: "2018-08-16T12:30:10Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-default-4.12.14-25.13.1.aarch64", product: { name: "kernel-default-4.12.14-25.13.1.aarch64", product_id: "kernel-default-4.12.14-25.13.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-25.13.1.aarch64", product: { name: "kernel-default-devel-4.12.14-25.13.1.aarch64", product_id: "kernel-default-devel-4.12.14-25.13.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-25.13.1.aarch64", product: { name: "kernel-obs-build-4.12.14-25.13.1.aarch64", product_id: "kernel-obs-build-4.12.14-25.13.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-25.13.1.aarch64", product: { name: "kernel-syms-4.12.14-25.13.1.aarch64", product_id: "kernel-syms-4.12.14-25.13.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-25.13.1.aarch64", product: { name: "kernel-vanilla-base-4.12.14-25.13.1.aarch64", product_id: "kernel-vanilla-base-4.12.14-25.13.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-25.13.1.aarch64", product: { name: "reiserfs-kmp-default-4.12.14-25.13.1.aarch64", product_id: "reiserfs-kmp-default-4.12.14-25.13.1.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-default-4.12.14-25.13.1.aarch64", product: { name: "cluster-md-kmp-default-4.12.14-25.13.1.aarch64", product_id: "cluster-md-kmp-default-4.12.14-25.13.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-25.13.1.aarch64", product: { name: "dlm-kmp-default-4.12.14-25.13.1.aarch64", product_id: "dlm-kmp-default-4.12.14-25.13.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-25.13.1.aarch64", product: { name: "gfs2-kmp-default-4.12.14-25.13.1.aarch64", product_id: "gfs2-kmp-default-4.12.14-25.13.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-25.13.1.aarch64", product: { name: "ocfs2-kmp-default-4.12.14-25.13.1.aarch64", product_id: "ocfs2-kmp-default-4.12.14-25.13.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.12.14-25.13.1.noarch", product: { name: "kernel-devel-4.12.14-25.13.1.noarch", product_id: "kernel-devel-4.12.14-25.13.1.noarch", }, }, { category: "product_version", name: "kernel-macros-4.12.14-25.13.1.noarch", product: { name: "kernel-macros-4.12.14-25.13.1.noarch", product_id: "kernel-macros-4.12.14-25.13.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.12.14-25.13.1.noarch", product: { name: "kernel-docs-4.12.14-25.13.1.noarch", product_id: "kernel-docs-4.12.14-25.13.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.12.14-25.13.1.noarch", product: { name: "kernel-source-4.12.14-25.13.1.noarch", product_id: "kernel-source-4.12.14-25.13.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-default-4.12.14-25.13.1.ppc64le", product: { name: "kernel-default-4.12.14-25.13.1.ppc64le", product_id: "kernel-default-4.12.14-25.13.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-25.13.1.ppc64le", product: { name: "kernel-default-devel-4.12.14-25.13.1.ppc64le", product_id: "kernel-default-devel-4.12.14-25.13.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-25.13.1.ppc64le", product: { name: "kernel-obs-build-4.12.14-25.13.1.ppc64le", product_id: "kernel-obs-build-4.12.14-25.13.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.12.14-25.13.1.ppc64le", product: { name: "kernel-syms-4.12.14-25.13.1.ppc64le", product_id: "kernel-syms-4.12.14-25.13.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-25.13.1.ppc64le", product: { name: "kernel-vanilla-base-4.12.14-25.13.1.ppc64le", product_id: "kernel-vanilla-base-4.12.14-25.13.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", product: { name: "reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", product_id: "reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", }, }, { category: "product_version", name: "cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", product: { name: "cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", product_id: "cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-25.13.1.ppc64le", product: { name: "dlm-kmp-default-4.12.14-25.13.1.ppc64le", product_id: "dlm-kmp-default-4.12.14-25.13.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-25.13.1.ppc64le", product: { name: "gfs2-kmp-default-4.12.14-25.13.1.ppc64le", product_id: "gfs2-kmp-default-4.12.14-25.13.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", product: { name: "ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", product_id: "ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-default-4.12.14-25.13.1.s390x", product: { name: "kernel-default-4.12.14-25.13.1.s390x", product_id: "kernel-default-4.12.14-25.13.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-25.13.1.s390x", product: { name: "kernel-default-devel-4.12.14-25.13.1.s390x", product_id: "kernel-default-devel-4.12.14-25.13.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.12.14-25.13.1.s390x", product: { name: "kernel-default-man-4.12.14-25.13.1.s390x", product_id: "kernel-default-man-4.12.14-25.13.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-4.12.14-25.13.1.s390x", product: { name: "kernel-zfcpdump-4.12.14-25.13.1.s390x", product_id: "kernel-zfcpdump-4.12.14-25.13.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-25.13.1.s390x", product: { name: "kernel-obs-build-4.12.14-25.13.1.s390x", product_id: "kernel-obs-build-4.12.14-25.13.1.s390x", }, }, { category: "product_version", name: "kernel-syms-4.12.14-25.13.1.s390x", product: { name: "kernel-syms-4.12.14-25.13.1.s390x", product_id: "kernel-syms-4.12.14-25.13.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-25.13.1.s390x", product: { name: "kernel-vanilla-base-4.12.14-25.13.1.s390x", product_id: "kernel-vanilla-base-4.12.14-25.13.1.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-25.13.1.s390x", product: { name: "reiserfs-kmp-default-4.12.14-25.13.1.s390x", product_id: "reiserfs-kmp-default-4.12.14-25.13.1.s390x", }, }, { category: "product_version", name: "cluster-md-kmp-default-4.12.14-25.13.1.s390x", product: { name: "cluster-md-kmp-default-4.12.14-25.13.1.s390x", product_id: "cluster-md-kmp-default-4.12.14-25.13.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-25.13.1.s390x", product: { name: "dlm-kmp-default-4.12.14-25.13.1.s390x", product_id: "dlm-kmp-default-4.12.14-25.13.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-25.13.1.s390x", product: { name: "gfs2-kmp-default-4.12.14-25.13.1.s390x", product_id: "gfs2-kmp-default-4.12.14-25.13.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-25.13.1.s390x", product: { name: "ocfs2-kmp-default-4.12.14-25.13.1.s390x", product_id: "ocfs2-kmp-default-4.12.14-25.13.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-default-4.12.14-25.13.1.x86_64", product: { name: "kernel-default-4.12.14-25.13.1.x86_64", product_id: "kernel-default-4.12.14-25.13.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-25.13.1.x86_64", product: { name: "kernel-default-devel-4.12.14-25.13.1.x86_64", product_id: "kernel-default-devel-4.12.14-25.13.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-25.13.1.x86_64", product: { name: "kernel-obs-build-4.12.14-25.13.1.x86_64", product_id: "kernel-obs-build-4.12.14-25.13.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-25.13.1.x86_64", product: { name: "kernel-syms-4.12.14-25.13.1.x86_64", product_id: "kernel-syms-4.12.14-25.13.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-25.13.1.x86_64", product: { name: "kernel-vanilla-base-4.12.14-25.13.1.x86_64", product_id: "kernel-vanilla-base-4.12.14-25.13.1.x86_64", }, }, { category: "product_version", name: "lttng-modules-2.10.0-5.4.2.x86_64", product: { name: "lttng-modules-2.10.0-5.4.2.x86_64", product_id: "lttng-modules-2.10.0-5.4.2.x86_64", }, }, { category: "product_version", name: "lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", product: { name: "lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", product_id: "lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-25.13.1.x86_64", product: { name: "reiserfs-kmp-default-4.12.14-25.13.1.x86_64", product_id: "reiserfs-kmp-default-4.12.14-25.13.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-default-4.12.14-25.13.1.x86_64", product: { name: "cluster-md-kmp-default-4.12.14-25.13.1.x86_64", product_id: "cluster-md-kmp-default-4.12.14-25.13.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-25.13.1.x86_64", product: { name: "dlm-kmp-default-4.12.14-25.13.1.x86_64", product_id: "dlm-kmp-default-4.12.14-25.13.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-25.13.1.x86_64", product: { name: "gfs2-kmp-default-4.12.14-25.13.1.x86_64", product_id: "gfs2-kmp-default-4.12.14-25.13.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-25.13.1.x86_64", product: { name: "ocfs2-kmp-default-4.12.14-25.13.1.x86_64", product_id: "ocfs2-kmp-default-4.12.14-25.13.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-25.13.1.x86_64", product: { name: "kernel-default-extra-4.12.14-25.13.1.x86_64", product_id: "kernel-default-extra-4.12.14-25.13.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15", product: { name: "SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15", product: { name: "SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Legacy 15", product: { name: "SUSE Linux Enterprise Module for Legacy 15", product_id: "SUSE Linux Enterprise Module for Legacy 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-legacy:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15", product: { name: "SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 15", product: { name: "SUSE Linux Enterprise Workstation Extension 15", product_id: "SUSE Linux Enterprise Workstation Extension 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:15", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-25.13.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", }, product_reference: "kernel-default-4.12.14-25.13.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-25.13.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", }, product_reference: "kernel-default-4.12.14-25.13.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-25.13.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", }, product_reference: "kernel-default-4.12.14-25.13.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-25.13.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", }, product_reference: "kernel-default-4.12.14-25.13.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-25.13.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-25.13.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-25.13.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-25.13.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-25.13.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", }, product_reference: "kernel-default-devel-4.12.14-25.13.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-25.13.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-25.13.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-25.13.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", }, product_reference: "kernel-default-man-4.12.14-25.13.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-25.13.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", }, product_reference: "kernel-devel-4.12.14-25.13.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-25.13.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", }, product_reference: "kernel-macros-4.12.14-25.13.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-4.12.14-25.13.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", }, product_reference: "kernel-zfcpdump-4.12.14-25.13.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-25.13.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", }, product_reference: "kernel-docs-4.12.14-25.13.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-25.13.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", }, product_reference: "kernel-obs-build-4.12.14-25.13.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-25.13.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", }, product_reference: "kernel-obs-build-4.12.14-25.13.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-25.13.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", }, product_reference: "kernel-obs-build-4.12.14-25.13.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-25.13.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-25.13.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-25.13.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", }, product_reference: "kernel-source-4.12.14-25.13.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-25.13.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", }, product_reference: "kernel-syms-4.12.14-25.13.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-25.13.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-25.13.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-25.13.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", }, product_reference: "kernel-syms-4.12.14-25.13.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-25.13.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", }, product_reference: "kernel-syms-4.12.14-25.13.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-25.13.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", }, product_reference: "kernel-vanilla-base-4.12.14-25.13.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-25.13.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", }, product_reference: "kernel-vanilla-base-4.12.14-25.13.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-25.13.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", }, product_reference: "kernel-vanilla-base-4.12.14-25.13.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-25.13.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", }, product_reference: "kernel-vanilla-base-4.12.14-25.13.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "lttng-modules-2.10.0-5.4.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", }, product_reference: "lttng-modules-2.10.0-5.4.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", }, product_reference: "lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-25.13.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15", product_id: "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", }, product_reference: "reiserfs-kmp-default-4.12.14-25.13.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-25.13.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15", product_id: "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", }, product_reference: "reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-25.13.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15", product_id: "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", }, product_reference: "reiserfs-kmp-default-4.12.14-25.13.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-25.13.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", product_id: "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", }, product_reference: "reiserfs-kmp-default-4.12.14-25.13.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-25.13.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", }, product_reference: "cluster-md-kmp-default-4.12.14-25.13.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-25.13.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", }, product_reference: "cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-25.13.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", }, product_reference: "cluster-md-kmp-default-4.12.14-25.13.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-25.13.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.12.14-25.13.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-25.13.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", }, product_reference: "dlm-kmp-default-4.12.14-25.13.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-25.13.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", }, product_reference: "dlm-kmp-default-4.12.14-25.13.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-25.13.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", }, product_reference: "dlm-kmp-default-4.12.14-25.13.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-25.13.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", }, product_reference: "dlm-kmp-default-4.12.14-25.13.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-25.13.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", }, product_reference: "gfs2-kmp-default-4.12.14-25.13.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-25.13.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", }, product_reference: "gfs2-kmp-default-4.12.14-25.13.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-25.13.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", }, product_reference: "gfs2-kmp-default-4.12.14-25.13.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-25.13.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", }, product_reference: "gfs2-kmp-default-4.12.14-25.13.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-25.13.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", }, product_reference: "ocfs2-kmp-default-4.12.14-25.13.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-25.13.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", }, product_reference: "ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-25.13.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", }, product_reference: "ocfs2-kmp-default-4.12.14-25.13.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-25.13.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.12.14-25.13.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-4.12.14-25.13.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15", product_id: "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", }, product_reference: "kernel-default-extra-4.12.14-25.13.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15", }, ], }, vulnerabilities: [ { cve: "CVE-2018-10876", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10876", }, ], notes: [ { category: "general", text: "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10876", url: "https://www.suse.com/security/cve/CVE-2018-10876", }, { category: "external", summary: "SUSE Bug 1099811 for CVE-2018-10876", url: "https://bugzilla.suse.com/1099811", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-16T12:30:10Z", details: "low", }, ], title: "CVE-2018-10876", }, { cve: "CVE-2018-10877", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10877", }, ], notes: [ { category: "general", text: "Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10877", url: "https://www.suse.com/security/cve/CVE-2018-10877", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10877", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099846 for CVE-2018-10877", url: "https://bugzilla.suse.com/1099846", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-16T12:30:10Z", details: "low", }, ], title: "CVE-2018-10877", }, { cve: "CVE-2018-10878", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10878", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10878", url: "https://www.suse.com/security/cve/CVE-2018-10878", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10878", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099813 for CVE-2018-10878", url: "https://bugzilla.suse.com/1099813", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-16T12:30:10Z", details: "moderate", }, ], title: "CVE-2018-10878", }, { cve: "CVE-2018-10879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10879", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10879", url: "https://www.suse.com/security/cve/CVE-2018-10879", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10879", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099844 for CVE-2018-10879", url: "https://bugzilla.suse.com/1099844", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-16T12:30:10Z", details: "moderate", }, ], title: "CVE-2018-10879", }, { cve: "CVE-2018-10880", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10880", }, ], notes: [ { category: "general", text: "Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10880", url: "https://www.suse.com/security/cve/CVE-2018-10880", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10880", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099845 for CVE-2018-10880", url: "https://bugzilla.suse.com/1099845", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-16T12:30:10Z", details: "moderate", }, ], title: "CVE-2018-10880", }, { cve: "CVE-2018-10881", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10881", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10881", url: "https://www.suse.com/security/cve/CVE-2018-10881", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10881", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099864 for CVE-2018-10881", url: "https://bugzilla.suse.com/1099864", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-16T12:30:10Z", details: "moderate", }, ], title: "CVE-2018-10881", }, { cve: "CVE-2018-10882", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10882", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10882", url: "https://www.suse.com/security/cve/CVE-2018-10882", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10882", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099849 for CVE-2018-10882", url: "https://bugzilla.suse.com/1099849", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-16T12:30:10Z", details: "moderate", }, ], title: "CVE-2018-10882", }, { cve: "CVE-2018-10883", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10883", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10883", url: "https://www.suse.com/security/cve/CVE-2018-10883", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10883", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099863 for CVE-2018-10883", url: "https://bugzilla.suse.com/1099863", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-16T12:30:10Z", details: "moderate", }, ], title: "CVE-2018-10883", }, { cve: "CVE-2018-3620", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3620", }, ], notes: [ { category: "general", text: "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3620", url: "https://www.suse.com/security/cve/CVE-2018-3620", }, { category: "external", summary: "SUSE Bug 1087078 for CVE-2018-3620", url: "https://bugzilla.suse.com/1087078", }, { category: "external", summary: "SUSE Bug 1087081 for CVE-2018-3620", url: "https://bugzilla.suse.com/1087081", }, { category: "external", summary: "SUSE Bug 1089343 for CVE-2018-3620", url: "https://bugzilla.suse.com/1089343", }, { category: "external", summary: "SUSE Bug 1090340 for CVE-2018-3620", url: "https://bugzilla.suse.com/1090340", }, { category: "external", summary: "SUSE Bug 1091107 for CVE-2018-3620", url: "https://bugzilla.suse.com/1091107", }, { category: "external", summary: "SUSE Bug 1099306 for CVE-2018-3620", url: "https://bugzilla.suse.com/1099306", }, { category: "external", summary: "SUSE Bug 1104894 for CVE-2018-3620", url: "https://bugzilla.suse.com/1104894", }, { category: "external", summary: "SUSE Bug 1136865 for CVE-2018-3620", url: "https://bugzilla.suse.com/1136865", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2018-3620", url: "https://bugzilla.suse.com/1201877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-16T12:30:10Z", details: "moderate", }, ], title: "CVE-2018-3620", }, { cve: "CVE-2018-3646", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3646", }, ], notes: [ { category: "general", text: "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3646", url: "https://www.suse.com/security/cve/CVE-2018-3646", }, { category: "external", summary: "SUSE Bug 1087078 for CVE-2018-3646", url: "https://bugzilla.suse.com/1087078", }, { category: "external", summary: "SUSE Bug 1087081 for CVE-2018-3646", url: "https://bugzilla.suse.com/1087081", }, { category: "external", summary: "SUSE Bug 1089343 for CVE-2018-3646", url: "https://bugzilla.suse.com/1089343", }, { category: "external", summary: "SUSE Bug 1091107 for CVE-2018-3646", url: "https://bugzilla.suse.com/1091107", }, { category: "external", summary: "SUSE Bug 1099306 for CVE-2018-3646", url: "https://bugzilla.suse.com/1099306", }, { category: "external", summary: "SUSE Bug 1104365 for CVE-2018-3646", url: "https://bugzilla.suse.com/1104365", }, { category: "external", summary: "SUSE Bug 1104894 for CVE-2018-3646", url: "https://bugzilla.suse.com/1104894", }, { category: "external", summary: "SUSE Bug 1106548 for CVE-2018-3646", url: "https://bugzilla.suse.com/1106548", }, { category: "external", summary: "SUSE Bug 1113534 for CVE-2018-3646", url: "https://bugzilla.suse.com/1113534", }, { category: "external", summary: "SUSE Bug 1136865 for CVE-2018-3646", url: "https://bugzilla.suse.com/1136865", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2018-3646", url: "https://bugzilla.suse.com/1178658", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2018-3646", url: "https://bugzilla.suse.com/1201877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-16T12:30:10Z", details: "important", }, ], title: "CVE-2018-3646", }, { cve: "CVE-2018-5391", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-5391", }, ], notes: [ { category: "general", text: "The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-5391", url: "https://www.suse.com/security/cve/CVE-2018-5391", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-5391", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1102340 for CVE-2018-5391", url: "https://bugzilla.suse.com/1102340", }, { category: "external", summary: "SUSE Bug 1103097 for CVE-2018-5391", url: "https://bugzilla.suse.com/1103097", }, { category: "external", summary: "SUSE Bug 1103098 for CVE-2018-5391", url: "https://bugzilla.suse.com/1103098", }, { category: "external", summary: "SUSE Bug 1108654 for CVE-2018-5391", url: "https://bugzilla.suse.com/1108654", }, { category: "external", summary: "SUSE Bug 1114071 for CVE-2018-5391", url: "https://bugzilla.suse.com/1114071", }, { category: "external", summary: "SUSE Bug 1121102 for CVE-2018-5391", url: "https://bugzilla.suse.com/1121102", }, { category: "external", summary: "SUSE Bug 1134140 for CVE-2018-5391", url: "https://bugzilla.suse.com/1134140", }, { category: "external", summary: "SUSE Bug 1181460 for CVE-2018-5391", url: "https://bugzilla.suse.com/1181460", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-16T12:30:10Z", details: "important", }, ], title: "CVE-2018-5391", }, ], }
suse-su-2018:3084-1
Vulnerability from csaf_suse
Published
2018-10-09 12:00
Modified
2018-10-09 12:00
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.
- CVE-2018-10853: A flaw was found in the way the KVM hypervisor emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest (bnc#1097104).
- CVE-2018-10876: A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image. (bnc#1099811)
- CVE-2018-10877: Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image. (bnc#1099846)
- CVE-2018-10878: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image. (bnc#1099813)
- CVE-2018-10879: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image. (bnc#1099844)
- CVE-2018-10880: Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service. (bnc#1099845)
- CVE-2018-10881: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099864)
- CVE-2018-10882: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image. (bnc#1099849)
- CVE-2018-10883: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099863)
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation (bnc#1105322).
- CVE-2018-10938: A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw (bnc#1106016).
- CVE-2018-10940: The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c allowed local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bnc#1092903).
- CVE-2018-12896: An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically made the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922).
- CVE-2018-13093: There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation (bnc#1100001).
- CVE-2018-13094: An OOPS may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp (bnc#1100000).
- CVE-2018-13095: A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork (bnc#1099999).
- CVE-2018-14617: There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory (bnc#1102870).
- CVE-2018-14678: The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S did not properly maintain RBX, which allowed local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges (bnc#1102715).
- CVE-2018-15572: The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c did not always fill RSB upon a context switch, which made it easier for attackers to conduct userspace-userspace spectreRSB attacks (bnc#1102517 bnc#1105296).
- CVE-2018-15594: arch/x86/kernel/paravirt.c mishandled certain indirect calls, which made it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests (bnc#1105348).
- CVE-2018-16276: Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges (bnc#1106095).
- CVE-2018-16658: An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 (bnc#1107689).
- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bnc#1108399).
- CVE-2018-6554: Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c allowed local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket (bnc#1106509).
- CVE-2018-6555: The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c allowed local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket (bnc#1106511).
- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536).
- CVE-2018-9363: A buffer overflow in bluetooth HID report processing could be used by malicious bluetooth devices to crash the kernel or potentially execute code (bnc#1105292).
The following security bugs were fixed:
- CVE-2018-7480: The blkcg_init_queue function in block/blk-cgroup.c allowed local users to cause a denial of service (double free) or possibly have unspecified other impact by triggering a creation failure (bnc#1082863).
The following non-security bugs were fixed:
- atm: Preserve value of skb->truesize when accounting to vcc (bsc#1089066).
- bcache: avoid unncessary cache prefetch bch_btree_node_get() (bsc#1064232).
- bcache: calculate the number of incremental GC nodes according to the total of btree nodes (bsc#1064232).
- bcache: display rate debug parameters to 0 when writeback is not running (bsc#1064232).
- bcache: do not check return value of debugfs_create_dir() (bsc#1064232).
- bcache: finish incremental GC (bsc#1064232).
- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064232).
- bcache: fix I/O significant decline while backend devices registering (bsc#1064232).
- bcache: free heap cache_set->flush_btree in bch_journal_free (bsc#1064232).
- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section (bsc#1064232).
- bcache: release dc->writeback_lock properly in bch_writeback_thread() (bsc#1064232).
- bcache: set max writeback rate when I/O request is idle (bsc#1064232).
- bcache: simplify the calculation of the total amount of flash dirty data (bsc#1064232).
- ext4: check for allocation block validity with block group locked (bsc#1104495).
- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).
- ibmvnic: Include missing return code checks in reset function (bnc#1107966).
- kABI: protect struct x86_emulate_ops (kabi).
- kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- kvm: MMU: always terminate page walks at level 1 (bsc#1062604).
- kvm: MMU: simplify last_pte_bitmap (bsc#1062604).
- kvm: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).
- kvm: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- kvm: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- net: add skb_condense() helper (bsc#1089066).
- net: adjust skb->truesize in pskb_expand_head() (bsc#1089066).
- net: adjust skb->truesize in ___pskb_trim() (bsc#1089066).
- net: ena: Eliminate duplicate barriers on weakly-ordered archs (bsc#1108239).
- net: ena: fix device destruction to gracefully free resources (bsc#1108239).
- net: ena: fix driver when PAGE_SIZE == 64kB (bsc#1108239).
- net: ena: fix incorrect usage of memory barriers (bsc#1108239).
- net: ena: fix missing calls to READ_ONCE (bsc#1108239).
- net: ena: fix missing lock during device destruction (bsc#1108239).
- net: ena: fix potential double ena_destroy_device() (bsc#1108239).
- net: ena: fix surprise unplug NULL dereference kernel crash (bsc#1108239).
- net: ena: Fix use of uninitialized DMA address bits field (bsc#1108239).
- netfilter: xt_CT: fix refcnt leak on error path (bnc#1012382 bsc#1100152).
- netlink: do not enter direct reclaim from netlink_trim() (bsc#1042286).
- nfs: Use an appropriate work queue for direct-write completion (bsc#1082519).
- ovl: fix random return value on mount (bsc#1099993).
- ovl: fix uid/gid when creating over whiteout (bsc#1099993).
- ovl: modify ovl_permission() to do checks on two inodes (bsc#1106512).
- ovl: override creds with the ones from the superblock mounter (bsc#1099993).
- powerpc: Avoid code patching freed init sections (bnc#1107735).
- powerpc/livepatch: Fix livepatch stack access (bsc#1094466).
- powerpc/modules: Do not try to restore r2 after a sibling call (bsc#1094466).
- powerpc/tm: Avoid possible userspace r1 corruption on reclaim (bsc#1109333).
- powerpc/tm: Fix userspace r13 corruption (bsc#1109333).
- provide special timeout module parameters for EC2 (bsc#1065364).
- stop_machine: Atomically queue and wake stopper threads (git-fixes).
- stop_machine, sched: Fix migrate_swap() vs. active_balance() deadlock (bsc#1088810).
- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).
- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).
- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).
- x86: Drop kernel trampoline stack. It is involved in breaking kdump/kexec infrastucture. (bsc#1099597)
- xen: avoid crash in disable_hotplug_cpu (bsc#1106594).
- xen/blkback: do not keep persistent grants too long (bsc#1085042).
- xen/blkback: move persistent grants flags to bool (bsc#1085042).
- xen/blkfront: cleanup stale persistent grants (bsc#1085042).
- xen/blkfront: reorder tests in xlblk_init() (bsc#1085042).
- xfs: add a new xfs_iext_lookup_extent_before helper (bsc#1095344).
- xfs: add asserts for the mmap lock in xfs_{insert,collapse}_file_space (bsc#1095344).
- xfs: add a xfs_bmap_fork_to_state helper (bsc#1095344).
- xfs: add a xfs_iext_update_extent helper (bsc#1095344).
- xfs: add comments documenting the rebalance algorithm (bsc#1095344).
- xfs: add some comments to xfs_iext_insert/xfs_iext_insert_node (bsc#1095344).
- xfs: add xfs_trim_extent (bsc#1095344).
- xfs: allow unaligned extent records in xfs_bmbt_disk_set_all (bsc#1095344).
- xfs: borrow indirect blocks from freed extent when available (bsc#1095344).
- xfs: cleanup xfs_bmap_last_before (bsc#1095344).
- xfs: do not create overlapping extents in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: do not rely on extent indices in xfs_bmap_collapse_extents (bsc#1095344).
- xfs: do not rely on extent indices in xfs_bmap_insert_extents (bsc#1095344).
- xfs: do not set XFS_BTCUR_BPRV_WASDEL in xfs_bunmapi (bsc#1095344).
- xfs: during btree split, save new block key & ptr for future insertion (bsc#1095344).
- xfs: factor out a helper to initialize a local format inode fork (bsc#1095344).
- xfs: fix memory leak in xfs_iext_free_last_leaf (bsc#1095344).
- xfs: fix number of records handling in xfs_iext_split_leaf (bsc#1095344).
- xfs: handle indlen shortage on delalloc extent merge (bsc#1095344).
- xfs: handle zero entries case in xfs_iext_rebalance_leaf (bsc#1095344).
- xfs: improve kmem_realloc (bsc#1095344).
- xfs: inline xfs_shift_file_space into callers (bsc#1095344).
- xfs: introduce the xfs_iext_cursor abstraction (bsc#1095344).
- xfs: iterate over extents in xfs_bmap_extents_to_btree (bsc#1095344).
- xfs: iterate over extents in xfs_iextents_copy (bsc#1095344).
- xfs: make better use of the 'state' variable in xfs_bmap_del_extent_real (bsc#1095344).
- xfs: merge xfs_bmap_read_extents into xfs_iread_extents (bsc#1095344).
- xfs: move pre/post-bmap tracing into xfs_iext_update_extent (bsc#1095344).
- xfs: move some code around inside xfs_bmap_shift_extents (bsc#1095344).
- xfs: move some more code into xfs_bmap_del_extent_real (bsc#1095344).
- xfs: move xfs_bmbt_irec and xfs_exntst_t to xfs_types.h (bsc#1095344).
- xfs: move xfs_iext_insert tracepoint to report useful information (bsc#1095344).
- xfs: new inode extent list lookup helpers (bsc#1095344).
- xfs: pass an on-disk extent to xfs_bmbt_validate_extent (bsc#1095344).
- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_lookup_eq (bsc#1095344).
- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_update (bsc#1095344).
- xfs: pass struct xfs_bmbt_irec to xfs_bmbt_validate_extent (bsc#1095344).
- xfs: provide helper for counting extents from if_bytes (bsc#1095344).
- xfs: refactor delalloc accounting in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: refactor delalloc indlen reservation split into helper (bsc#1095344).
- xfs: refactor dir2 leaf readahead shadow buffer cleverness (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_hole_delay (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_hole_real (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_unwritten_real (bsc#1095344).
- xfs: refactor xfs_bunmapi_cow (bsc#1095344).
- xfs: refactor xfs_del_extent_real (bsc#1095344).
- xfs: remove a duplicate assignment in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: remove all xfs_bmbt_set_* helpers except for xfs_bmbt_set_all (bsc#1095344).
- xfs: remove a superflous assignment in xfs_iext_remove_node (bsc#1095344).
- xfs: Remove dead code from inode recover function (bsc#1105396).
- xfs: remove if_rdev (bsc#1095344).
- xfs: remove prev argument to xfs_bmapi_reserve_delalloc (bsc#1095344).
- xfs: remove support for inlining data/extents into the inode fork (bsc#1095344).
- xfs: remove the never fully implemented UUID fork format (bsc#1095344).
- xfs: remove the nr_extents argument to xfs_iext_insert (bsc#1095344).
- xfs: remove the nr_extents argument to xfs_iext_remove (bsc#1095344).
- xfs: remove XFS_BMAP_MAX_SHIFT_EXTENTS (bsc#1095344).
- xfs: remove XFS_BMAP_TRACE_EXLIST (bsc#1095344).
- xfs: remove xfs_bmbt_get_state (bsc#1095344).
- xfs: remove xfs_bmse_shift_one (bsc#1095344).
- xfs: rename bno to end in __xfs_bunmapi (bsc#1095344).
- xfs: repair malformed inode items during log recovery (bsc#1105396).
- xfs: replace xfs_bmbt_lookup_ge with xfs_bmbt_lookup_first (bsc#1095344).
- xfs: replace xfs_qm_get_rtblks with a direct call to xfs_bmap_count_leaves (bsc#1095344).
- xfs: rewrite getbmap using the xfs_iext_* helpers (bsc#1095344).
- xfs: rewrite xfs_bmap_count_leaves using xfs_iext_get_extent (bsc#1095344).
- xfs: rewrite xfs_bmap_first_unused to make better use of xfs_iext_get_extent (bsc#1095344).
- xfs: simplify the xfs_getbmap interface (bsc#1095344).
- xfs: simplify validation of the unwritten extent bit (bsc#1095344).
- xfs: split indlen reservations fairly when under reserved (bsc#1095344).
- xfs: split xfs_bmap_shift_extents (bsc#1095344).
- xfs: switch xfs_bmap_local_to_extents to use xfs_iext_insert (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_delay (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_unwritten_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_collapse_extents (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_del_extent_* (bsc#1095344).
- xfs: update freeblocks counter after extent deletion (bsc#1095344).
- xfs: update got in xfs_bmap_shift_update_extent (bsc#1095344).
- xfs: use a b+tree for the in-core extent list (bsc#1095344).
- xfs: use correct state defines in xfs_bmap_del_extent_{cow,delay} (bsc#1095344).
- xfs: use new extent lookup helpers in xfs_bmapi_read (bsc#1095344).
- xfs: use new extent lookup helpers in xfs_bmapi_write (bsc#1095344).
- xfs: use new extent lookup helpers in __xfs_bunmapi (bsc#1095344).
- xfs: use the state defines in xfs_bmap_del_extent_real (bsc#1095344).
- xfs: use xfs_bmap_del_extent_delay for the data fork as well (bsc#1095344).
- xfs: use xfs_iext_*_extent helpers in xfs_bmap_shift_extents (bsc#1095344).
- xfs: use xfs_iext_*_extent helpers in xfs_bmap_split_extent_at (bsc#1095344).
- xfs: use xfs_iext_get_extent instead of open coding it (bsc#1095344).
- xfs: use xfs_iext_get_extent in xfs_bmap_first_unused (bsc#1095344).
Patchnames
SUSE-OpenStack-Cloud-7-2018-2188,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2188,SUSE-SLE-HA-12-SP2-2018-2188,SUSE-SLE-SAP-12-SP2-2018-2188,SUSE-SLE-SERVER-12-SP2-2018-2188,SUSE-SLE-SERVER-12-SP2-BCL-2018-2188,SUSE-Storage-4-2018-2188
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.\n\n- CVE-2018-10853: A flaw was found in the way the KVM hypervisor emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest (bnc#1097104).\n- CVE-2018-10876: A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image. (bnc#1099811)\n- CVE-2018-10877: Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image. (bnc#1099846)\n- CVE-2018-10878: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image. (bnc#1099813)\n- CVE-2018-10879: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image. (bnc#1099844)\n- CVE-2018-10880: Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service. (bnc#1099845)\n- CVE-2018-10881: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099864)\n- CVE-2018-10882: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image. (bnc#1099849)\n- CVE-2018-10883: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099863)\n- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation (bnc#1105322).\n- CVE-2018-10938: A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw (bnc#1106016).\n- CVE-2018-10940: The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c allowed local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bnc#1092903).\n- CVE-2018-12896: An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically made the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922).\n- CVE-2018-13093: There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation (bnc#1100001).\n- CVE-2018-13094: An OOPS may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp (bnc#1100000).\n- CVE-2018-13095: A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork (bnc#1099999).\n- CVE-2018-14617: There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory (bnc#1102870).\n- CVE-2018-14678: The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S did not properly maintain RBX, which allowed local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges (bnc#1102715).\n- CVE-2018-15572: The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c did not always fill RSB upon a context switch, which made it easier for attackers to conduct userspace-userspace spectreRSB attacks (bnc#1102517 bnc#1105296).\n- CVE-2018-15594: arch/x86/kernel/paravirt.c mishandled certain indirect calls, which made it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests (bnc#1105348).\n- CVE-2018-16276: Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges (bnc#1106095).\n- CVE-2018-16658: An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 (bnc#1107689).\n- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bnc#1108399).\n- CVE-2018-6554: Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c allowed local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket (bnc#1106509).\n- CVE-2018-6555: The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c allowed local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket (bnc#1106511).\n- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536).\n- CVE-2018-9363: A buffer overflow in bluetooth HID report processing could be used by malicious bluetooth devices to crash the kernel or potentially execute code (bnc#1105292).\nThe following security bugs were fixed:\n- CVE-2018-7480: The blkcg_init_queue function in block/blk-cgroup.c allowed local users to cause a denial of service (double free) or possibly have unspecified other impact by triggering a creation failure (bnc#1082863).\n\nThe following non-security bugs were fixed:\n\n- atm: Preserve value of skb->truesize when accounting to vcc (bsc#1089066).\n- bcache: avoid unncessary cache prefetch bch_btree_node_get() (bsc#1064232).\n- bcache: calculate the number of incremental GC nodes according to the total of btree nodes (bsc#1064232).\n- bcache: display rate debug parameters to 0 when writeback is not running (bsc#1064232).\n- bcache: do not check return value of debugfs_create_dir() (bsc#1064232).\n- bcache: finish incremental GC (bsc#1064232).\n- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064232).\n- bcache: fix I/O significant decline while backend devices registering (bsc#1064232).\n- bcache: free heap cache_set->flush_btree in bch_journal_free (bsc#1064232).\n- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section (bsc#1064232).\n- bcache: release dc->writeback_lock properly in bch_writeback_thread() (bsc#1064232).\n- bcache: set max writeback rate when I/O request is idle (bsc#1064232).\n- bcache: simplify the calculation of the total amount of flash dirty data (bsc#1064232).\n- ext4: check for allocation block validity with block group locked (bsc#1104495).\n- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).\n- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).\n- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).\n- ibmvnic: Include missing return code checks in reset function (bnc#1107966).\n- kABI: protect struct x86_emulate_ops (kabi).\n- kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)\n- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).\n- kvm: MMU: always terminate page walks at level 1 (bsc#1062604).\n- kvm: MMU: simplify last_pte_bitmap (bsc#1062604).\n- kvm: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).\n- kvm: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).\n- kvm: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).\n- net: add skb_condense() helper (bsc#1089066).\n- net: adjust skb->truesize in pskb_expand_head() (bsc#1089066).\n- net: adjust skb->truesize in ___pskb_trim() (bsc#1089066).\n- net: ena: Eliminate duplicate barriers on weakly-ordered archs (bsc#1108239).\n- net: ena: fix device destruction to gracefully free resources (bsc#1108239).\n- net: ena: fix driver when PAGE_SIZE == 64kB (bsc#1108239).\n- net: ena: fix incorrect usage of memory barriers (bsc#1108239).\n- net: ena: fix missing calls to READ_ONCE (bsc#1108239).\n- net: ena: fix missing lock during device destruction (bsc#1108239).\n- net: ena: fix potential double ena_destroy_device() (bsc#1108239).\n- net: ena: fix surprise unplug NULL dereference kernel crash (bsc#1108239).\n- net: ena: Fix use of uninitialized DMA address bits field (bsc#1108239).\n- netfilter: xt_CT: fix refcnt leak on error path (bnc#1012382 bsc#1100152).\n- netlink: do not enter direct reclaim from netlink_trim() (bsc#1042286).\n- nfs: Use an appropriate work queue for direct-write completion (bsc#1082519).\n- ovl: fix random return value on mount (bsc#1099993).\n- ovl: fix uid/gid when creating over whiteout (bsc#1099993).\n- ovl: modify ovl_permission() to do checks on two inodes (bsc#1106512).\n- ovl: override creds with the ones from the superblock mounter (bsc#1099993).\n- powerpc: Avoid code patching freed init sections (bnc#1107735).\n- powerpc/livepatch: Fix livepatch stack access (bsc#1094466).\n- powerpc/modules: Do not try to restore r2 after a sibling call (bsc#1094466).\n- powerpc/tm: Avoid possible userspace r1 corruption on reclaim (bsc#1109333).\n- powerpc/tm: Fix userspace r13 corruption (bsc#1109333).\n- provide special timeout module parameters for EC2 (bsc#1065364).\n- stop_machine: Atomically queue and wake stopper threads (git-fixes).\n- stop_machine, sched: Fix migrate_swap() vs. active_balance() deadlock (bsc#1088810).\n- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).\n- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).\n- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).\n- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).\n- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).\n- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).\n- x86: Drop kernel trampoline stack. It is involved in breaking kdump/kexec infrastucture. (bsc#1099597)\n- xen: avoid crash in disable_hotplug_cpu (bsc#1106594).\n- xen/blkback: do not keep persistent grants too long (bsc#1085042).\n- xen/blkback: move persistent grants flags to bool (bsc#1085042).\n- xen/blkfront: cleanup stale persistent grants (bsc#1085042).\n- xen/blkfront: reorder tests in xlblk_init() (bsc#1085042).\n- xfs: add a new xfs_iext_lookup_extent_before helper (bsc#1095344).\n- xfs: add asserts for the mmap lock in xfs_{insert,collapse}_file_space (bsc#1095344).\n- xfs: add a xfs_bmap_fork_to_state helper (bsc#1095344).\n- xfs: add a xfs_iext_update_extent helper (bsc#1095344).\n- xfs: add comments documenting the rebalance algorithm (bsc#1095344).\n- xfs: add some comments to xfs_iext_insert/xfs_iext_insert_node (bsc#1095344).\n- xfs: add xfs_trim_extent (bsc#1095344).\n- xfs: allow unaligned extent records in xfs_bmbt_disk_set_all (bsc#1095344).\n- xfs: borrow indirect blocks from freed extent when available (bsc#1095344).\n- xfs: cleanup xfs_bmap_last_before (bsc#1095344).\n- xfs: do not create overlapping extents in xfs_bmap_add_extent_delay_real (bsc#1095344).\n- xfs: do not rely on extent indices in xfs_bmap_collapse_extents (bsc#1095344).\n- xfs: do not rely on extent indices in xfs_bmap_insert_extents (bsc#1095344).\n- xfs: do not set XFS_BTCUR_BPRV_WASDEL in xfs_bunmapi (bsc#1095344).\n- xfs: during btree split, save new block key & ptr for future insertion (bsc#1095344).\n- xfs: factor out a helper to initialize a local format inode fork (bsc#1095344).\n- xfs: fix memory leak in xfs_iext_free_last_leaf (bsc#1095344).\n- xfs: fix number of records handling in xfs_iext_split_leaf (bsc#1095344).\n- xfs: handle indlen shortage on delalloc extent merge (bsc#1095344).\n- xfs: handle zero entries case in xfs_iext_rebalance_leaf (bsc#1095344).\n- xfs: improve kmem_realloc (bsc#1095344).\n- xfs: inline xfs_shift_file_space into callers (bsc#1095344).\n- xfs: introduce the xfs_iext_cursor abstraction (bsc#1095344).\n- xfs: iterate over extents in xfs_bmap_extents_to_btree (bsc#1095344).\n- xfs: iterate over extents in xfs_iextents_copy (bsc#1095344).\n- xfs: make better use of the 'state' variable in xfs_bmap_del_extent_real (bsc#1095344).\n- xfs: merge xfs_bmap_read_extents into xfs_iread_extents (bsc#1095344).\n- xfs: move pre/post-bmap tracing into xfs_iext_update_extent (bsc#1095344).\n- xfs: move some code around inside xfs_bmap_shift_extents (bsc#1095344).\n- xfs: move some more code into xfs_bmap_del_extent_real (bsc#1095344).\n- xfs: move xfs_bmbt_irec and xfs_exntst_t to xfs_types.h (bsc#1095344).\n- xfs: move xfs_iext_insert tracepoint to report useful information (bsc#1095344).\n- xfs: new inode extent list lookup helpers (bsc#1095344).\n- xfs: pass an on-disk extent to xfs_bmbt_validate_extent (bsc#1095344).\n- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_lookup_eq (bsc#1095344).\n- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_update (bsc#1095344).\n- xfs: pass struct xfs_bmbt_irec to xfs_bmbt_validate_extent (bsc#1095344).\n- xfs: provide helper for counting extents from if_bytes (bsc#1095344).\n- xfs: refactor delalloc accounting in xfs_bmap_add_extent_delay_real (bsc#1095344).\n- xfs: refactor delalloc indlen reservation split into helper (bsc#1095344).\n- xfs: refactor dir2 leaf readahead shadow buffer cleverness (bsc#1095344).\n- xfs: refactor xfs_bmap_add_extent_delay_real (bsc#1095344).\n- xfs: refactor xfs_bmap_add_extent_hole_delay (bsc#1095344).\n- xfs: refactor xfs_bmap_add_extent_hole_real (bsc#1095344).\n- xfs: refactor xfs_bmap_add_extent_unwritten_real (bsc#1095344).\n- xfs: refactor xfs_bunmapi_cow (bsc#1095344).\n- xfs: refactor xfs_del_extent_real (bsc#1095344).\n- xfs: remove a duplicate assignment in xfs_bmap_add_extent_delay_real (bsc#1095344).\n- xfs: remove all xfs_bmbt_set_* helpers except for xfs_bmbt_set_all (bsc#1095344).\n- xfs: remove a superflous assignment in xfs_iext_remove_node (bsc#1095344).\n- xfs: Remove dead code from inode recover function (bsc#1105396).\n- xfs: remove if_rdev (bsc#1095344).\n- xfs: remove prev argument to xfs_bmapi_reserve_delalloc (bsc#1095344).\n- xfs: remove support for inlining data/extents into the inode fork (bsc#1095344).\n- xfs: remove the never fully implemented UUID fork format (bsc#1095344).\n- xfs: remove the nr_extents argument to xfs_iext_insert (bsc#1095344).\n- xfs: remove the nr_extents argument to xfs_iext_remove (bsc#1095344).\n- xfs: remove XFS_BMAP_MAX_SHIFT_EXTENTS (bsc#1095344).\n- xfs: remove XFS_BMAP_TRACE_EXLIST (bsc#1095344).\n- xfs: remove xfs_bmbt_get_state (bsc#1095344).\n- xfs: remove xfs_bmse_shift_one (bsc#1095344).\n- xfs: rename bno to end in __xfs_bunmapi (bsc#1095344).\n- xfs: repair malformed inode items during log recovery (bsc#1105396).\n- xfs: replace xfs_bmbt_lookup_ge with xfs_bmbt_lookup_first (bsc#1095344).\n- xfs: replace xfs_qm_get_rtblks with a direct call to xfs_bmap_count_leaves (bsc#1095344).\n- xfs: rewrite getbmap using the xfs_iext_* helpers (bsc#1095344).\n- xfs: rewrite xfs_bmap_count_leaves using xfs_iext_get_extent (bsc#1095344).\n- xfs: rewrite xfs_bmap_first_unused to make better use of xfs_iext_get_extent (bsc#1095344).\n- xfs: simplify the xfs_getbmap interface (bsc#1095344).\n- xfs: simplify validation of the unwritten extent bit (bsc#1095344).\n- xfs: split indlen reservations fairly when under reserved (bsc#1095344).\n- xfs: split xfs_bmap_shift_extents (bsc#1095344).\n- xfs: switch xfs_bmap_local_to_extents to use xfs_iext_insert (bsc#1095344).\n- xfs: treat idx as a cursor in xfs_bmap_add_extent_delay_real (bsc#1095344).\n- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_delay (bsc#1095344).\n- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_real (bsc#1095344).\n- xfs: treat idx as a cursor in xfs_bmap_add_extent_unwritten_real (bsc#1095344).\n- xfs: treat idx as a cursor in xfs_bmap_collapse_extents (bsc#1095344).\n- xfs: treat idx as a cursor in xfs_bmap_del_extent_* (bsc#1095344).\n- xfs: update freeblocks counter after extent deletion (bsc#1095344).\n- xfs: update got in xfs_bmap_shift_update_extent (bsc#1095344).\n- xfs: use a b+tree for the in-core extent list (bsc#1095344).\n- xfs: use correct state defines in xfs_bmap_del_extent_{cow,delay} (bsc#1095344).\n- xfs: use new extent lookup helpers in xfs_bmapi_read (bsc#1095344).\n- xfs: use new extent lookup helpers in xfs_bmapi_write (bsc#1095344).\n- xfs: use new extent lookup helpers in __xfs_bunmapi (bsc#1095344).\n- xfs: use the state defines in xfs_bmap_del_extent_real (bsc#1095344).\n- xfs: use xfs_bmap_del_extent_delay for the data fork as well (bsc#1095344).\n- xfs: use xfs_iext_*_extent helpers in xfs_bmap_shift_extents (bsc#1095344).\n- xfs: use xfs_iext_*_extent helpers in xfs_bmap_split_extent_at (bsc#1095344).\n- xfs: use xfs_iext_get_extent instead of open coding it (bsc#1095344).\n- xfs: use xfs_iext_get_extent in xfs_bmap_first_unused (bsc#1095344).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-OpenStack-Cloud-7-2018-2188,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2188,SUSE-SLE-HA-12-SP2-2018-2188,SUSE-SLE-SAP-12-SP2-2018-2188,SUSE-SLE-SERVER-12-SP2-2018-2188,SUSE-SLE-SERVER-12-SP2-BCL-2018-2188,SUSE-Storage-4-2018-2188", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3084-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:3084-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183084-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:3084-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html", }, { category: "self", summary: "SUSE Bug 1012382", url: "https://bugzilla.suse.com/1012382", }, { category: "self", summary: "SUSE Bug 1042286", url: "https://bugzilla.suse.com/1042286", }, { category: "self", summary: "SUSE Bug 1062604", url: "https://bugzilla.suse.com/1062604", }, { category: "self", summary: "SUSE Bug 1064232", url: "https://bugzilla.suse.com/1064232", }, { category: "self", summary: "SUSE Bug 1065364", url: "https://bugzilla.suse.com/1065364", }, { category: "self", summary: "SUSE Bug 1082519", url: "https://bugzilla.suse.com/1082519", }, { category: "self", summary: "SUSE Bug 1082863", url: "https://bugzilla.suse.com/1082863", }, { category: "self", summary: "SUSE Bug 1084536", url: "https://bugzilla.suse.com/1084536", }, { category: "self", summary: "SUSE Bug 1085042", url: "https://bugzilla.suse.com/1085042", }, { category: "self", summary: "SUSE Bug 1088810", url: "https://bugzilla.suse.com/1088810", }, { category: "self", summary: "SUSE Bug 1089066", url: "https://bugzilla.suse.com/1089066", }, { category: "self", summary: "SUSE Bug 1092903", url: "https://bugzilla.suse.com/1092903", }, { category: "self", summary: "SUSE Bug 1094466", url: "https://bugzilla.suse.com/1094466", }, { category: "self", summary: "SUSE Bug 1095344", url: "https://bugzilla.suse.com/1095344", }, { category: "self", summary: "SUSE Bug 1096547", url: "https://bugzilla.suse.com/1096547", }, { category: "self", summary: "SUSE Bug 1097104", url: "https://bugzilla.suse.com/1097104", }, { category: "self", summary: "SUSE Bug 1099597", url: "https://bugzilla.suse.com/1099597", }, { category: "self", summary: "SUSE Bug 1099811", url: "https://bugzilla.suse.com/1099811", }, { category: "self", summary: "SUSE Bug 1099813", url: "https://bugzilla.suse.com/1099813", }, { category: "self", summary: "SUSE Bug 1099844", url: "https://bugzilla.suse.com/1099844", }, { category: "self", summary: "SUSE Bug 1099845", url: "https://bugzilla.suse.com/1099845", }, { category: "self", summary: "SUSE Bug 1099846", url: "https://bugzilla.suse.com/1099846", }, { category: "self", summary: "SUSE Bug 1099849", url: "https://bugzilla.suse.com/1099849", }, { category: "self", summary: "SUSE Bug 1099863", url: "https://bugzilla.suse.com/1099863", }, { category: "self", summary: "SUSE Bug 1099864", url: "https://bugzilla.suse.com/1099864", }, { category: "self", summary: "SUSE Bug 1099922", url: "https://bugzilla.suse.com/1099922", }, { category: "self", summary: "SUSE Bug 1099993", url: "https://bugzilla.suse.com/1099993", }, { category: "self", summary: "SUSE Bug 1099999", url: "https://bugzilla.suse.com/1099999", }, { category: "self", summary: "SUSE Bug 1100000", url: "https://bugzilla.suse.com/1100000", }, { category: "self", summary: "SUSE Bug 1100001", url: "https://bugzilla.suse.com/1100001", }, { category: "self", summary: "SUSE Bug 1100152", url: "https://bugzilla.suse.com/1100152", }, { category: "self", summary: "SUSE Bug 1102517", url: "https://bugzilla.suse.com/1102517", }, { category: "self", summary: "SUSE Bug 1102715", url: "https://bugzilla.suse.com/1102715", }, { category: "self", summary: "SUSE Bug 1102870", url: "https://bugzilla.suse.com/1102870", }, { category: "self", summary: "SUSE Bug 1103445", url: "https://bugzilla.suse.com/1103445", }, { category: "self", summary: "SUSE Bug 1104319", url: "https://bugzilla.suse.com/1104319", }, { category: "self", summary: "SUSE Bug 1104495", url: "https://bugzilla.suse.com/1104495", }, { category: "self", summary: "SUSE Bug 1105292", url: "https://bugzilla.suse.com/1105292", }, { category: "self", summary: "SUSE Bug 1105296", url: "https://bugzilla.suse.com/1105296", }, { category: "self", summary: "SUSE Bug 1105322", url: "https://bugzilla.suse.com/1105322", }, { category: "self", summary: "SUSE Bug 1105348", url: "https://bugzilla.suse.com/1105348", }, { category: "self", summary: "SUSE Bug 1105396", url: "https://bugzilla.suse.com/1105396", }, { category: "self", summary: "SUSE Bug 1105536", url: "https://bugzilla.suse.com/1105536", }, { category: "self", summary: "SUSE Bug 1106016", url: "https://bugzilla.suse.com/1106016", }, { category: "self", summary: "SUSE Bug 1106095", url: "https://bugzilla.suse.com/1106095", }, { category: "self", summary: "SUSE Bug 1106369", url: "https://bugzilla.suse.com/1106369", }, { category: "self", summary: "SUSE Bug 1106509", url: "https://bugzilla.suse.com/1106509", }, { category: "self", summary: "SUSE Bug 1106511", url: "https://bugzilla.suse.com/1106511", }, { category: "self", summary: "SUSE Bug 1106512", url: "https://bugzilla.suse.com/1106512", }, { category: "self", summary: "SUSE Bug 1106594", url: "https://bugzilla.suse.com/1106594", }, { category: "self", summary: "SUSE Bug 1107689", url: "https://bugzilla.suse.com/1107689", }, { category: "self", summary: "SUSE Bug 1107735", url: "https://bugzilla.suse.com/1107735", }, { category: "self", summary: "SUSE Bug 1107966", url: "https://bugzilla.suse.com/1107966", }, { category: "self", summary: "SUSE Bug 1108239", url: "https://bugzilla.suse.com/1108239", }, { category: "self", summary: "SUSE Bug 1108399", url: "https://bugzilla.suse.com/1108399", }, { category: "self", summary: "SUSE Bug 1109333", url: "https://bugzilla.suse.com/1109333", }, { category: "self", summary: "SUSE CVE CVE-2018-10853 page", url: "https://www.suse.com/security/cve/CVE-2018-10853/", }, { category: "self", summary: "SUSE CVE CVE-2018-10876 page", url: "https://www.suse.com/security/cve/CVE-2018-10876/", }, { category: "self", summary: "SUSE CVE CVE-2018-10877 page", url: "https://www.suse.com/security/cve/CVE-2018-10877/", }, { category: "self", summary: "SUSE CVE CVE-2018-10878 page", url: "https://www.suse.com/security/cve/CVE-2018-10878/", }, { category: "self", summary: "SUSE CVE CVE-2018-10879 page", url: "https://www.suse.com/security/cve/CVE-2018-10879/", }, { category: "self", summary: "SUSE CVE CVE-2018-10880 page", url: "https://www.suse.com/security/cve/CVE-2018-10880/", }, { category: "self", summary: "SUSE CVE CVE-2018-10881 page", url: "https://www.suse.com/security/cve/CVE-2018-10881/", }, { category: "self", summary: "SUSE CVE CVE-2018-10882 page", url: "https://www.suse.com/security/cve/CVE-2018-10882/", }, { category: "self", summary: "SUSE CVE CVE-2018-10883 page", url: "https://www.suse.com/security/cve/CVE-2018-10883/", }, { category: "self", summary: "SUSE CVE CVE-2018-10902 page", url: "https://www.suse.com/security/cve/CVE-2018-10902/", }, { category: "self", summary: "SUSE CVE CVE-2018-10938 page", url: "https://www.suse.com/security/cve/CVE-2018-10938/", }, { category: "self", summary: "SUSE CVE CVE-2018-10940 page", url: "https://www.suse.com/security/cve/CVE-2018-10940/", }, { category: "self", summary: "SUSE CVE CVE-2018-12896 page", url: "https://www.suse.com/security/cve/CVE-2018-12896/", }, { category: "self", summary: "SUSE CVE CVE-2018-13093 page", url: "https://www.suse.com/security/cve/CVE-2018-13093/", }, { category: "self", summary: "SUSE CVE CVE-2018-13094 page", url: "https://www.suse.com/security/cve/CVE-2018-13094/", }, { category: "self", summary: "SUSE CVE CVE-2018-13095 page", url: "https://www.suse.com/security/cve/CVE-2018-13095/", }, { category: "self", summary: "SUSE CVE CVE-2018-14617 page", url: "https://www.suse.com/security/cve/CVE-2018-14617/", }, { category: "self", summary: "SUSE CVE CVE-2018-14678 page", url: "https://www.suse.com/security/cve/CVE-2018-14678/", }, { category: "self", summary: "SUSE CVE CVE-2018-15572 page", url: "https://www.suse.com/security/cve/CVE-2018-15572/", }, { category: "self", summary: "SUSE CVE CVE-2018-15594 page", url: "https://www.suse.com/security/cve/CVE-2018-15594/", }, { category: "self", summary: "SUSE CVE CVE-2018-16276 page", url: "https://www.suse.com/security/cve/CVE-2018-16276/", }, { category: "self", summary: "SUSE CVE CVE-2018-16658 page", url: "https://www.suse.com/security/cve/CVE-2018-16658/", }, { category: "self", summary: "SUSE CVE CVE-2018-17182 page", url: "https://www.suse.com/security/cve/CVE-2018-17182/", }, { category: "self", summary: "SUSE CVE CVE-2018-6554 page", url: "https://www.suse.com/security/cve/CVE-2018-6554/", }, { category: "self", summary: "SUSE CVE CVE-2018-6555 page", url: "https://www.suse.com/security/cve/CVE-2018-6555/", }, { category: "self", summary: "SUSE CVE CVE-2018-7480 page", url: "https://www.suse.com/security/cve/CVE-2018-7480/", }, { category: "self", summary: "SUSE CVE CVE-2018-7757 page", url: "https://www.suse.com/security/cve/CVE-2018-7757/", }, { category: "self", summary: "SUSE CVE CVE-2018-9363 page", url: "https://www.suse.com/security/cve/CVE-2018-9363/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2018-10-09T12:00:14Z", generator: { date: "2018-10-09T12:00:14Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:3084-1", initial_release_date: "2018-10-09T12:00:14Z", revision_history: [ { date: "2018-10-09T12:00:14Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-4.4.121-92.95.1.noarch", product: { name: "kernel-devel-4.4.121-92.95.1.noarch", product_id: "kernel-devel-4.4.121-92.95.1.noarch", }, }, { category: "product_version", name: "kernel-macros-4.4.121-92.95.1.noarch", product: { name: "kernel-macros-4.4.121-92.95.1.noarch", product_id: "kernel-macros-4.4.121-92.95.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.4.121-92.95.1.noarch", product: { name: "kernel-source-4.4.121-92.95.1.noarch", product_id: "kernel-source-4.4.121-92.95.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", product: { name: "cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", product_id: "cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", }, }, { category: "product_version", name: "cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", product: { name: "cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", product_id: "cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.121-92.95.1.ppc64le", product: { name: "dlm-kmp-default-4.4.121-92.95.1.ppc64le", product_id: "dlm-kmp-default-4.4.121-92.95.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.121-92.95.1.ppc64le", product: { name: "gfs2-kmp-default-4.4.121-92.95.1.ppc64le", product_id: "gfs2-kmp-default-4.4.121-92.95.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", product: { name: "ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", product_id: "ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.4.121-92.95.1.ppc64le", product: { name: "kernel-default-4.4.121-92.95.1.ppc64le", product_id: "kernel-default-4.4.121-92.95.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.4.121-92.95.1.ppc64le", product: { name: "kernel-default-base-4.4.121-92.95.1.ppc64le", product_id: "kernel-default-base-4.4.121-92.95.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.4.121-92.95.1.ppc64le", product: { name: "kernel-default-devel-4.4.121-92.95.1.ppc64le", product_id: "kernel-default-devel-4.4.121-92.95.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.4.121-92.95.1.ppc64le", product: { name: "kernel-syms-4.4.121-92.95.1.ppc64le", product_id: "kernel-syms-4.4.121-92.95.1.ppc64le", }, }, { category: "product_version", name: "kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", product: { name: "kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", product_id: "kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-default-4.4.121-92.95.1.s390x", product: { name: "kernel-default-4.4.121-92.95.1.s390x", product_id: "kernel-default-4.4.121-92.95.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.4.121-92.95.1.s390x", product: { name: "kernel-default-base-4.4.121-92.95.1.s390x", product_id: "kernel-default-base-4.4.121-92.95.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.4.121-92.95.1.s390x", product: { name: "kernel-default-devel-4.4.121-92.95.1.s390x", product_id: "kernel-default-devel-4.4.121-92.95.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.4.121-92.95.1.s390x", product: { name: "kernel-default-man-4.4.121-92.95.1.s390x", product_id: "kernel-default-man-4.4.121-92.95.1.s390x", }, }, { category: "product_version", name: "kernel-syms-4.4.121-92.95.1.s390x", product: { name: "kernel-syms-4.4.121-92.95.1.s390x", product_id: "kernel-syms-4.4.121-92.95.1.s390x", }, }, { category: "product_version", name: "cluster-md-kmp-default-4.4.121-92.95.1.s390x", product: { name: "cluster-md-kmp-default-4.4.121-92.95.1.s390x", product_id: "cluster-md-kmp-default-4.4.121-92.95.1.s390x", }, }, { category: "product_version", name: "cluster-network-kmp-default-4.4.121-92.95.1.s390x", product: { name: "cluster-network-kmp-default-4.4.121-92.95.1.s390x", product_id: "cluster-network-kmp-default-4.4.121-92.95.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.121-92.95.1.s390x", product: { name: "dlm-kmp-default-4.4.121-92.95.1.s390x", product_id: "dlm-kmp-default-4.4.121-92.95.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.121-92.95.1.s390x", product: { name: "gfs2-kmp-default-4.4.121-92.95.1.s390x", product_id: "gfs2-kmp-default-4.4.121-92.95.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.121-92.95.1.s390x", product: { name: "ocfs2-kmp-default-4.4.121-92.95.1.s390x", product_id: "ocfs2-kmp-default-4.4.121-92.95.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-default-4.4.121-92.95.1.x86_64", product: { name: "kernel-default-4.4.121-92.95.1.x86_64", product_id: "kernel-default-4.4.121-92.95.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.4.121-92.95.1.x86_64", product: { name: "kernel-default-base-4.4.121-92.95.1.x86_64", product_id: "kernel-default-base-4.4.121-92.95.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.4.121-92.95.1.x86_64", product: { name: "kernel-default-devel-4.4.121-92.95.1.x86_64", product_id: "kernel-default-devel-4.4.121-92.95.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.4.121-92.95.1.x86_64", product: { name: "kernel-syms-4.4.121-92.95.1.x86_64", product_id: "kernel-syms-4.4.121-92.95.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", product: { name: "kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", product_id: "kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", }, }, { category: "product_version", name: "lttng-modules-2.7.1-9.6.1.x86_64", product: { name: "lttng-modules-2.7.1-9.6.1.x86_64", product_id: "lttng-modules-2.7.1-9.6.1.x86_64", }, }, { category: "product_version", name: "lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", product: { name: "lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", product_id: "lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-default-4.4.121-92.95.1.x86_64", product: { name: "cluster-md-kmp-default-4.4.121-92.95.1.x86_64", product_id: "cluster-md-kmp-default-4.4.121-92.95.1.x86_64", }, }, { category: "product_version", name: "cluster-network-kmp-default-4.4.121-92.95.1.x86_64", product: { name: "cluster-network-kmp-default-4.4.121-92.95.1.x86_64", product_id: "cluster-network-kmp-default-4.4.121-92.95.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.121-92.95.1.x86_64", product: { name: "dlm-kmp-default-4.4.121-92.95.1.x86_64", product_id: "dlm-kmp-default-4.4.121-92.95.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.121-92.95.1.x86_64", product: { name: "gfs2-kmp-default-4.4.121-92.95.1.x86_64", product_id: "gfs2-kmp-default-4.4.121-92.95.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.121-92.95.1.x86_64", product: { name: "ocfs2-kmp-default-4.4.121-92.95.1.x86_64", product_id: "ocfs2-kmp-default-4.4.121-92.95.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE OpenStack Cloud 7", product: { name: "SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:7", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 12 SP2", product: { name: "SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp2", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 4", product: { name: "SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4", product_identification_helper: { cpe: "cpe:/o:suse:ses:4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.95.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", }, product_reference: "kernel-default-4.4.121-92.95.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.95.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", }, product_reference: "kernel-default-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.95.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", }, product_reference: "kernel-default-base-4.4.121-92.95.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.95.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", }, product_reference: "kernel-default-base-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.95.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", }, product_reference: "kernel-default-devel-4.4.121-92.95.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.95.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", }, product_reference: "kernel-default-devel-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.4.121-92.95.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", }, product_reference: "kernel-default-man-4.4.121-92.95.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.121-92.95.1.noarch as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", }, product_reference: "kernel-devel-4.4.121-92.95.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.121-92.95.1.noarch as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", }, product_reference: "kernel-macros-4.4.121-92.95.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.121-92.95.1.noarch as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", }, product_reference: "kernel-source-4.4.121-92.95.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.95.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", }, product_reference: "kernel-syms-4.4.121-92.95.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.95.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", }, product_reference: "kernel-syms-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "lttng-modules-2.7.1-9.6.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", }, product_reference: "lttng-modules-2.7.1-9.6.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", }, product_reference: "lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.4.121-92.95.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", }, product_reference: "cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.4.121-92.95.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", }, product_reference: "cluster-md-kmp-default-4.4.121-92.95.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.4.121-92.95.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-network-kmp-default-4.4.121-92.95.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", }, product_reference: "cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-network-kmp-default-4.4.121-92.95.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", }, product_reference: "cluster-network-kmp-default-4.4.121-92.95.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-network-kmp-default-4.4.121-92.95.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", }, product_reference: "cluster-network-kmp-default-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.4.121-92.95.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", }, product_reference: "dlm-kmp-default-4.4.121-92.95.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.4.121-92.95.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", }, product_reference: "dlm-kmp-default-4.4.121-92.95.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.4.121-92.95.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", }, product_reference: "dlm-kmp-default-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.4.121-92.95.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", }, product_reference: "gfs2-kmp-default-4.4.121-92.95.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.4.121-92.95.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", }, product_reference: "gfs2-kmp-default-4.4.121-92.95.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.4.121-92.95.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", }, product_reference: "gfs2-kmp-default-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.4.121-92.95.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", }, product_reference: "ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.4.121-92.95.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", }, product_reference: "ocfs2-kmp-default-4.4.121-92.95.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.4.121-92.95.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.95.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", }, product_reference: "kernel-default-4.4.121-92.95.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.95.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", }, product_reference: "kernel-default-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.95.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", }, product_reference: "kernel-default-base-4.4.121-92.95.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.95.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", }, product_reference: "kernel-default-base-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.95.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", }, product_reference: "kernel-default-devel-4.4.121-92.95.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.95.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", }, product_reference: "kernel-default-devel-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.121-92.95.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", }, product_reference: "kernel-devel-4.4.121-92.95.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.121-92.95.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", }, product_reference: "kernel-macros-4.4.121-92.95.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.121-92.95.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", }, product_reference: "kernel-source-4.4.121-92.95.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.95.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", }, product_reference: "kernel-syms-4.4.121-92.95.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.95.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", }, product_reference: "kernel-syms-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "lttng-modules-2.7.1-9.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", }, product_reference: "lttng-modules-2.7.1-9.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", }, product_reference: "lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.95.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", }, product_reference: "kernel-default-4.4.121-92.95.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.95.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", }, product_reference: "kernel-default-4.4.121-92.95.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.95.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", }, product_reference: "kernel-default-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.95.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", }, product_reference: "kernel-default-base-4.4.121-92.95.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.95.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", }, product_reference: "kernel-default-base-4.4.121-92.95.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.95.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", }, product_reference: "kernel-default-base-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.95.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", }, product_reference: "kernel-default-devel-4.4.121-92.95.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.95.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", }, product_reference: "kernel-default-devel-4.4.121-92.95.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.95.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", }, product_reference: "kernel-default-devel-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.4.121-92.95.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", }, product_reference: "kernel-default-man-4.4.121-92.95.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.121-92.95.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", }, product_reference: "kernel-devel-4.4.121-92.95.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.121-92.95.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", }, product_reference: "kernel-macros-4.4.121-92.95.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.121-92.95.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", }, product_reference: "kernel-source-4.4.121-92.95.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.95.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", }, product_reference: "kernel-syms-4.4.121-92.95.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.95.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", }, product_reference: "kernel-syms-4.4.121-92.95.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.95.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", }, product_reference: "kernel-syms-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "lttng-modules-2.7.1-9.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", }, product_reference: "lttng-modules-2.7.1-9.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", }, product_reference: "lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.95.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", }, product_reference: "kernel-default-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.95.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", }, product_reference: "kernel-default-base-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.95.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", }, product_reference: "kernel-default-devel-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.121-92.95.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", }, product_reference: "kernel-devel-4.4.121-92.95.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.121-92.95.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", }, product_reference: "kernel-macros-4.4.121-92.95.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.121-92.95.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", }, product_reference: "kernel-source-4.4.121-92.95.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.95.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", }, product_reference: "kernel-syms-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "lttng-modules-2.7.1-9.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", }, product_reference: "lttng-modules-2.7.1-9.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", }, product_reference: "lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.95.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", }, product_reference: "kernel-default-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.95.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", }, product_reference: "kernel-default-base-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.95.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", }, product_reference: "kernel-default-devel-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.121-92.95.1.noarch as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", }, product_reference: "kernel-devel-4.4.121-92.95.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.121-92.95.1.noarch as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", }, product_reference: "kernel-macros-4.4.121-92.95.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.121-92.95.1.noarch as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", }, product_reference: "kernel-source-4.4.121-92.95.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.95.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", }, product_reference: "kernel-syms-4.4.121-92.95.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "lttng-modules-2.7.1-9.6.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", }, product_reference: "lttng-modules-2.7.1-9.6.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", }, product_reference: "lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, ], }, vulnerabilities: [ { cve: "CVE-2018-10853", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10853", }, ], notes: [ { category: "general", text: "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10853", url: "https://www.suse.com/security/cve/CVE-2018-10853", }, { category: "external", summary: "SUSE Bug 1097104 for CVE-2018-10853", url: "https://bugzilla.suse.com/1097104", }, { category: "external", summary: "SUSE Bug 1097108 for CVE-2018-10853", url: "https://bugzilla.suse.com/1097108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "important", }, ], title: "CVE-2018-10853", }, { cve: "CVE-2018-10876", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10876", }, ], notes: [ { category: "general", text: "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10876", url: "https://www.suse.com/security/cve/CVE-2018-10876", }, { category: "external", summary: "SUSE Bug 1099811 for CVE-2018-10876", url: "https://bugzilla.suse.com/1099811", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "low", }, ], title: "CVE-2018-10876", }, { cve: "CVE-2018-10877", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10877", }, ], notes: [ { category: "general", text: "Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10877", url: "https://www.suse.com/security/cve/CVE-2018-10877", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10877", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099846 for CVE-2018-10877", url: "https://bugzilla.suse.com/1099846", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "low", }, ], title: "CVE-2018-10877", }, { cve: "CVE-2018-10878", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10878", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10878", url: "https://www.suse.com/security/cve/CVE-2018-10878", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10878", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099813 for CVE-2018-10878", url: "https://bugzilla.suse.com/1099813", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "moderate", }, ], title: "CVE-2018-10878", }, { cve: "CVE-2018-10879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10879", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10879", url: "https://www.suse.com/security/cve/CVE-2018-10879", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10879", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099844 for CVE-2018-10879", url: "https://bugzilla.suse.com/1099844", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "moderate", }, ], title: "CVE-2018-10879", }, { cve: "CVE-2018-10880", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10880", }, ], notes: [ { category: "general", text: "Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10880", url: "https://www.suse.com/security/cve/CVE-2018-10880", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10880", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099845 for CVE-2018-10880", url: "https://bugzilla.suse.com/1099845", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "moderate", }, ], title: "CVE-2018-10880", }, { cve: "CVE-2018-10881", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10881", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10881", url: "https://www.suse.com/security/cve/CVE-2018-10881", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10881", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099864 for CVE-2018-10881", url: "https://bugzilla.suse.com/1099864", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "moderate", }, ], title: "CVE-2018-10881", }, { cve: "CVE-2018-10882", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10882", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10882", url: "https://www.suse.com/security/cve/CVE-2018-10882", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10882", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099849 for CVE-2018-10882", url: "https://bugzilla.suse.com/1099849", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "moderate", }, ], title: "CVE-2018-10882", }, { cve: "CVE-2018-10883", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10883", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10883", url: "https://www.suse.com/security/cve/CVE-2018-10883", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10883", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099863 for CVE-2018-10883", url: "https://bugzilla.suse.com/1099863", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "moderate", }, ], title: "CVE-2018-10883", }, { cve: "CVE-2018-10902", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10902", }, ], notes: [ { category: "general", text: "It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10902", url: "https://www.suse.com/security/cve/CVE-2018-10902", }, { category: "external", summary: "SUSE Bug 1105322 for CVE-2018-10902", url: "https://bugzilla.suse.com/1105322", }, { category: "external", summary: "SUSE Bug 1105323 for CVE-2018-10902", url: "https://bugzilla.suse.com/1105323", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "moderate", }, ], title: "CVE-2018-10902", }, { cve: "CVE-2018-10938", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10938", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10938", url: "https://www.suse.com/security/cve/CVE-2018-10938", }, { category: "external", summary: "SUSE Bug 1106016 for CVE-2018-10938", url: "https://bugzilla.suse.com/1106016", }, { category: "external", summary: "SUSE Bug 1106191 for CVE-2018-10938", url: "https://bugzilla.suse.com/1106191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "important", }, ], title: "CVE-2018-10938", }, { cve: "CVE-2018-10940", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10940", }, ], notes: [ { category: "general", text: "The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c in the Linux kernel before 4.16.6 allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10940", url: "https://www.suse.com/security/cve/CVE-2018-10940", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10940", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092903 for CVE-2018-10940", url: "https://bugzilla.suse.com/1092903", }, { category: "external", summary: "SUSE Bug 1107689 for CVE-2018-10940", url: "https://bugzilla.suse.com/1107689", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-10940", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "moderate", }, ], title: "CVE-2018-10940", }, { cve: "CVE-2018-12896", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12896", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12896", url: "https://www.suse.com/security/cve/CVE-2018-12896", }, { category: "external", summary: "SUSE Bug 1099922 for CVE-2018-12896", url: "https://bugzilla.suse.com/1099922", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "low", }, ], title: "CVE-2018-12896", }, { cve: "CVE-2018-13093", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-13093", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/xfs/xfs_icache.c in the Linux kernel through 4.17.3. There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-13093", url: "https://www.suse.com/security/cve/CVE-2018-13093", }, { category: "external", summary: "SUSE Bug 1100001 for CVE-2018-13093", url: "https://bugzilla.suse.com/1100001", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "moderate", }, ], title: "CVE-2018-13093", }, { cve: "CVE-2018-13094", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-13094", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/xfs/libxfs/xfs_attr_leaf.c in the Linux kernel through 4.17.3. An OOPS may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-13094", url: "https://www.suse.com/security/cve/CVE-2018-13094", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-13094", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1100000 for CVE-2018-13094", url: "https://bugzilla.suse.com/1100000", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "moderate", }, ], title: "CVE-2018-13094", }, { cve: "CVE-2018-13095", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-13095", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.17.3. A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-13095", url: "https://www.suse.com/security/cve/CVE-2018-13095", }, { category: "external", summary: "SUSE Bug 1099999 for CVE-2018-13095", url: "https://bugzilla.suse.com/1099999", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "moderate", }, ], title: "CVE-2018-13095", }, { cve: "CVE-2018-14617", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14617", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14617", url: "https://www.suse.com/security/cve/CVE-2018-14617", }, { category: "external", summary: "SUSE Bug 1102870 for CVE-2018-14617", url: "https://bugzilla.suse.com/1102870", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "moderate", }, ], title: "CVE-2018-14617", }, { cve: "CVE-2018-14678", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14678", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.17.11, as used in Xen through 4.11.x. The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S does not properly maintain RBX, which allows local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14678", url: "https://www.suse.com/security/cve/CVE-2018-14678", }, { category: "external", summary: "SUSE Bug 1102715 for CVE-2018-14678", url: "https://bugzilla.suse.com/1102715", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "moderate", }, ], title: "CVE-2018-14678", }, { cve: "CVE-2018-15572", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-15572", }, ], notes: [ { category: "general", text: "The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-15572", url: "https://www.suse.com/security/cve/CVE-2018-15572", }, { category: "external", summary: "SUSE Bug 1102517 for CVE-2018-15572", url: "https://bugzilla.suse.com/1102517", }, { category: "external", summary: "SUSE Bug 1105296 for CVE-2018-15572", url: "https://bugzilla.suse.com/1105296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "important", }, ], title: "CVE-2018-15572", }, { cve: "CVE-2018-15594", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-15594", }, ], notes: [ { category: "general", text: "arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-15594", url: "https://www.suse.com/security/cve/CVE-2018-15594", }, { category: "external", summary: "SUSE Bug 1105348 for CVE-2018-15594", url: "https://bugzilla.suse.com/1105348", }, { category: "external", summary: "SUSE Bug 1133319 for CVE-2018-15594", url: "https://bugzilla.suse.com/1133319", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "moderate", }, ], title: "CVE-2018-15594", }, { cve: "CVE-2018-16276", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16276", }, ], notes: [ { category: "general", text: "An issue was discovered in yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7. Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16276", url: "https://www.suse.com/security/cve/CVE-2018-16276", }, { category: "external", summary: "SUSE Bug 1106095 for CVE-2018-16276", url: "https://bugzilla.suse.com/1106095", }, { category: "external", summary: "SUSE Bug 1115593 for CVE-2018-16276", url: "https://bugzilla.suse.com/1115593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "important", }, ], title: "CVE-2018-16276", }, { cve: "CVE-2018-16658", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16658", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16658", url: "https://www.suse.com/security/cve/CVE-2018-16658", }, { category: "external", summary: "SUSE Bug 1092903 for CVE-2018-16658", url: "https://bugzilla.suse.com/1092903", }, { category: "external", summary: "SUSE Bug 1107689 for CVE-2018-16658", url: "https://bugzilla.suse.com/1107689", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-16658", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "low", }, ], title: "CVE-2018-16658", }, { cve: "CVE-2018-17182", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17182", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17182", url: "https://www.suse.com/security/cve/CVE-2018-17182", }, { category: "external", summary: "SUSE Bug 1108399 for CVE-2018-17182", url: "https://bugzilla.suse.com/1108399", }, { category: "external", summary: "SUSE Bug 1110233 for CVE-2018-17182", url: "https://bugzilla.suse.com/1110233", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "moderate", }, ], title: "CVE-2018-17182", }, { cve: "CVE-2018-6554", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6554", }, ], notes: [ { category: "general", text: "Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6554", url: "https://www.suse.com/security/cve/CVE-2018-6554", }, { category: "external", summary: "SUSE Bug 1106509 for CVE-2018-6554", url: "https://bugzilla.suse.com/1106509", }, { category: "external", summary: "SUSE Bug 1106511 for CVE-2018-6554", url: "https://bugzilla.suse.com/1106511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "low", }, ], title: "CVE-2018-6554", }, { cve: "CVE-2018-6555", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6555", }, ], notes: [ { category: "general", text: "The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6555", url: "https://www.suse.com/security/cve/CVE-2018-6555", }, { category: "external", summary: "SUSE Bug 1106509 for CVE-2018-6555", url: "https://bugzilla.suse.com/1106509", }, { category: "external", summary: "SUSE Bug 1106511 for CVE-2018-6555", url: "https://bugzilla.suse.com/1106511", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2018-6555", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "moderate", }, ], title: "CVE-2018-6555", }, { cve: "CVE-2018-7480", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7480", }, ], notes: [ { category: "general", text: "The blkcg_init_queue function in block/blk-cgroup.c in the Linux kernel before 4.11 allows local users to cause a denial of service (double free) or possibly have unspecified other impact by triggering a creation failure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7480", url: "https://www.suse.com/security/cve/CVE-2018-7480", }, { category: "external", summary: "SUSE Bug 1082863 for CVE-2018-7480", url: "https://bugzilla.suse.com/1082863", }, { category: "external", summary: "SUSE Bug 1084536 for CVE-2018-7480", url: "https://bugzilla.suse.com/1084536", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "moderate", }, ], title: "CVE-2018-7480", }, { cve: "CVE-2018-7757", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7757", }, ], notes: [ { category: "general", text: "Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7757", url: "https://www.suse.com/security/cve/CVE-2018-7757", }, { category: "external", summary: "SUSE Bug 1084536 for CVE-2018-7757", url: "https://bugzilla.suse.com/1084536", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-7757", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1087209 for CVE-2018-7757", url: "https://bugzilla.suse.com/1087209", }, { category: "external", summary: "SUSE Bug 1091815 for CVE-2018-7757", url: "https://bugzilla.suse.com/1091815", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "moderate", }, ], title: "CVE-2018-7757", }, { cve: "CVE-2018-9363", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-9363", }, ], notes: [ { category: "general", text: "In the hidp_process_report in bluetooth, there is an integer overflow. This could lead to an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-65853588 References: Upstream kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-9363", url: "https://www.suse.com/security/cve/CVE-2018-9363", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-9363", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1105292 for CVE-2018-9363", url: "https://bugzilla.suse.com/1105292", }, { category: "external", summary: "SUSE Bug 1105293 for CVE-2018-9363", url: "https://bugzilla.suse.com/1105293", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.95.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.95.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.95.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.95.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_95-default-1-3.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.6.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T12:00:14Z", details: "important", }, ], title: "CVE-2018-9363", }, ], }
suse-su-2018:2908-1
Vulnerability from csaf_suse
Published
2018-09-27 15:01
Modified
2018-09-27 15:01
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 kernel was updated receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a
local attacker to exploit this vulnerability via a SUID-root binary and obtain
full root privileges (bsc#1108912)
- CVE-2018-14617: Prevent NULL pointer dereference and panic in
hfsplus_lookup() when opening a file (that is purportedly a hard link) in an
hfs+ filesystem that has malformed catalog data, and is mounted read-only
without a metadata directory (bsc#1102870)
- CVE-2018-16276: Incorrect bounds checking in the yurex USB driver in
yurex_read allowed local attackers to use user access read/writes to crash the
kernel or potentially escalate privileges (bsc#1106095)
- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was
caused by the way the overrun accounting works. Depending on interval and
expiry time values, the overrun can be larger than INT_MAX, but the accounting
is int based. This basically made the accounting values, which are visible to
user space via timer_getoverrun(2) and siginfo::si_overrun, random. This
allowed a local user to cause a denial of service (signed integer overflow) via
crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922)
- CVE-2018-13093: Prevent NULL pointer dereference and panic in lookup_slow()
on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image.
This occured because of a lack of proper validation that cached inodes are free
during allocation (bnc#1100001)
- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local
attackers to use a incorrect bounds check in the CDROM driver
CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that
could have been used by local attackers to read kernel memory (bnc#1107689)
- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a
denial of service (ias_object use-after-free and system crash) or possibly have
unspecified other impact via an AF_IRDA socket (bnc#1106511)
- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed
local users to cause a denial of service (memory consumption) by repeatedly
binding an AF_IRDA socket (bnc#1106509)
- CVE-2018-10902: Protect against concurrent access to prevent double realloc
(double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A
malicious local attacker could have used this for privilege escalation
(bnc#1105322)
- CVE-2018-10879: A local user could have caused a use-after-free in
ext4_xattr_set_entry function and a denial of service or unspecified other
impact by renaming a file in a crafted ext4 filesystem image (bsc#1099844)
- CVE-2018-10883: A local user could have caused an out-of-bounds write in
jbd2_journal_dirty_metadata(), a denial of service, and a system crash by
mounting and operating on a crafted ext4 filesystem image (bsc#1099863)
- CVE-2018-10880: Prevent stack-out-of-bounds write in the ext4 filesystem code
when mounting and writing to a crafted ext4 image in ext4_update_inline_data().
An attacker could have used this to cause a system crash and a denial of
service (bsc#1099845)
- CVE-2018-10882: A local user could have caused an out-of-bound write, a
denial of service, and a system crash by unmounting a crafted ext4 filesystem
image (bsc#1099849)
- CVE-2018-10881: A local user could have caused an out-of-bound access in
ext4_get_group_info function, a denial of service, and a system crash by
mounting and operating on a crafted ext4 filesystem image (bsc#1099864)
- CVE-2018-10877: Prevent out-of-bound access in the ext4_ext_drop_refs()
function when operating on a crafted ext4 filesystem image (bsc#1099846)
- CVE-2018-10876: A use-after-free was possible in ext4_ext_remove_space()
function when mounting and operating a crafted ext4 image (bsc#1099811)
- CVE-2018-10878: A local user could have caused an out-of-bounds write and a
denial of service or unspecified other impact by mounting and operating a
crafted ext4 filesystem image (bsc#1099813)
- CVE-2018-10853: The KVM hypervisor did not check current privilege(CPL) level
while emulating unprivileged instructions. An unprivileged guest user/process
could have used this flaw to potentially escalate privileges inside guest
(bsc#1097104).
The following non-security bugs were fixed:
- KEYS: prevent creating a different user's keyrings (bnc#1065999).
- KVM: MMU: always terminate page walks at level 1 (bsc#1062604).
- KVM: MMU: simplify last_pte_bitmap (bsc#1062604).
- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- KVM: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).
- Refresh patches.xen/xen3-x86-l1tf-04-protect-PROT_NONE-ptes.patch (bsc#1105100).
- Do not report CPU affected by L1TF when ARCH_CAP_RDCL_NO bit is set (bsc#1104906).
- Revert '- Disable patches.arch/x86-mm-Simplify-p-g4um-d_page-macros.patch' (bnc#1104818)
- bcache: avoid unncessary cache prefetch bch_btree_node_get().
- bcache: calculate the number of incremental GC nodes according to the total of btree nodes.
- bcache: display rate debug parameters to 0 when writeback is not running.
- bcache: do not check return value of debugfs_create_dir().
- bcache: finish incremental GC.
- bcache: fix I/O significant decline while backend devices registering.
- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064233).
- bcache: free heap cache_set->flush_btree in bch_journal_free.
- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section.
- bcache: release dc->writeback_lock properly in bch_writeback_thread().
- bcache: set max writeback rate when I/O request is idle (bsc#1064233).
- bcache: simplify the calculation of the total amount of flash dirty data.
- cifs: Fix infinite loop when using hard mount option (bsc#1091171).
- ext4: check for allocation block validity with block group locked (bsc#1104495).
- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).
- restore cond_resched() in shrink_dcache_parent().
- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).
- x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104818).
- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).
- xen, x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104818).
- xfs: Remove dead code from inode recover function (bsc#1105396).
- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).
- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).
- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).
- xfs: protect inode ->di_dmstate with a spinlock (bsc#1024788).
- xfs: repair malformed inode items during log recovery (bsc#1105396).
Patchnames
SUSE-SLE-Module-Public-Cloud-12-2018-2063,SUSE-SLE-SERVER-12-SP1-2018-2063
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 12 SP1 kernel was updated receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a\n local attacker to exploit this vulnerability via a SUID-root binary and obtain\n full root privileges (bsc#1108912)\n- CVE-2018-14617: Prevent NULL pointer dereference and panic in\n hfsplus_lookup() when opening a file (that is purportedly a hard link) in an\n hfs+ filesystem that has malformed catalog data, and is mounted read-only\n without a metadata directory (bsc#1102870)\n- CVE-2018-16276: Incorrect bounds checking in the yurex USB driver in\n yurex_read allowed local attackers to use user access read/writes to crash the\n kernel or potentially escalate privileges (bsc#1106095)\n- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was\n caused by the way the overrun accounting works. Depending on interval and\n expiry time values, the overrun can be larger than INT_MAX, but the accounting\n is int based. This basically made the accounting values, which are visible to\n user space via timer_getoverrun(2) and siginfo::si_overrun, random. This\n allowed a local user to cause a denial of service (signed integer overflow) via\n crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922)\n- CVE-2018-13093: Prevent NULL pointer dereference and panic in lookup_slow()\n on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image.\n This occured because of a lack of proper validation that cached inodes are free\n during allocation (bnc#1100001)\n- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local\n attackers to use a incorrect bounds check in the CDROM driver\n CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)\n- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that\n could have been used by local attackers to read kernel memory (bnc#1107689)\n- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a\n denial of service (ias_object use-after-free and system crash) or possibly have\n unspecified other impact via an AF_IRDA socket (bnc#1106511)\n- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed\n local users to cause a denial of service (memory consumption) by repeatedly\n binding an AF_IRDA socket (bnc#1106509)\n- CVE-2018-10902: Protect against concurrent access to prevent double realloc\n (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A\n malicious local attacker could have used this for privilege escalation\n (bnc#1105322)\n- CVE-2018-10879: A local user could have caused a use-after-free in\n ext4_xattr_set_entry function and a denial of service or unspecified other\n impact by renaming a file in a crafted ext4 filesystem image (bsc#1099844)\n- CVE-2018-10883: A local user could have caused an out-of-bounds write in\n jbd2_journal_dirty_metadata(), a denial of service, and a system crash by\n mounting and operating on a crafted ext4 filesystem image (bsc#1099863)\n- CVE-2018-10880: Prevent stack-out-of-bounds write in the ext4 filesystem code\n when mounting and writing to a crafted ext4 image in ext4_update_inline_data().\n An attacker could have used this to cause a system crash and a denial of\n service (bsc#1099845)\n- CVE-2018-10882: A local user could have caused an out-of-bound write, a\n denial of service, and a system crash by unmounting a crafted ext4 filesystem\n image (bsc#1099849)\n- CVE-2018-10881: A local user could have caused an out-of-bound access in\n ext4_get_group_info function, a denial of service, and a system crash by\n mounting and operating on a crafted ext4 filesystem image (bsc#1099864)\n- CVE-2018-10877: Prevent out-of-bound access in the ext4_ext_drop_refs()\n function when operating on a crafted ext4 filesystem image (bsc#1099846)\n- CVE-2018-10876: A use-after-free was possible in ext4_ext_remove_space()\n function when mounting and operating a crafted ext4 image (bsc#1099811)\n- CVE-2018-10878: A local user could have caused an out-of-bounds write and a\n denial of service or unspecified other impact by mounting and operating a\n crafted ext4 filesystem image (bsc#1099813)\n- CVE-2018-10853: The KVM hypervisor did not check current privilege(CPL) level\n while emulating unprivileged instructions. An unprivileged guest user/process\n could have used this flaw to potentially escalate privileges inside guest\n (bsc#1097104).\n\nThe following non-security bugs were fixed:\n\n- KEYS: prevent creating a different user's keyrings (bnc#1065999).\n- KVM: MMU: always terminate page walks at level 1 (bsc#1062604).\n- KVM: MMU: simplify last_pte_bitmap (bsc#1062604).\n- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).\n- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).\n- KVM: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).\n- Refresh patches.xen/xen3-x86-l1tf-04-protect-PROT_NONE-ptes.patch (bsc#1105100).\n- Do not report CPU affected by L1TF when ARCH_CAP_RDCL_NO bit is set (bsc#1104906).\n- Revert '- Disable patches.arch/x86-mm-Simplify-p-g4um-d_page-macros.patch' (bnc#1104818) \n- bcache: avoid unncessary cache prefetch bch_btree_node_get().\n- bcache: calculate the number of incremental GC nodes according to the total of btree nodes.\n- bcache: display rate debug parameters to 0 when writeback is not running.\n- bcache: do not check return value of debugfs_create_dir().\n- bcache: finish incremental GC.\n- bcache: fix I/O significant decline while backend devices registering.\n- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064233).\n- bcache: free heap cache_set->flush_btree in bch_journal_free.\n- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section.\n- bcache: release dc->writeback_lock properly in bch_writeback_thread().\n- bcache: set max writeback rate when I/O request is idle (bsc#1064233).\n- bcache: simplify the calculation of the total amount of flash dirty data.\n- cifs: Fix infinite loop when using hard mount option (bsc#1091171).\n- ext4: check for allocation block validity with block group locked (bsc#1104495).\n- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).\n- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).\n- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).\n- restore cond_resched() in shrink_dcache_parent().\n- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).\n- x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104818).\n- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).\n- xen, x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104818).\n- xfs: Remove dead code from inode recover function (bsc#1105396).\n- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).\n- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).\n- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).\n- xfs: protect inode ->di_dmstate with a spinlock (bsc#1024788).\n- xfs: repair malformed inode items during log recovery (bsc#1105396).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-Module-Public-Cloud-12-2018-2063,SUSE-SLE-SERVER-12-SP1-2018-2063", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2908-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:2908-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20182908-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:2908-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html", }, { category: "self", summary: "SUSE Bug 1012382", url: "https://bugzilla.suse.com/1012382", }, { category: "self", summary: "SUSE Bug 1024788", url: "https://bugzilla.suse.com/1024788", }, { category: "self", summary: "SUSE Bug 1062604", url: "https://bugzilla.suse.com/1062604", }, { category: "self", summary: "SUSE Bug 1064233", url: "https://bugzilla.suse.com/1064233", }, { category: "self", summary: "SUSE Bug 1065999", url: "https://bugzilla.suse.com/1065999", }, { category: "self", summary: "SUSE Bug 1090534", url: "https://bugzilla.suse.com/1090534", }, { category: "self", summary: "SUSE Bug 1090955", url: "https://bugzilla.suse.com/1090955", }, { category: "self", summary: "SUSE Bug 1091171", url: "https://bugzilla.suse.com/1091171", }, { category: "self", summary: "SUSE Bug 1092903", url: "https://bugzilla.suse.com/1092903", }, { category: "self", summary: "SUSE Bug 1096547", url: "https://bugzilla.suse.com/1096547", }, { category: "self", summary: "SUSE Bug 1097104", url: "https://bugzilla.suse.com/1097104", }, { category: "self", summary: "SUSE Bug 1097108", url: "https://bugzilla.suse.com/1097108", }, { category: "self", summary: "SUSE Bug 1099811", url: "https://bugzilla.suse.com/1099811", }, { category: "self", summary: "SUSE Bug 1099813", url: "https://bugzilla.suse.com/1099813", }, { category: "self", summary: "SUSE Bug 1099844", url: "https://bugzilla.suse.com/1099844", }, { category: "self", summary: "SUSE Bug 1099845", url: "https://bugzilla.suse.com/1099845", }, { category: "self", summary: "SUSE Bug 1099846", url: "https://bugzilla.suse.com/1099846", }, { category: "self", summary: "SUSE Bug 1099849", url: "https://bugzilla.suse.com/1099849", }, { category: "self", summary: "SUSE Bug 1099863", url: "https://bugzilla.suse.com/1099863", }, { category: "self", summary: "SUSE Bug 1099864", url: "https://bugzilla.suse.com/1099864", }, { category: "self", summary: "SUSE Bug 1099922", url: "https://bugzilla.suse.com/1099922", }, { category: "self", summary: "SUSE Bug 1100001", url: "https://bugzilla.suse.com/1100001", }, { category: "self", summary: "SUSE Bug 1102870", url: "https://bugzilla.suse.com/1102870", }, { category: "self", summary: "SUSE Bug 1103445", url: "https://bugzilla.suse.com/1103445", }, { category: "self", summary: "SUSE Bug 1104319", url: "https://bugzilla.suse.com/1104319", }, { category: "self", summary: "SUSE Bug 1104495", url: "https://bugzilla.suse.com/1104495", }, { category: "self", summary: "SUSE Bug 1104818", url: "https://bugzilla.suse.com/1104818", }, { category: "self", summary: "SUSE Bug 1104906", url: "https://bugzilla.suse.com/1104906", }, { category: "self", summary: "SUSE Bug 1105100", url: "https://bugzilla.suse.com/1105100", }, { category: "self", summary: "SUSE Bug 1105322", url: "https://bugzilla.suse.com/1105322", }, { category: "self", summary: "SUSE Bug 1105323", url: "https://bugzilla.suse.com/1105323", }, { category: "self", summary: "SUSE Bug 1105396", url: "https://bugzilla.suse.com/1105396", }, { category: "self", summary: "SUSE Bug 1106095", url: "https://bugzilla.suse.com/1106095", }, { category: "self", summary: "SUSE Bug 1106369", url: "https://bugzilla.suse.com/1106369", }, { category: "self", summary: "SUSE Bug 1106509", url: "https://bugzilla.suse.com/1106509", }, { category: "self", summary: "SUSE Bug 1106511", url: "https://bugzilla.suse.com/1106511", }, { category: "self", summary: "SUSE Bug 1107689", url: "https://bugzilla.suse.com/1107689", }, { category: "self", summary: "SUSE Bug 1108912", url: "https://bugzilla.suse.com/1108912", }, { category: "self", summary: "SUSE CVE CVE-2018-10853 page", url: "https://www.suse.com/security/cve/CVE-2018-10853/", }, { category: "self", summary: "SUSE CVE CVE-2018-10876 page", url: "https://www.suse.com/security/cve/CVE-2018-10876/", }, { category: "self", summary: "SUSE CVE CVE-2018-10877 page", url: "https://www.suse.com/security/cve/CVE-2018-10877/", }, { category: "self", summary: "SUSE CVE CVE-2018-10878 page", url: "https://www.suse.com/security/cve/CVE-2018-10878/", }, { category: "self", summary: "SUSE CVE CVE-2018-10879 page", url: "https://www.suse.com/security/cve/CVE-2018-10879/", }, { category: "self", summary: "SUSE CVE CVE-2018-10880 page", url: "https://www.suse.com/security/cve/CVE-2018-10880/", }, { category: "self", summary: "SUSE CVE CVE-2018-10881 page", url: "https://www.suse.com/security/cve/CVE-2018-10881/", }, { category: "self", summary: "SUSE CVE CVE-2018-10882 page", url: "https://www.suse.com/security/cve/CVE-2018-10882/", }, { category: "self", summary: "SUSE CVE CVE-2018-10883 page", url: "https://www.suse.com/security/cve/CVE-2018-10883/", }, { category: "self", summary: "SUSE CVE CVE-2018-10902 page", url: "https://www.suse.com/security/cve/CVE-2018-10902/", }, { category: "self", summary: "SUSE CVE CVE-2018-10940 page", url: "https://www.suse.com/security/cve/CVE-2018-10940/", }, { category: "self", summary: "SUSE CVE CVE-2018-12896 page", url: "https://www.suse.com/security/cve/CVE-2018-12896/", }, { category: "self", summary: "SUSE CVE CVE-2018-13093 page", url: "https://www.suse.com/security/cve/CVE-2018-13093/", }, { category: "self", summary: "SUSE CVE CVE-2018-14617 page", url: "https://www.suse.com/security/cve/CVE-2018-14617/", }, { category: "self", summary: "SUSE CVE CVE-2018-14634 page", url: "https://www.suse.com/security/cve/CVE-2018-14634/", }, { category: "self", summary: "SUSE CVE CVE-2018-16276 page", url: "https://www.suse.com/security/cve/CVE-2018-16276/", }, { category: "self", summary: "SUSE CVE CVE-2018-16658 page", url: "https://www.suse.com/security/cve/CVE-2018-16658/", }, { category: "self", summary: "SUSE CVE CVE-2018-6554 page", url: "https://www.suse.com/security/cve/CVE-2018-6554/", }, { category: "self", summary: "SUSE CVE CVE-2018-6555 page", url: "https://www.suse.com/security/cve/CVE-2018-6555/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2018-09-27T15:01:17Z", generator: { date: "2018-09-27T15:01:17Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:2908-1", initial_release_date: "2018-09-27T15:01:17Z", revision_history: [ { date: "2018-09-27T15:01:17Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-3.12.74-60.64.104.1.noarch", product: { name: "kernel-devel-3.12.74-60.64.104.1.noarch", product_id: "kernel-devel-3.12.74-60.64.104.1.noarch", }, }, { category: "product_version", name: "kernel-macros-3.12.74-60.64.104.1.noarch", product: { name: "kernel-macros-3.12.74-60.64.104.1.noarch", product_id: "kernel-macros-3.12.74-60.64.104.1.noarch", }, }, { category: "product_version", name: "kernel-source-3.12.74-60.64.104.1.noarch", product: { name: "kernel-source-3.12.74-60.64.104.1.noarch", product_id: "kernel-source-3.12.74-60.64.104.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-default-3.12.74-60.64.104.1.ppc64le", product: { name: "kernel-default-3.12.74-60.64.104.1.ppc64le", product_id: "kernel-default-3.12.74-60.64.104.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-3.12.74-60.64.104.1.ppc64le", product: { name: "kernel-default-base-3.12.74-60.64.104.1.ppc64le", product_id: "kernel-default-base-3.12.74-60.64.104.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-3.12.74-60.64.104.1.ppc64le", product: { name: "kernel-default-devel-3.12.74-60.64.104.1.ppc64le", product_id: "kernel-default-devel-3.12.74-60.64.104.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-3.12.74-60.64.104.1.ppc64le", product: { name: "kernel-syms-3.12.74-60.64.104.1.ppc64le", product_id: "kernel-syms-3.12.74-60.64.104.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-default-3.12.74-60.64.104.1.s390x", product: { name: "kernel-default-3.12.74-60.64.104.1.s390x", product_id: "kernel-default-3.12.74-60.64.104.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-3.12.74-60.64.104.1.s390x", product: { name: "kernel-default-base-3.12.74-60.64.104.1.s390x", product_id: "kernel-default-base-3.12.74-60.64.104.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-3.12.74-60.64.104.1.s390x", product: { name: "kernel-default-devel-3.12.74-60.64.104.1.s390x", product_id: "kernel-default-devel-3.12.74-60.64.104.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-3.12.74-60.64.104.1.s390x", product: { name: "kernel-default-man-3.12.74-60.64.104.1.s390x", product_id: "kernel-default-man-3.12.74-60.64.104.1.s390x", }, }, { category: "product_version", name: "kernel-syms-3.12.74-60.64.104.1.s390x", product: { name: "kernel-syms-3.12.74-60.64.104.1.s390x", product_id: "kernel-syms-3.12.74-60.64.104.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-ec2-3.12.74-60.64.104.1.x86_64", product: { name: "kernel-ec2-3.12.74-60.64.104.1.x86_64", product_id: "kernel-ec2-3.12.74-60.64.104.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", product: { name: "kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", product_id: "kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", product: { name: "kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", product_id: "kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", }, }, { category: "product_version", name: "kernel-default-3.12.74-60.64.104.1.x86_64", product: { name: "kernel-default-3.12.74-60.64.104.1.x86_64", product_id: "kernel-default-3.12.74-60.64.104.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-3.12.74-60.64.104.1.x86_64", product: { name: "kernel-default-base-3.12.74-60.64.104.1.x86_64", product_id: "kernel-default-base-3.12.74-60.64.104.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-3.12.74-60.64.104.1.x86_64", product: { name: "kernel-default-devel-3.12.74-60.64.104.1.x86_64", product_id: "kernel-default-devel-3.12.74-60.64.104.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-3.12.74-60.64.104.1.x86_64", product: { name: "kernel-syms-3.12.74-60.64.104.1.x86_64", product_id: "kernel-syms-3.12.74-60.64.104.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-3.12.74-60.64.104.1.x86_64", product: { name: "kernel-xen-3.12.74-60.64.104.1.x86_64", product_id: "kernel-xen-3.12.74-60.64.104.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-base-3.12.74-60.64.104.1.x86_64", product: { name: "kernel-xen-base-3.12.74-60.64.104.1.x86_64", product_id: "kernel-xen-base-3.12.74-60.64.104.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-devel-3.12.74-60.64.104.1.x86_64", product: { name: "kernel-xen-devel-3.12.74-60.64.104.1.x86_64", product_id: "kernel-xen-devel-3.12.74-60.64.104.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 12", product: { name: "SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:12", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", }, product_reference: "kernel-ec2-3.12.74-60.64.104.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 12", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", }, product_reference: "kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 12", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-extra-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", }, product_reference: "kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.74-60.64.104.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", }, product_reference: "kernel-default-3.12.74-60.64.104.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.74-60.64.104.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", }, product_reference: "kernel-default-3.12.74-60.64.104.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", }, product_reference: "kernel-default-3.12.74-60.64.104.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.74-60.64.104.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", }, product_reference: "kernel-default-base-3.12.74-60.64.104.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.74-60.64.104.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", }, product_reference: "kernel-default-base-3.12.74-60.64.104.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", }, product_reference: "kernel-default-base-3.12.74-60.64.104.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.74-60.64.104.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", }, product_reference: "kernel-default-devel-3.12.74-60.64.104.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.74-60.64.104.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", }, product_reference: "kernel-default-devel-3.12.74-60.64.104.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", }, product_reference: "kernel-default-devel-3.12.74-60.64.104.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-3.12.74-60.64.104.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", }, product_reference: "kernel-default-man-3.12.74-60.64.104.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-3.12.74-60.64.104.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", }, product_reference: "kernel-devel-3.12.74-60.64.104.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-3.12.74-60.64.104.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", }, product_reference: "kernel-macros-3.12.74-60.64.104.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.12.74-60.64.104.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", }, product_reference: "kernel-source-3.12.74-60.64.104.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.74-60.64.104.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", }, product_reference: "kernel-syms-3.12.74-60.64.104.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.74-60.64.104.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", }, product_reference: "kernel-syms-3.12.74-60.64.104.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", }, product_reference: "kernel-syms-3.12.74-60.64.104.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", }, product_reference: "kernel-xen-3.12.74-60.64.104.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", }, product_reference: "kernel-xen-base-3.12.74-60.64.104.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", }, product_reference: "kernel-xen-devel-3.12.74-60.64.104.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2018-10853", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10853", }, ], notes: [ { category: "general", text: "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10853", url: "https://www.suse.com/security/cve/CVE-2018-10853", }, { category: "external", summary: "SUSE Bug 1097104 for CVE-2018-10853", url: "https://bugzilla.suse.com/1097104", }, { category: "external", summary: "SUSE Bug 1097108 for CVE-2018-10853", url: "https://bugzilla.suse.com/1097108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-27T15:01:17Z", details: "important", }, ], title: "CVE-2018-10853", }, { cve: "CVE-2018-10876", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10876", }, ], notes: [ { category: "general", text: "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10876", url: "https://www.suse.com/security/cve/CVE-2018-10876", }, { category: "external", summary: "SUSE Bug 1099811 for CVE-2018-10876", url: "https://bugzilla.suse.com/1099811", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-27T15:01:17Z", details: "low", }, ], title: "CVE-2018-10876", }, { cve: "CVE-2018-10877", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10877", }, ], notes: [ { category: "general", text: "Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10877", url: "https://www.suse.com/security/cve/CVE-2018-10877", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10877", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099846 for CVE-2018-10877", url: "https://bugzilla.suse.com/1099846", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-27T15:01:17Z", details: "low", }, ], title: "CVE-2018-10877", }, { cve: "CVE-2018-10878", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10878", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10878", url: "https://www.suse.com/security/cve/CVE-2018-10878", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10878", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099813 for CVE-2018-10878", url: "https://bugzilla.suse.com/1099813", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-27T15:01:17Z", details: "moderate", }, ], title: "CVE-2018-10878", }, { cve: "CVE-2018-10879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10879", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10879", url: "https://www.suse.com/security/cve/CVE-2018-10879", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10879", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099844 for CVE-2018-10879", url: "https://bugzilla.suse.com/1099844", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-27T15:01:17Z", details: "moderate", }, ], title: "CVE-2018-10879", }, { cve: "CVE-2018-10880", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10880", }, ], notes: [ { category: "general", text: "Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10880", url: "https://www.suse.com/security/cve/CVE-2018-10880", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10880", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099845 for CVE-2018-10880", url: "https://bugzilla.suse.com/1099845", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-27T15:01:17Z", details: "moderate", }, ], title: "CVE-2018-10880", }, { cve: "CVE-2018-10881", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10881", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10881", url: "https://www.suse.com/security/cve/CVE-2018-10881", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10881", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099864 for CVE-2018-10881", url: "https://bugzilla.suse.com/1099864", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-27T15:01:17Z", details: "moderate", }, ], title: "CVE-2018-10881", }, { cve: "CVE-2018-10882", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10882", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10882", url: "https://www.suse.com/security/cve/CVE-2018-10882", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10882", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099849 for CVE-2018-10882", url: "https://bugzilla.suse.com/1099849", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-27T15:01:17Z", details: "moderate", }, ], title: "CVE-2018-10882", }, { cve: "CVE-2018-10883", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10883", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10883", url: "https://www.suse.com/security/cve/CVE-2018-10883", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10883", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099863 for CVE-2018-10883", url: "https://bugzilla.suse.com/1099863", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-27T15:01:17Z", details: "moderate", }, ], title: "CVE-2018-10883", }, { cve: "CVE-2018-10902", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10902", }, ], notes: [ { category: "general", text: "It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10902", url: "https://www.suse.com/security/cve/CVE-2018-10902", }, { category: "external", summary: "SUSE Bug 1105322 for CVE-2018-10902", url: "https://bugzilla.suse.com/1105322", }, { category: "external", summary: "SUSE Bug 1105323 for CVE-2018-10902", url: "https://bugzilla.suse.com/1105323", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-27T15:01:17Z", details: "moderate", }, ], title: "CVE-2018-10902", }, { cve: "CVE-2018-10940", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10940", }, ], notes: [ { category: "general", text: "The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c in the Linux kernel before 4.16.6 allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10940", url: "https://www.suse.com/security/cve/CVE-2018-10940", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10940", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092903 for CVE-2018-10940", url: "https://bugzilla.suse.com/1092903", }, { category: "external", summary: "SUSE Bug 1107689 for CVE-2018-10940", url: "https://bugzilla.suse.com/1107689", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-10940", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-27T15:01:17Z", details: "moderate", }, ], title: "CVE-2018-10940", }, { cve: "CVE-2018-12896", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12896", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12896", url: "https://www.suse.com/security/cve/CVE-2018-12896", }, { category: "external", summary: "SUSE Bug 1099922 for CVE-2018-12896", url: "https://bugzilla.suse.com/1099922", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-27T15:01:17Z", details: "low", }, ], title: "CVE-2018-12896", }, { cve: "CVE-2018-13093", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-13093", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/xfs/xfs_icache.c in the Linux kernel through 4.17.3. There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-13093", url: "https://www.suse.com/security/cve/CVE-2018-13093", }, { category: "external", summary: "SUSE Bug 1100001 for CVE-2018-13093", url: "https://bugzilla.suse.com/1100001", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-27T15:01:17Z", details: "moderate", }, ], title: "CVE-2018-13093", }, { cve: "CVE-2018-14617", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14617", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14617", url: "https://www.suse.com/security/cve/CVE-2018-14617", }, { category: "external", summary: "SUSE Bug 1102870 for CVE-2018-14617", url: "https://bugzilla.suse.com/1102870", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-27T15:01:17Z", details: "moderate", }, ], title: "CVE-2018-14617", }, { cve: "CVE-2018-14634", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14634", }, ], notes: [ { category: "general", text: "An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14634", url: "https://www.suse.com/security/cve/CVE-2018-14634", }, { category: "external", summary: "SUSE Bug 1108912 for CVE-2018-14634", url: "https://bugzilla.suse.com/1108912", }, { category: "external", summary: "SUSE Bug 1108963 for CVE-2018-14634", url: "https://bugzilla.suse.com/1108963", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2018-14634", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 1120323 for CVE-2018-14634", url: "https://bugzilla.suse.com/1120323", }, { category: "external", summary: "SUSE Bug 1122265 for CVE-2018-14634", url: "https://bugzilla.suse.com/1122265", }, { category: "external", summary: "SUSE Bug 1188063 for CVE-2018-14634", url: "https://bugzilla.suse.com/1188063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-27T15:01:17Z", details: "important", }, ], title: "CVE-2018-14634", }, { cve: "CVE-2018-16276", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16276", }, ], notes: [ { category: "general", text: "An issue was discovered in yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7. Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16276", url: "https://www.suse.com/security/cve/CVE-2018-16276", }, { category: "external", summary: "SUSE Bug 1106095 for CVE-2018-16276", url: "https://bugzilla.suse.com/1106095", }, { category: "external", summary: "SUSE Bug 1115593 for CVE-2018-16276", url: "https://bugzilla.suse.com/1115593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-27T15:01:17Z", details: "important", }, ], title: "CVE-2018-16276", }, { cve: "CVE-2018-16658", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16658", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16658", url: "https://www.suse.com/security/cve/CVE-2018-16658", }, { category: "external", summary: "SUSE Bug 1092903 for CVE-2018-16658", url: "https://bugzilla.suse.com/1092903", }, { category: "external", summary: "SUSE Bug 1107689 for CVE-2018-16658", url: "https://bugzilla.suse.com/1107689", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-16658", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-27T15:01:17Z", details: "low", }, ], title: "CVE-2018-16658", }, { cve: "CVE-2018-6554", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6554", }, ], notes: [ { category: "general", text: "Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6554", url: "https://www.suse.com/security/cve/CVE-2018-6554", }, { category: "external", summary: "SUSE Bug 1106509 for CVE-2018-6554", url: "https://bugzilla.suse.com/1106509", }, { category: "external", summary: "SUSE Bug 1106511 for CVE-2018-6554", url: "https://bugzilla.suse.com/1106511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-27T15:01:17Z", details: "low", }, ], title: "CVE-2018-6554", }, { cve: "CVE-2018-6555", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6555", }, ], notes: [ { category: "general", text: "The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6555", url: "https://www.suse.com/security/cve/CVE-2018-6555", }, { category: "external", summary: "SUSE Bug 1106509 for CVE-2018-6555", url: "https://bugzilla.suse.com/1106509", }, { category: "external", summary: "SUSE Bug 1106511 for CVE-2018-6555", url: "https://bugzilla.suse.com/1106511", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2018-6555", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-27T15:01:17Z", details: "moderate", }, ], title: "CVE-2018-6555", }, ], }
suse-su-2018:2908-2
Vulnerability from csaf_suse
Published
2019-04-27 13:55
Modified
2019-04-27 13:55
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 kernel was updated receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a
local attacker to exploit this vulnerability via a SUID-root binary and obtain
full root privileges (bsc#1108912)
- CVE-2018-14617: Prevent NULL pointer dereference and panic in
hfsplus_lookup() when opening a file (that is purportedly a hard link) in an
hfs+ filesystem that has malformed catalog data, and is mounted read-only
without a metadata directory (bsc#1102870)
- CVE-2018-16276: Incorrect bounds checking in the yurex USB driver in
yurex_read allowed local attackers to use user access read/writes to crash the
kernel or potentially escalate privileges (bsc#1106095)
- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was
caused by the way the overrun accounting works. Depending on interval and
expiry time values, the overrun can be larger than INT_MAX, but the accounting
is int based. This basically made the accounting values, which are visible to
user space via timer_getoverrun(2) and siginfo::si_overrun, random. This
allowed a local user to cause a denial of service (signed integer overflow) via
crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922)
- CVE-2018-13093: Prevent NULL pointer dereference and panic in lookup_slow()
on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image.
This occured because of a lack of proper validation that cached inodes are free
during allocation (bnc#1100001)
- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local
attackers to use a incorrect bounds check in the CDROM driver
CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that
could have been used by local attackers to read kernel memory (bnc#1107689)
- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a
denial of service (ias_object use-after-free and system crash) or possibly have
unspecified other impact via an AF_IRDA socket (bnc#1106511)
- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed
local users to cause a denial of service (memory consumption) by repeatedly
binding an AF_IRDA socket (bnc#1106509)
- CVE-2018-10902: Protect against concurrent access to prevent double realloc
(double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A
malicious local attacker could have used this for privilege escalation
(bnc#1105322)
- CVE-2018-10879: A local user could have caused a use-after-free in
ext4_xattr_set_entry function and a denial of service or unspecified other
impact by renaming a file in a crafted ext4 filesystem image (bsc#1099844)
- CVE-2018-10883: A local user could have caused an out-of-bounds write in
jbd2_journal_dirty_metadata(), a denial of service, and a system crash by
mounting and operating on a crafted ext4 filesystem image (bsc#1099863)
- CVE-2018-10880: Prevent stack-out-of-bounds write in the ext4 filesystem code
when mounting and writing to a crafted ext4 image in ext4_update_inline_data().
An attacker could have used this to cause a system crash and a denial of
service (bsc#1099845)
- CVE-2018-10882: A local user could have caused an out-of-bound write, a
denial of service, and a system crash by unmounting a crafted ext4 filesystem
image (bsc#1099849)
- CVE-2018-10881: A local user could have caused an out-of-bound access in
ext4_get_group_info function, a denial of service, and a system crash by
mounting and operating on a crafted ext4 filesystem image (bsc#1099864)
- CVE-2018-10877: Prevent out-of-bound access in the ext4_ext_drop_refs()
function when operating on a crafted ext4 filesystem image (bsc#1099846)
- CVE-2018-10876: A use-after-free was possible in ext4_ext_remove_space()
function when mounting and operating a crafted ext4 image (bsc#1099811)
- CVE-2018-10878: A local user could have caused an out-of-bounds write and a
denial of service or unspecified other impact by mounting and operating a
crafted ext4 filesystem image (bsc#1099813)
- CVE-2018-10853: The KVM hypervisor did not check current privilege(CPL) level
while emulating unprivileged instructions. An unprivileged guest user/process
could have used this flaw to potentially escalate privileges inside guest
(bsc#1097104).
The following non-security bugs were fixed:
- KEYS: prevent creating a different user's keyrings (bnc#1065999).
- KVM: MMU: always terminate page walks at level 1 (bsc#1062604).
- KVM: MMU: simplify last_pte_bitmap (bsc#1062604).
- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- KVM: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).
- Refresh patches.xen/xen3-x86-l1tf-04-protect-PROT_NONE-ptes.patch (bsc#1105100).
- Do not report CPU affected by L1TF when ARCH_CAP_RDCL_NO bit is set (bsc#1104906).
- Revert '- Disable patches.arch/x86-mm-Simplify-p-g4um-d_page-macros.patch' (bnc#1104818)
- bcache: avoid unncessary cache prefetch bch_btree_node_get().
- bcache: calculate the number of incremental GC nodes according to the total of btree nodes.
- bcache: display rate debug parameters to 0 when writeback is not running.
- bcache: do not check return value of debugfs_create_dir().
- bcache: finish incremental GC.
- bcache: fix I/O significant decline while backend devices registering.
- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064233).
- bcache: free heap cache_set->flush_btree in bch_journal_free.
- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section.
- bcache: release dc->writeback_lock properly in bch_writeback_thread().
- bcache: set max writeback rate when I/O request is idle (bsc#1064233).
- bcache: simplify the calculation of the total amount of flash dirty data.
- cifs: Fix infinite loop when using hard mount option (bsc#1091171).
- ext4: check for allocation block validity with block group locked (bsc#1104495).
- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).
- restore cond_resched() in shrink_dcache_parent().
- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).
- x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104818).
- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).
- xen, x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104818).
- xfs: Remove dead code from inode recover function (bsc#1105396).
- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).
- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).
- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).
- xfs: protect inode ->di_dmstate with a spinlock (bsc#1024788).
- xfs: repair malformed inode items during log recovery (bsc#1105396).
Patchnames
SUSE-SLE-SAP-12-SP1-2019-1065
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 12 SP1 kernel was updated receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a\n local attacker to exploit this vulnerability via a SUID-root binary and obtain\n full root privileges (bsc#1108912)\n- CVE-2018-14617: Prevent NULL pointer dereference and panic in\n hfsplus_lookup() when opening a file (that is purportedly a hard link) in an\n hfs+ filesystem that has malformed catalog data, and is mounted read-only\n without a metadata directory (bsc#1102870)\n- CVE-2018-16276: Incorrect bounds checking in the yurex USB driver in\n yurex_read allowed local attackers to use user access read/writes to crash the\n kernel or potentially escalate privileges (bsc#1106095)\n- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was\n caused by the way the overrun accounting works. Depending on interval and\n expiry time values, the overrun can be larger than INT_MAX, but the accounting\n is int based. This basically made the accounting values, which are visible to\n user space via timer_getoverrun(2) and siginfo::si_overrun, random. This\n allowed a local user to cause a denial of service (signed integer overflow) via\n crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922)\n- CVE-2018-13093: Prevent NULL pointer dereference and panic in lookup_slow()\n on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image.\n This occured because of a lack of proper validation that cached inodes are free\n during allocation (bnc#1100001)\n- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local\n attackers to use a incorrect bounds check in the CDROM driver\n CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)\n- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that\n could have been used by local attackers to read kernel memory (bnc#1107689)\n- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a\n denial of service (ias_object use-after-free and system crash) or possibly have\n unspecified other impact via an AF_IRDA socket (bnc#1106511)\n- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed\n local users to cause a denial of service (memory consumption) by repeatedly\n binding an AF_IRDA socket (bnc#1106509)\n- CVE-2018-10902: Protect against concurrent access to prevent double realloc\n (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A\n malicious local attacker could have used this for privilege escalation\n (bnc#1105322)\n- CVE-2018-10879: A local user could have caused a use-after-free in\n ext4_xattr_set_entry function and a denial of service or unspecified other\n impact by renaming a file in a crafted ext4 filesystem image (bsc#1099844)\n- CVE-2018-10883: A local user could have caused an out-of-bounds write in\n jbd2_journal_dirty_metadata(), a denial of service, and a system crash by\n mounting and operating on a crafted ext4 filesystem image (bsc#1099863)\n- CVE-2018-10880: Prevent stack-out-of-bounds write in the ext4 filesystem code\n when mounting and writing to a crafted ext4 image in ext4_update_inline_data().\n An attacker could have used this to cause a system crash and a denial of\n service (bsc#1099845)\n- CVE-2018-10882: A local user could have caused an out-of-bound write, a\n denial of service, and a system crash by unmounting a crafted ext4 filesystem\n image (bsc#1099849)\n- CVE-2018-10881: A local user could have caused an out-of-bound access in\n ext4_get_group_info function, a denial of service, and a system crash by\n mounting and operating on a crafted ext4 filesystem image (bsc#1099864)\n- CVE-2018-10877: Prevent out-of-bound access in the ext4_ext_drop_refs()\n function when operating on a crafted ext4 filesystem image (bsc#1099846)\n- CVE-2018-10876: A use-after-free was possible in ext4_ext_remove_space()\n function when mounting and operating a crafted ext4 image (bsc#1099811)\n- CVE-2018-10878: A local user could have caused an out-of-bounds write and a\n denial of service or unspecified other impact by mounting and operating a\n crafted ext4 filesystem image (bsc#1099813)\n- CVE-2018-10853: The KVM hypervisor did not check current privilege(CPL) level\n while emulating unprivileged instructions. An unprivileged guest user/process\n could have used this flaw to potentially escalate privileges inside guest\n (bsc#1097104).\n\nThe following non-security bugs were fixed:\n\n- KEYS: prevent creating a different user's keyrings (bnc#1065999).\n- KVM: MMU: always terminate page walks at level 1 (bsc#1062604).\n- KVM: MMU: simplify last_pte_bitmap (bsc#1062604).\n- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).\n- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).\n- KVM: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).\n- Refresh patches.xen/xen3-x86-l1tf-04-protect-PROT_NONE-ptes.patch (bsc#1105100).\n- Do not report CPU affected by L1TF when ARCH_CAP_RDCL_NO bit is set (bsc#1104906).\n- Revert '- Disable patches.arch/x86-mm-Simplify-p-g4um-d_page-macros.patch' (bnc#1104818) \n- bcache: avoid unncessary cache prefetch bch_btree_node_get().\n- bcache: calculate the number of incremental GC nodes according to the total of btree nodes.\n- bcache: display rate debug parameters to 0 when writeback is not running.\n- bcache: do not check return value of debugfs_create_dir().\n- bcache: finish incremental GC.\n- bcache: fix I/O significant decline while backend devices registering.\n- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064233).\n- bcache: free heap cache_set->flush_btree in bch_journal_free.\n- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section.\n- bcache: release dc->writeback_lock properly in bch_writeback_thread().\n- bcache: set max writeback rate when I/O request is idle (bsc#1064233).\n- bcache: simplify the calculation of the total amount of flash dirty data.\n- cifs: Fix infinite loop when using hard mount option (bsc#1091171).\n- ext4: check for allocation block validity with block group locked (bsc#1104495).\n- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).\n- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).\n- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).\n- restore cond_resched() in shrink_dcache_parent().\n- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).\n- x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104818).\n- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).\n- xen, x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104818).\n- xfs: Remove dead code from inode recover function (bsc#1105396).\n- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).\n- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).\n- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).\n- xfs: protect inode ->di_dmstate with a spinlock (bsc#1024788).\n- xfs: repair malformed inode items during log recovery (bsc#1105396).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-SAP-12-SP1-2019-1065", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2908-2.json", }, { category: "self", summary: "URL for SUSE-SU-2018:2908-2", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20182908-2/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:2908-2", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html", }, { category: "self", summary: "SUSE Bug 1012382", url: "https://bugzilla.suse.com/1012382", }, { category: "self", summary: "SUSE Bug 1024788", url: "https://bugzilla.suse.com/1024788", }, { category: "self", summary: "SUSE Bug 1062604", url: "https://bugzilla.suse.com/1062604", }, { category: "self", summary: "SUSE Bug 1064233", url: "https://bugzilla.suse.com/1064233", }, { category: "self", summary: "SUSE Bug 1065999", url: "https://bugzilla.suse.com/1065999", }, { category: "self", summary: "SUSE Bug 1090534", url: "https://bugzilla.suse.com/1090534", }, { category: "self", summary: "SUSE Bug 1090955", url: "https://bugzilla.suse.com/1090955", }, { category: "self", summary: "SUSE Bug 1091171", url: "https://bugzilla.suse.com/1091171", }, { category: "self", summary: "SUSE Bug 1092903", url: "https://bugzilla.suse.com/1092903", }, { category: "self", summary: "SUSE Bug 1096547", url: "https://bugzilla.suse.com/1096547", }, { category: "self", summary: "SUSE Bug 1097104", url: "https://bugzilla.suse.com/1097104", }, { category: "self", summary: "SUSE Bug 1097108", url: "https://bugzilla.suse.com/1097108", }, { category: "self", summary: "SUSE Bug 1099811", url: "https://bugzilla.suse.com/1099811", }, { category: "self", summary: "SUSE Bug 1099813", url: "https://bugzilla.suse.com/1099813", }, { category: "self", summary: "SUSE Bug 1099844", url: "https://bugzilla.suse.com/1099844", }, { category: "self", summary: "SUSE Bug 1099845", url: "https://bugzilla.suse.com/1099845", }, { category: "self", summary: "SUSE Bug 1099846", url: "https://bugzilla.suse.com/1099846", }, { category: "self", summary: "SUSE Bug 1099849", url: "https://bugzilla.suse.com/1099849", }, { category: "self", summary: "SUSE Bug 1099863", url: "https://bugzilla.suse.com/1099863", }, { category: "self", summary: "SUSE Bug 1099864", url: "https://bugzilla.suse.com/1099864", }, { category: "self", summary: "SUSE Bug 1099922", url: "https://bugzilla.suse.com/1099922", }, { category: "self", summary: "SUSE Bug 1100001", url: "https://bugzilla.suse.com/1100001", }, { category: "self", summary: "SUSE Bug 1102870", url: "https://bugzilla.suse.com/1102870", }, { category: "self", summary: "SUSE Bug 1103445", url: "https://bugzilla.suse.com/1103445", }, { category: "self", summary: "SUSE Bug 1104319", url: "https://bugzilla.suse.com/1104319", }, { category: "self", summary: "SUSE Bug 1104495", url: "https://bugzilla.suse.com/1104495", }, { category: "self", summary: "SUSE Bug 1104818", url: "https://bugzilla.suse.com/1104818", }, { category: "self", summary: "SUSE Bug 1104906", url: "https://bugzilla.suse.com/1104906", }, { category: "self", summary: "SUSE Bug 1105100", url: "https://bugzilla.suse.com/1105100", }, { category: "self", summary: "SUSE Bug 1105322", url: "https://bugzilla.suse.com/1105322", }, { category: "self", summary: "SUSE Bug 1105323", url: "https://bugzilla.suse.com/1105323", }, { category: "self", summary: "SUSE Bug 1105396", url: "https://bugzilla.suse.com/1105396", }, { category: "self", summary: "SUSE Bug 1106095", url: "https://bugzilla.suse.com/1106095", }, { category: "self", summary: "SUSE Bug 1106369", url: "https://bugzilla.suse.com/1106369", }, { category: "self", summary: "SUSE Bug 1106509", url: "https://bugzilla.suse.com/1106509", }, { category: "self", summary: "SUSE Bug 1106511", url: "https://bugzilla.suse.com/1106511", }, { category: "self", summary: "SUSE Bug 1107689", url: "https://bugzilla.suse.com/1107689", }, { category: "self", summary: "SUSE Bug 1108912", url: "https://bugzilla.suse.com/1108912", }, { category: "self", summary: "SUSE CVE CVE-2018-10853 page", url: "https://www.suse.com/security/cve/CVE-2018-10853/", }, { category: "self", summary: "SUSE CVE CVE-2018-10876 page", url: "https://www.suse.com/security/cve/CVE-2018-10876/", }, { category: "self", summary: "SUSE CVE CVE-2018-10877 page", url: "https://www.suse.com/security/cve/CVE-2018-10877/", }, { category: "self", summary: "SUSE CVE CVE-2018-10878 page", url: "https://www.suse.com/security/cve/CVE-2018-10878/", }, { category: "self", summary: "SUSE CVE CVE-2018-10879 page", url: "https://www.suse.com/security/cve/CVE-2018-10879/", }, { category: "self", summary: "SUSE CVE CVE-2018-10880 page", url: "https://www.suse.com/security/cve/CVE-2018-10880/", }, { category: "self", summary: "SUSE CVE CVE-2018-10881 page", url: "https://www.suse.com/security/cve/CVE-2018-10881/", }, { category: "self", summary: "SUSE CVE CVE-2018-10882 page", url: "https://www.suse.com/security/cve/CVE-2018-10882/", }, { category: "self", summary: "SUSE CVE CVE-2018-10883 page", url: "https://www.suse.com/security/cve/CVE-2018-10883/", }, { category: "self", summary: "SUSE CVE CVE-2018-10902 page", url: "https://www.suse.com/security/cve/CVE-2018-10902/", }, { category: "self", summary: "SUSE CVE CVE-2018-10940 page", url: "https://www.suse.com/security/cve/CVE-2018-10940/", }, { category: "self", summary: "SUSE CVE CVE-2018-12896 page", url: "https://www.suse.com/security/cve/CVE-2018-12896/", }, { category: "self", summary: "SUSE CVE CVE-2018-13093 page", url: "https://www.suse.com/security/cve/CVE-2018-13093/", }, { category: "self", summary: "SUSE CVE CVE-2018-14617 page", url: "https://www.suse.com/security/cve/CVE-2018-14617/", }, { category: "self", summary: "SUSE CVE CVE-2018-14634 page", url: "https://www.suse.com/security/cve/CVE-2018-14634/", }, { category: "self", summary: "SUSE CVE CVE-2018-16276 page", url: "https://www.suse.com/security/cve/CVE-2018-16276/", }, { category: "self", summary: "SUSE CVE CVE-2018-16658 page", url: "https://www.suse.com/security/cve/CVE-2018-16658/", }, { category: "self", summary: "SUSE CVE CVE-2018-6554 page", url: "https://www.suse.com/security/cve/CVE-2018-6554/", }, { category: "self", summary: "SUSE CVE CVE-2018-6555 page", url: "https://www.suse.com/security/cve/CVE-2018-6555/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2019-04-27T13:55:00Z", generator: { date: "2019-04-27T13:55:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:2908-2", initial_release_date: "2019-04-27T13:55:00Z", revision_history: [ { date: "2019-04-27T13:55:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-3.12.74-60.64.104.1.noarch", product: { name: "kernel-devel-3.12.74-60.64.104.1.noarch", product_id: "kernel-devel-3.12.74-60.64.104.1.noarch", }, }, { category: "product_version", name: "kernel-macros-3.12.74-60.64.104.1.noarch", product: { name: "kernel-macros-3.12.74-60.64.104.1.noarch", product_id: "kernel-macros-3.12.74-60.64.104.1.noarch", }, }, { category: "product_version", name: "kernel-source-3.12.74-60.64.104.1.noarch", product: { name: "kernel-source-3.12.74-60.64.104.1.noarch", product_id: "kernel-source-3.12.74-60.64.104.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-default-3.12.74-60.64.104.1.x86_64", product: { name: "kernel-default-3.12.74-60.64.104.1.x86_64", product_id: "kernel-default-3.12.74-60.64.104.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-3.12.74-60.64.104.1.x86_64", product: { name: "kernel-default-base-3.12.74-60.64.104.1.x86_64", product_id: "kernel-default-base-3.12.74-60.64.104.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-3.12.74-60.64.104.1.x86_64", product: { name: "kernel-default-devel-3.12.74-60.64.104.1.x86_64", product_id: "kernel-default-devel-3.12.74-60.64.104.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-3.12.74-60.64.104.1.x86_64", product: { name: "kernel-syms-3.12.74-60.64.104.1.x86_64", product_id: "kernel-syms-3.12.74-60.64.104.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-3.12.74-60.64.104.1.x86_64", product: { name: "kernel-xen-3.12.74-60.64.104.1.x86_64", product_id: "kernel-xen-3.12.74-60.64.104.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-base-3.12.74-60.64.104.1.x86_64", product: { name: "kernel-xen-base-3.12.74-60.64.104.1.x86_64", product_id: "kernel-xen-base-3.12.74-60.64.104.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-devel-3.12.74-60.64.104.1.x86_64", product: { name: "kernel-xen-devel-3.12.74-60.64.104.1.x86_64", product_id: "kernel-xen-devel-3.12.74-60.64.104.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", product: { name: "kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", product_id: "kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", product: { name: "kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", product_id: "kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", }, product_reference: "kernel-default-3.12.74-60.64.104.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", }, product_reference: "kernel-default-base-3.12.74-60.64.104.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", }, product_reference: "kernel-default-devel-3.12.74-60.64.104.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-3.12.74-60.64.104.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", }, product_reference: "kernel-devel-3.12.74-60.64.104.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-3.12.74-60.64.104.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", }, product_reference: "kernel-macros-3.12.74-60.64.104.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.12.74-60.64.104.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", }, product_reference: "kernel-source-3.12.74-60.64.104.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", }, product_reference: "kernel-syms-3.12.74-60.64.104.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", }, product_reference: "kernel-xen-3.12.74-60.64.104.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", }, product_reference: "kernel-xen-base-3.12.74-60.64.104.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.12.74-60.64.104.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", }, product_reference: "kernel-xen-devel-3.12.74-60.64.104.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", }, product_reference: "kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", }, product_reference: "kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, ], }, vulnerabilities: [ { cve: "CVE-2018-10853", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10853", }, ], notes: [ { category: "general", text: "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10853", url: "https://www.suse.com/security/cve/CVE-2018-10853", }, { category: "external", summary: "SUSE Bug 1097104 for CVE-2018-10853", url: "https://bugzilla.suse.com/1097104", }, { category: "external", summary: "SUSE Bug 1097108 for CVE-2018-10853", url: "https://bugzilla.suse.com/1097108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T13:55:00Z", details: "important", }, ], title: "CVE-2018-10853", }, { cve: "CVE-2018-10876", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10876", }, ], notes: [ { category: "general", text: "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10876", url: "https://www.suse.com/security/cve/CVE-2018-10876", }, { category: "external", summary: "SUSE Bug 1099811 for CVE-2018-10876", url: "https://bugzilla.suse.com/1099811", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T13:55:00Z", details: "low", }, ], title: "CVE-2018-10876", }, { cve: "CVE-2018-10877", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10877", }, ], notes: [ { category: "general", text: "Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10877", url: "https://www.suse.com/security/cve/CVE-2018-10877", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10877", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099846 for CVE-2018-10877", url: "https://bugzilla.suse.com/1099846", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T13:55:00Z", details: "low", }, ], title: "CVE-2018-10877", }, { cve: "CVE-2018-10878", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10878", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10878", url: "https://www.suse.com/security/cve/CVE-2018-10878", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10878", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099813 for CVE-2018-10878", url: "https://bugzilla.suse.com/1099813", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T13:55:00Z", details: "moderate", }, ], title: "CVE-2018-10878", }, { cve: "CVE-2018-10879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10879", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10879", url: "https://www.suse.com/security/cve/CVE-2018-10879", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10879", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099844 for CVE-2018-10879", url: "https://bugzilla.suse.com/1099844", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T13:55:00Z", details: "moderate", }, ], title: "CVE-2018-10879", }, { cve: "CVE-2018-10880", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10880", }, ], notes: [ { category: "general", text: "Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10880", url: "https://www.suse.com/security/cve/CVE-2018-10880", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10880", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099845 for CVE-2018-10880", url: "https://bugzilla.suse.com/1099845", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T13:55:00Z", details: "moderate", }, ], title: "CVE-2018-10880", }, { cve: "CVE-2018-10881", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10881", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10881", url: "https://www.suse.com/security/cve/CVE-2018-10881", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10881", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099864 for CVE-2018-10881", url: "https://bugzilla.suse.com/1099864", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T13:55:00Z", details: "moderate", }, ], title: "CVE-2018-10881", }, { cve: "CVE-2018-10882", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10882", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10882", url: "https://www.suse.com/security/cve/CVE-2018-10882", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10882", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099849 for CVE-2018-10882", url: "https://bugzilla.suse.com/1099849", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T13:55:00Z", details: "moderate", }, ], title: "CVE-2018-10882", }, { cve: "CVE-2018-10883", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10883", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10883", url: "https://www.suse.com/security/cve/CVE-2018-10883", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10883", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099863 for CVE-2018-10883", url: "https://bugzilla.suse.com/1099863", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T13:55:00Z", details: "moderate", }, ], title: "CVE-2018-10883", }, { cve: "CVE-2018-10902", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10902", }, ], notes: [ { category: "general", text: "It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10902", url: "https://www.suse.com/security/cve/CVE-2018-10902", }, { category: "external", summary: "SUSE Bug 1105322 for CVE-2018-10902", url: "https://bugzilla.suse.com/1105322", }, { category: "external", summary: "SUSE Bug 1105323 for CVE-2018-10902", url: "https://bugzilla.suse.com/1105323", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T13:55:00Z", details: "moderate", }, ], title: "CVE-2018-10902", }, { cve: "CVE-2018-10940", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10940", }, ], notes: [ { category: "general", text: "The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c in the Linux kernel before 4.16.6 allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10940", url: "https://www.suse.com/security/cve/CVE-2018-10940", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10940", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092903 for CVE-2018-10940", url: "https://bugzilla.suse.com/1092903", }, { category: "external", summary: "SUSE Bug 1107689 for CVE-2018-10940", url: "https://bugzilla.suse.com/1107689", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-10940", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T13:55:00Z", details: "moderate", }, ], title: "CVE-2018-10940", }, { cve: "CVE-2018-12896", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12896", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12896", url: "https://www.suse.com/security/cve/CVE-2018-12896", }, { category: "external", summary: "SUSE Bug 1099922 for CVE-2018-12896", url: "https://bugzilla.suse.com/1099922", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T13:55:00Z", details: "low", }, ], title: "CVE-2018-12896", }, { cve: "CVE-2018-13093", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-13093", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/xfs/xfs_icache.c in the Linux kernel through 4.17.3. There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-13093", url: "https://www.suse.com/security/cve/CVE-2018-13093", }, { category: "external", summary: "SUSE Bug 1100001 for CVE-2018-13093", url: "https://bugzilla.suse.com/1100001", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T13:55:00Z", details: "moderate", }, ], title: "CVE-2018-13093", }, { cve: "CVE-2018-14617", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14617", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14617", url: "https://www.suse.com/security/cve/CVE-2018-14617", }, { category: "external", summary: "SUSE Bug 1102870 for CVE-2018-14617", url: "https://bugzilla.suse.com/1102870", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T13:55:00Z", details: "moderate", }, ], title: "CVE-2018-14617", }, { cve: "CVE-2018-14634", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14634", }, ], notes: [ { category: "general", text: "An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14634", url: "https://www.suse.com/security/cve/CVE-2018-14634", }, { category: "external", summary: "SUSE Bug 1108912 for CVE-2018-14634", url: "https://bugzilla.suse.com/1108912", }, { category: "external", summary: "SUSE Bug 1108963 for CVE-2018-14634", url: "https://bugzilla.suse.com/1108963", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2018-14634", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 1120323 for CVE-2018-14634", url: "https://bugzilla.suse.com/1120323", }, { category: "external", summary: "SUSE Bug 1122265 for CVE-2018-14634", url: "https://bugzilla.suse.com/1122265", }, { category: "external", summary: "SUSE Bug 1188063 for CVE-2018-14634", url: "https://bugzilla.suse.com/1188063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T13:55:00Z", details: "important", }, ], title: "CVE-2018-14634", }, { cve: "CVE-2018-16276", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16276", }, ], notes: [ { category: "general", text: "An issue was discovered in yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7. Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16276", url: "https://www.suse.com/security/cve/CVE-2018-16276", }, { category: "external", summary: "SUSE Bug 1106095 for CVE-2018-16276", url: "https://bugzilla.suse.com/1106095", }, { category: "external", summary: "SUSE Bug 1115593 for CVE-2018-16276", url: "https://bugzilla.suse.com/1115593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T13:55:00Z", details: "important", }, ], title: "CVE-2018-16276", }, { cve: "CVE-2018-16658", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16658", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16658", url: "https://www.suse.com/security/cve/CVE-2018-16658", }, { category: "external", summary: "SUSE Bug 1092903 for CVE-2018-16658", url: "https://bugzilla.suse.com/1092903", }, { category: "external", summary: "SUSE Bug 1107689 for CVE-2018-16658", url: "https://bugzilla.suse.com/1107689", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-16658", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T13:55:00Z", details: "low", }, ], title: "CVE-2018-16658", }, { cve: "CVE-2018-6554", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6554", }, ], notes: [ { category: "general", text: "Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6554", url: "https://www.suse.com/security/cve/CVE-2018-6554", }, { category: "external", summary: "SUSE Bug 1106509 for CVE-2018-6554", url: "https://bugzilla.suse.com/1106509", }, { category: "external", summary: "SUSE Bug 1106511 for CVE-2018-6554", url: "https://bugzilla.suse.com/1106511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T13:55:00Z", details: "low", }, ], title: "CVE-2018-6554", }, { cve: "CVE-2018-6555", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6555", }, ], notes: [ { category: "general", text: "The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6555", url: "https://www.suse.com/security/cve/CVE-2018-6555", }, { category: "external", summary: "SUSE Bug 1106509 for CVE-2018-6555", url: "https://bugzilla.suse.com/1106509", }, { category: "external", summary: "SUSE Bug 1106511 for CVE-2018-6555", url: "https://bugzilla.suse.com/1106511", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2018-6555", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.104.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.104.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-1-2.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-1-2.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T13:55:00Z", details: "moderate", }, ], title: "CVE-2018-6555", }, ], }
suse-su-2018:2776-1
Vulnerability from csaf_suse
Published
2018-09-20 16:27
Modified
2018-09-20 16:27
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.155 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-13093: Prevent NULL pointer dereference and panic in lookup_slow()
on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image.
This occured because of a lack of proper validation that cached inodes are free
during allocation (bnc#1100001).
- CVE-2018-13095: Prevent denial of service (memory corruption and BUG) that
could have occurred for a corrupted xfs image upon encountering an inode that
is in extent format, but has more extents than fit in the inode fork
(bnc#1099999).
- CVE-2018-13094: Prevent OOPS that may have occured for a corrupted xfs image
after xfs_da_shrink_inode() is called with a NULL bp (bnc#1100000).
- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was
caused by the way the overrun accounting works. Depending on interval and
expiry time values, the overrun can be larger than INT_MAX, but the accounting
is int based. This basically made the accounting values, which are visible to
user space via timer_getoverrun(2) and siginfo::si_overrun, random. This
allowed a local user to cause a denial of service (signed integer overflow) via
crafted mmap, futex, timer_create, and timer_settime system calls
(bnc#1099922).
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that
could have been used by local attackers to read kernel memory (bnc#1107689).
- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a
denial of service (ias_object use-after-free and system crash) or possibly have
unspecified other impact via an AF_IRDA socket (bnc#1106511).
- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed
local users to cause a denial of service (memory consumption) by repeatedly
binding an AF_IRDA socket (bnc#1106509).
- CVE-2018-1129: A flaw was found in the way signature calculation was handled
by cephx authentication protocol. An attacker having access to ceph cluster
network who is able to alter the message payload was able to bypass signature
checks done by cephx protocol (bnc#1096748).
- CVE-2018-1128: It was found that cephx authentication protocol did not verify
ceph clients correctly and was vulnerable to replay attack. Any attacker having
access to ceph cluster network who is able to sniff packets on network can use
this vulnerability to authenticate with ceph service and perform actions
allowed by ceph service (bnc#1096748).
- CVE-2018-10938: A crafted network packet sent remotely by an attacker forced
the kernel to enter an infinite loop in the cipso_v4_optptr() function leading
to a denial-of-service (bnc#1106016).
- CVE-2018-15572: The spectre_v2_select_mitigation function did not always fill
RSB upon a context switch, which made it easier for attackers to conduct
userspace-userspace spectreRSB attacks (bnc#1102517).
- CVE-2018-10902: Protect against concurrent access to prevent double realloc
(double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A
malicious local attacker could have used this for privilege escalation
(bnc#1105322 1105323).
- CVE-2018-9363: Prevent buffer overflow in hidp_process_report (bsc#1105292)
- CVE-2018-10883: A local user could have caused an out-of-bounds write in
jbd2_journal_dirty_metadata(), a denial of service, and a system crash by
mounting and operating on a crafted ext4 filesystem image (bsc#1099863).
- CVE-2018-10879: A local user could have caused a use-after-free in
ext4_xattr_set_entry function and a denial of service or unspecified other
impact by renaming a file in a crafted ext4 filesystem image (bsc#1099844).
- CVE-2018-10878: A local user could have caused an out-of-bounds write and a
denial of service or unspecified other impact by mounting and operating a
crafted ext4 filesystem image (bsc#1099813).
- CVE-2018-10876: A use-after-free was possible in ext4_ext_remove_space()
function when mounting and operating a crafted ext4 image (bsc#1099811).
- CVE-2018-10877: Prevent out-of-bound access in the ext4_ext_drop_refs()
function when operating on a crafted ext4 filesystem image (bsc#1099846).
- CVE-2018-10881: A local user could have caused an out-of-bound access in
ext4_get_group_info function, a denial of service, and a system crash by
mounting and operating on a crafted ext4 filesystem image (bsc#1099864).
- CVE-2018-10882: A local user could have caused an out-of-bound write, a
denial of service, and a system crash by unmounting a crafted ext4 filesystem
image (bsc#1099849).
- CVE-2018-10880: Prevent stack-out-of-bounds write in the ext4 filesystem code
when mounting and writing to a crafted ext4 image in ext4_update_inline_data().
An attacker could have used this to cause a system crash and a denial of
service (bsc#1099845).
The following non-security bugs were fixed:
- 9p/net: Fix zero-copy path in the 9p virtio transport (bnc#1012382).
- 9p/virtio: fix off-by-one error in sg list bounds check (bnc#1012382).
- 9p: fix multiple NULL-pointer-dereferences (bnc#1012382).
- ACPI / LPSS: Add missing prv_offset setting for byt/cht PWM devices (bnc#1012382).
- ACPI / PCI: Bail early in acpi_pci_add_bus() if there is no ACPI handle (bnc#1012382).
- ACPI / PM: save NVS memory for ASUS 1025C laptop (bnc#1012382).
- ACPI: save NVS memory for Lenovo G50-45 (bnc#1012382).
- ALSA: cs5535audio: Fix invalid endian conversion (bnc#1012382).
- ALSA: emu10k1: Rate-limit error messages about page errors (bnc#1012382).
- ALSA: emu10k1: add error handling for snd_ctl_add (bnc#1012382).
- ALSA: fm801: add error handling for snd_ctl_add (bnc#1012382).
- ALSA: hda - Sleep for 10ms after entering D3 on Conexant codecs (bnc#1012382).
- ALSA: hda - Turn CX8200 into D3 as well upon reboot (bnc#1012382).
- ALSA: hda/ca0132: fix build failure when a local macro is defined (bnc#1012382).
- ALSA: hda: Correct Asrock B85M-ITX power_save blacklist entry (bnc#1012382).
- ALSA: memalloc: Do not exceed over the requested size (bnc#1012382).
- ALSA: rawmidi: Change resized buffers atomically (bnc#1012382).
- ALSA: snd-aoa: add of_node_put() in error path (bsc#1099810).
- ALSA: usb-audio: Apply rate limit to warning messages in URB complete callback (bnc#1012382).
- ALSA: virmidi: Fix too long output trigger loop (bnc#1012382).
- ALSA: vx222: Fix invalid endian conversions (bnc#1012382).
- ALSA: vxpocket: Fix invalid endian conversions (bnc#1012382).
- ARC: Enable machine_desc->init_per_cpu for !CONFIG_SMP (bnc#1012382).
- ARC: Explicitly add -mmedium-calls to CFLAGS (bnc#1012382).
- ARC: Fix CONFIG_SWAP (bnc#1012382).
- ARC: mm: allow mprotect to make stack mappings executable (bnc#1012382).
- ARM: 8780/1: ftrace: Only set kernel memory back to read-only after boot (bnc#1012382).
- ARM: dts: Cygnus: Fix I2C controller interrupt type (bnc#1012382).
- ARM: dts: am3517.dtsi: Disable reference to OMAP3 OTG controller (bnc#1012382).
- ARM: dts: am437x: make edt-ft5x06 a wakeup source (bnc#1012382).
- ARM: dts: da850: Fix interrups property for gpio (bnc#1012382).
- ARM: dts: imx6sx: fix irq for pcie bridge (bnc#1012382).
- ARM: fix put_user() for gcc-8 (bnc#1012382).
- ARM: imx_v4_v5_defconfig: Select ULPI support (bnc#1012382).
- ARM: imx_v6_v7_defconfig: Select ULPI support (bnc#1012382).
- ARM: pxa: irq: fix handling of ICMR registers in suspend/resume (bnc#1012382).
- ARM: tegra: Fix Tegra30 Cardhu PCA954x reset (bnc#1012382).
- ASoC: Intel: cht_bsw_max98090: remove useless code, align with ChromeOS driver.
- ASoC: Intel: cht_bsw_max98090_ti: Fix jack initialization (bnc#1012382).
- ASoC: dpcm: do not merge format from invalid codec dai (bnc#1012382).
- ASoC: dpcm: fix BE dai not hw_free and shutdown (bnc#1012382).
- ASoC: pxa: Fix module autoload for platform drivers (bnc#1012382).
- ASoC: sirf: Fix potential NULL pointer dereference (bnc#1012382).
- Add reference to bsc#1091171 (bnc#1012382; bsc#1091171).
- Bluetooth: avoid killing an already killed socket (bnc#1012382).
- Bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bnc#1012382).
- Bluetooth: btusb: Remove Yoga 920 from the btusb_needs_reset_resume_table (bsc#1087092).
- Bluetooth: btusb: Use DMI matching for QCA reset_resume quirking (bsc#1087092).
- Bluetooth: hci_qca: Fix 'Sleep inside atomic section' warning (bnc#1012382).
- Documentation/spec_ctrl: Do some minor cleanups (bnc#1012382).
- HID: hid-plantronics: Re-resend Update to map button for PTT products (bnc#1012382).
- HID: i2c-hid: check if device is there before really probing (bnc#1012382).
- HID: wacom: Correct touch maximum XY of 2nd-gen Intuos (bnc#1012382).
- IB/core: Make testing MR flags for writability a static inline function (bnc#1012382).
- IB/core: Remove duplicate declaration of gid_cache_wq (bsc#1056596).
- IB/iser: Do not reduce max_sectors (bsc#1063646).
- IB/mlx4: Fix an error handling path in 'mlx4_ib_rereg_user_mr()'.
- IB/mlx4: Mark user MR as writable if actual virtual memory is writable (bnc#1012382).
- IB/mlx5: Fetch soft WQE's on fatal error state (bsc#1015342 bsc#1015343).
- IB/mlx5: Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1015342 bsc#1015343).
- IB/ocrdma: fix out of bounds access to local buffer (bnc#1012382).
- Input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bnc#1012382).
- Input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bnc#1012382).
- Input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bnc#1012382).
- KVM/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel (bnc#1012382).
- KVM: MMU: always terminate page walks at level 1 (bsc#1062604).
- KVM: MMU: simplify last_pte_bitmap (bsc#1062604).
- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- KVM: arm/arm64: Skip updating PMD entry if no change (bnc#1012382).
- KVM: arm/arm64: Skip updating PTE entry if no change (bnc#1012382).
- KVM: irqfd: fix race between EPOLLHUP and irq_bypass_register_consumer (bnc#1012382).
- KVM: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).
- MIPS: Correct the 64-bit DSP accumulator register size (bnc#1012382).
- MIPS: Fix off-by-one in pci_resource_to_user() (bnc#1012382).
- MIPS: ath79: fix register address in ath79_ddr_wb_flush() (bnc#1012382).
- MIPS: lib: Provide MIPS64r6 __multi3() for GCC lower than < 7 (bnc#1012382).
- NET: stmmac: align DMA stuff to largest cache line length (bnc#1012382).
- PCI: Prevent sysfs disable of device while driver is attached (bnc#1012382).
- PCI: Skip MPS logic for Virtual Functions (VFs) (bnc#1012382).
- PCI: hotplug: Do not leak pci_slot on registration failure (bnc#1012382).
- PCI: pciehp: Fix use-after-free on unplug (bnc#1012382).
- PCI: pciehp: Request control of native hotplug only if supported (bnc#1012382).
- PM / sleep: wakeup: Fix build error caused by missing SRCU support (bnc#1012382).
- RDMA/i40iw: Avoid panic when objects are being created and destroyed (bsc#969476 bsc#969477).
- RDMA/i40iw: Avoid panic when reading back the IRQ affinity hint (bsc#969476 bsc#969477).
- RDMA/i40iw: Avoid reference leaks when processing the AEQ (bsc#969476 bsc#969477).
- RDMA/i40w: Hold read semaphore while looking after VMA (bsc#1024376).
- RDMA/mad: Convert BUG_ONs to error flows (bnc#1012382).
- RDMA/mlx5: Use proper spec flow label type (bsc#1015342 bsc#1015343).
- Revert 'MIPS: BCM47XX: Enable 74K Core ExternalSync for PCIe erratum' (bnc#1012382).
- Revert 'UBIFS: Fix potential integer overflow in allocation' (bnc#1012382).
- Revert 'f2fs: handle dirty segments inside refresh_sit_entry' (bsc#1106281).
- Revert 'mm: page_alloc: skip over regions of invalid pfns where possible' (bnc#1107078).
- Revert 'block-cancel-workqueue-entries-on-blk_mq_freeze_queue' (bsc#1103717).
- Smack: Mark inode instant in smack_task_to_inode (bnc#1012382).
- USB: musb: fix external abort on suspend (bsc#1085536).
- USB: option: add support for DW5821e (bnc#1012382).
- USB: serial: metro-usb: stop I/O after failed open (bsc#1085539).
- USB: serial: sierra: fix potential deadlock at close (bnc#1012382).
- Workaround kABI breakage by __must_check drop of strscpy() (bsc#1107319).
- afs: Fix directory permissions check (bsc#1106283).
- arc: fix build errors in arc/include/asm/delay.h (bnc#1012382).
- arc: fix type warnings in arc/mm/cache.c (bnc#1012382).
- arm64: make secondary_start_kernel() notrace (bnc#1012382).
- arm64: mm: check for upper PAGE_SHIFT bits in pfn_valid() (bnc#1012382).
- ath: Add regulatory mapping for APL13_WORLD (bnc#1012382).
- ath: Add regulatory mapping for APL2_FCCA (bnc#1012382).
- ath: Add regulatory mapping for Bahamas (bnc#1012382).
- ath: Add regulatory mapping for Bermuda (bnc#1012382).
- ath: Add regulatory mapping for ETSI8_WORLD (bnc#1012382).
- ath: Add regulatory mapping for FCC3_ETSIC (bnc#1012382).
- ath: Add regulatory mapping for Serbia (bnc#1012382).
- ath: Add regulatory mapping for Tanzania (bnc#1012382).
- ath: Add regulatory mapping for Uganda (bnc#1012382).
- atl1c: reserve min skb headroom (bnc#1012382).
- atm: Preserve value of skb->truesize when accounting to vcc (bsc#1089066).
- audit: allow not equal op for audit by executable (bnc#1012382).
- backlight: as3711_bl: Fix Device Tree node leaks (bsc#1106929).
- backlight: lm3630a: Bump REG_MAX value to 0x50 instead of 0x1F (bsc#1106929).
- bcache: avoid unncessary cache prefetch bch_btree_node_get() (bsc#1064232).
- bcache: calculate the number of incremental GC nodes according to the total of btree nodes (bsc#1064232).
- bcache: display rate debug parameters to 0 when writeback is not running (bsc#1064232).
- bcache: do not check return value of debugfs_create_dir() (bsc#1064232).
- bcache: finish incremental GC (bsc#1064232).
- bcache: fix I/O significant decline while backend devices registering (bsc#1064232).
- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064232).
- bcache: free heap cache_set->flush_btree in bch_journal_free (bsc#1064232).
- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section (bsc#1064232).
- bcache: release dc->writeback_lock properly in bch_writeback_thread() (bsc#1064232).
- bcache: set max writeback rate when I/O request is idle (bsc#1064232).
- bcache: simplify the calculation of the total amount of flash dirty data (bsc#1064232).
- be2net: remove unused old custom busy-poll fields (bsc#1021121 ).
- blkdev: __blkdev_direct_IO_simple: fix leak in error case (bsc#1083663).
- block: bio_iov_iter_get_pages: fix size of last iovec (bsc#1083663).
- block: bio_iov_iter_get_pages: pin more pages for multi-segment IOs (bsc#1083663).
- block: do not use interruptible wait anywhere (bnc#1012382).
- bnx2x: Fix invalid memory access in rss hash config path (bnc#1012382).
- bnx2x: Fix receiving tx-timeout in error or recovery state (bnc#1012382).
- bnxt_en: Always set output parameters in bnxt_get_max_rings() (bsc#963575).
- bnxt_en: Fix for system hang if request_irq fails (bnc#1012382).
- bnxt_en: Fix inconsistent BNXT_FLAG_AGG_RINGS logic (bsc#1020412 ).
- bpf: fix references to free_bpf_prog_info() in comments (bnc#1012382).
- brcmfmac: Add support for bcm43364 wireless chipset (bnc#1012382).
- brcmfmac: stop watchdog before detach and free everything (bnc#1012382).
- bridge: Propagate vlan add failure to user (bnc#1012382).
- btrfs: Do not remove block group still has pinned down bytes (bsc#1086457).
- btrfs: add barriers to btrfs_sync_log before log_commit_wait wakeups (bnc#1012382).
- btrfs: do not leak ret from do_chunk_alloc (bnc#1012382).
- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bnc#1012382).
- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf.
- btrfs: round down size diff when shrinking/growing device (bsc#1097105).
- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bnc#1012382).
- can: mpc5xxx_can: check of_iomap return before use (bnc#1012382).
- can: xilinx_can: fix RX loop if RXNEMP is asserted without RXOK (bnc#1012382).
- can: xilinx_can: fix RX overflow interrupt not being enabled (bnc#1012382).
- can: xilinx_can: fix device dropping off bus on RX overrun (bnc#1012382).
- can: xilinx_can: fix incorrect clear of non-processed interrupts (bnc#1012382).
- can: xilinx_can: fix recovery from error states not being propagated (bnc#1012382).
- can: xilinx_can: keep only 1-2 frames in TX FIFO to fix TX accounting (bnc#1012382).
- cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status (bnc#1012382).
- ceph: fix incorrect use of strncpy (bsc#1107319).
- ceph: return errors from posix_acl_equiv_mode() correctly (bsc#1107320).
- cifs: Fix stack out-of-bounds in smb{2,3}_create_lease_buf() (bsc#1012382).
- cifs: add missing debug entries for kconfig options (bnc#1012382).
- cifs: check kmalloc before use (bsc#1012382).
- cifs: store the leaseKey in the fid on SMB2_open (bsc#1012382).
- clk: tegra: Fix PLL_U post divider and initial rate on Tegra30 (bnc#1012382).
- crypto: ablkcipher - fix crash flushing dcache in error path (bnc#1012382).
- crypto: authenc - do not leak pointers to authenc keys (bnc#1012382).
- crypto: authencesn - do not leak pointers to authenc keys (bnc#1012382).
- crypto: blkcipher - fix crash flushing dcache in error path (bnc#1012382).
- crypto: padlock-aes - Fix Nano workaround data corruption (bnc#1012382).
- crypto: vmac - require a block cipher with 128-bit block size (bnc#1012382).
- crypto: vmac - separate tfm and request context (bnc#1012382).
- crypto: vmx - Fix sleep-in-atomic bugs (bsc#1048317).
- cxgb4: when disabling dcb set txq dcb priority to 0 (bnc#1012382).
- cxl: Fix wrong comparison in cxl_adapter_context_get() (bsc#1055014).
- dccp: fix undefined behavior with 'cwnd' shift in ccid2_cwnd_restart() (bnc#1012382).
- disable loading f2fs module on PAGE_SIZE > 4KB (bnc#1012382).
- dm cache metadata: save in-core policy_hint_size to on-disk superblock (bnc#1012382).
- dma-iommu: Fix compilation when !CONFIG_IOMMU_DMA (bnc#1012382).
- dmaengine: k3dma: Off by one in k3_of_dma_simple_xlate() (bnc#1012382).
- dmaengine: pxa_dma: remove duplicate const qualifier (bnc#1012382).
- driver core: Partially revert 'driver core: correct device's shutdown order' (bnc#1012382).
- drivers: net: lmc: fix case value for target abort error (bnc#1012382).
- drm/armada: fix colorkey mode property (bnc#1012382).
- drm/atmel-hlcdc: check stride values in the first plane (bsc#1106929).
- drm/atomic: Handling the case when setting old crtc for plane (bnc#1012382).
- drm/bridge: adv7511: Reset registers on hotplug (bnc#1012382).
- drm/cirrus: Use drm_framebuffer_put to avoid kernel oops in clean-up (bsc#1101822).
- drm/drivers: add support for using the arch wc mapping API.
- drm/exynos/dsi: mask frame-done interrupt (bsc#1106929).
- drm/exynos: decon5433: Fix WINCONx reset value (bnc#1012382).
- drm/exynos: decon5433: Fix per-plane global alpha for XRGB modes (bnc#1012382).
- drm/exynos: gsc: Fix support for NV16/61, YUV420/YVU420 and YUV422 modes (bnc#1012382).
- drm/gma500: fix psb_intel_lvds_mode_valid()'s return type (bnc#1012382).
- drm/i915/userptr: reject zero user_size (bsc#1090888).
- drm/i915: Correctly handle limited range YCbCr data on VLV/CHV (bsc#1087092).
- drm/imx: fix typo in ipu_plane_formats (bsc#1106929).
- drm/imx: imx-ldb: check if channel is enabled before printing warning (bnc#1012382).
- drm/imx: imx-ldb: disable LDB on driver bind (bnc#1012382).
- drm/msm/hdmi: Use bitwise operators when building register values (bsc#1106929).
- drm/nouveau/gem: off by one bugs in nouveau_gem_pushbuf_reloc_apply() (bnc#1012382).
- drm/panel: type promotion bug in s6e8aa0_read_mtp_id() (bsc#1105769).
- drm/radeon: fix mode_valid's return type (bnc#1012382).
- drm: Add DP PSR2 sink enable bit (bnc#1012382).
- drm: Reject getfb for multi-plane framebuffers (bsc#1106929).
- enic: do not call enic_change_mtu in enic_probe
- enic: handle mtu change for vf properly (bnc#1012382).
- enic: initialize enic->rfs_h.lock in enic_probe (bnc#1012382).
- esp6: fix memleak on error path in esp6_input
- ext4: check for NUL characters in extended attribute's name (bnc#1012382).
- ext4: check for allocation block validity with block group locked (bsc#1104495).
- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).
- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).
- ext4: fix inline data updates with checksums enabled (bsc#1104494).
- ext4: fix spectre gadget in ext4_mb_regular_allocator() (bnc#1012382).
- ext4: reset error code in ext4_find_entry in fallback (bnc#1012382).
- ext4: sysfs: print ext4_super_block fields as little-endian (bsc#1106229).
- f2fs: fix to do not trigger writeback during recovery (bnc#1012382).
- fat: fix memory allocation failure handling of match_strdup() (bnc#1012382).
- fb: fix lost console when the user unplugs a USB adapter (bnc#1012382).
- fbdev: omapfb: off by one in omapfb_register_client() (bsc#1106929).
- fix __legitimize_mnt()/mntput() race (bnc#1012382).
- fix mntput/mntput race (bnc#1012382).
- fork: unconditionally clear stack on fork (bnc#1012382).
- fs/9p/xattr.c: catch the error of p9_client_clunk when setting xattr failed (bnc#1012382).
- fs/dax.c: fix inefficiency in dax_writeback_mapping_range() (bsc#1106185).
- fs/quota: Fix spectre gadget in do_quotactl (bnc#1012382).
- fs: aio: fix the increment of aio-nr and counting against aio-max-nr (bsc#1068075, bsc#1078921).
- fuse: Add missed unlock_page() to fuse_readpages_fill() (bnc#1012382).
- fuse: Do not access pipe->buffers without pipe_lock() (bnc#1012382).
- fuse: Fix oops at process_init_reply() (bnc#1012382).
- fuse: fix double request_end() (bnc#1012382).
- fuse: fix unlocked access to processing queue (bnc#1012382).
- fuse: umount should wait for all requests (bnc#1012382).
- genirq/proc: Return proper error code when irq_set_affinity() fails (bnc#1105392).
- getxattr: use correct xattr length (bnc#1012382).
- hfsplus: Do not clear SGID when inheriting ACLs (bsc#1030552).
- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bnc#1012382).
- hwrng: exynos - Disable runtime PM on driver unbind.
- i2c: davinci: Avoid zero value of CLKH (bnc#1012382).
- i2c: imx: Fix race condition in dma read (bnc#1012382).
- i2c: imx: Fix reinit_completion() use (bnc#1012382).
- i2c: ismt: fix wrong device address when unmap the data buffer (bnc#1012382).
- i40e: use cpumask_copy instead of direct assignment (bsc#1053685).
- i40iw: Fix memory leak in error path of create QP (bsc#969476 bsc#969477).
- i40iw: Use correct address in dst_neigh_lookup for IPv6 (bsc#969476 bsc#969477).
- ibmvnic: Include missing return code checks in reset function (bnc#1107966).
- ieee802154: at86rf230: switch from BUG_ON() to WARN_ON() on problem (bnc#1012382).
- ieee802154: at86rf230: use __func__ macro for debug messages (bnc#1012382).
- ieee802154: fakelb: switch from BUG_ON() to WARN_ON() on problem (bnc#1012382).
- igb: Fix not adding filter elements to the list (bsc#1024361 bsc#1024365).
- iio: ad9523: Fix displayed phase (bnc#1012382).
- iio: ad9523: Fix return value for ad952x_store() (bnc#1012382).
- inet: frag: enforce memory limits earlier (bnc#1012382 bsc#970506).
- iommu/amd: make sure TLB to be flushed before IOVA freed (bsc#1106105).
- iommu/vt-d: Add definitions for PFSID (bnc#1012382).
- iommu/vt-d: Fix dev iotlb pfsid use (bnc#1012382).
- iommu/vt-d: Ratelimit each dmar fault printing (bsc#1106105).
- ioremap: Update pgtable free interfaces with addr (bnc#1012382).
- ip: hash fragments consistently (bnc#1012382).
- ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull (bnc#1012382).
- ipconfig: Correctly initialise ic_nameservers (bnc#1012382).
- ipv4+ipv6: Make INET*_ESP select CRYPTO_ECHAINIV (bnc#1012382).
- ipv4: Return EINVAL when ping_group_range sysctl does not map to user ns (bnc#1012382).
- ipv4: remove BUG_ON() from fib_compute_spec_dst (bnc#1012382).
- ipv6: fix useless rol32 call on hash (bnc#1012382).
- ipv6: mcast: fix unsolicited report interval after receiving querys (bnc#1012382).
- ipvlan: use ETH_MAX_MTU as max mtu (bsc#1033962).
- iscsi target: fix session creation failure handling (bnc#1012382).
- isdn: Disable IIOCDBGVAR (bnc#1012382).
- iw_cxgb4: remove duplicate memcpy() in c4iw_create_listen() (bsc#969476 bsc#969477).
- iwlwifi: pcie: fix race in Rx buffer allocator (bnc#1012382).
- ixgbe: Be more careful when modifying MAC filters (bnc#1012382).
- jfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- jump_label: Add RELEASE barrier after text changes (bsc#1105271).
- jump_label: Fix concurrent static_key_enable/disable() (bsc#1105271).
- jump_label: Move CPU hotplug locking (bsc#1105271).
- jump_label: Provide hotplug context variants (bsc#1105271).
- jump_label: Reduce the size of struct static_key (bsc#1105271).
- jump_label: Reorder hotplug lock and jump_label_lock (bsc#1105271).
- jump_label: Split out code under the hotplug lock (bsc#1105271).
- jump_label: remove bug.h, atomic.h dependencies for HAVE_JUMP_LABEL (bsc#1105271).
- kABI: protect enum tcp_ca_event (kabi).
- kABI: reexport tcp_send_ack (kabi).
- kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- kasan: do not emit builtin calls when sanitization is off (bnc#1012382).
- kasan: fix shadow_size calculation error in kasan_module_alloc (bnc#1012382).
- kbuild: verify that $DEPMOD is installed (bnc#1012382).
- kernel: improve spectre mitigation (bnc#1106934, LTC#171029).
- kprobes/x86: Fix %p uses in error messages (bnc#1012382).
- kprobes: Make list and blacklist root user read only (bnc#1012382).
- kthread, tracing: Do not expose half-written comm when creating kthreads (bsc#1104897).
- kvm: x86: vmx: fix vpid leak (bnc#1012382).
- l2tp: use sk_dst_check() to avoid race on sk->sk_dst_cache (bnc#1012382).
- lib/rhashtable: consider param->min_size when setting initial table size (bnc#1012382).
- libata: Fix command retry decision (bnc#1012382).
- libceph: check authorizer reply/challenge length before reading (bsc#1096748).
- libceph: factor out __ceph_x_decrypt() (bsc#1096748).
- libceph: factor out __prepare_write_connect() (bsc#1096748).
- libceph: factor out encrypt_authorizer() (bsc#1096748).
- libceph: store ceph_auth_handshake pointer in ceph_connection (bsc#1096748).
- libceph: weaken sizeof check in ceph_x_verify_authorizer_reply() (bsc#1096748).
- llc: use refcount_inc_not_zero() for llc_sap_find() (bnc#1012382).
- locking/lockdep: Do not record IRQ state within lockdep code (bnc#1012382).
- locks: pass inode pointer to locks_free_lock_context (bsc@1099832).
- locks: prink more detail when there are leaked locks (bsc#1099832).
- locks: restore a warn for leaked locks on close (bsc#1099832).
- m68k: fix 'bad page state' oops on ColdFire boot (bnc#1012382).
- mac80211: add stations tied to AP_VLANs during hw reconfig (bnc#1012382).
- md/raid10: fix that replacement cannot complete recovery after reassemble (bnc#1012382).
- md: fix NULL dereference of mddev->pers in remove_and_add_spares() (bnc#1012382).
- media: omap3isp: fix unbalanced dma_iommu_mapping (bnc#1012382).
- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bnc#1012382).
- media: rtl28xxu: be sure that it won't go past the array size (bsc#1050431).
- media: s5p-jpeg: fix number of components macro (bsc#1050431).
- media: saa7164: Fix driver name in debug output (bnc#1012382).
- media: si470x: fix __be16 annotations (bnc#1012382).
- media: siano: get rid of __le32/__le16 cast warnings (bnc#1012382).
- media: staging: omap4iss: Include asm/cacheflush.h after generic includes (bnc#1012382).
- media: videobuf2-core: do not call memop 'finish' when queueing (bnc#1012382).
- memory: tegra: Apply interrupts mask per SoC (bnc#1012382).
- memory: tegra: Do not handle spurious interrupts (bnc#1012382).
- mfd: cros_ec: Fail early if we cannot identify the EC (bnc#1012382).
- microblaze: Fix simpleImage format generation (bnc#1012382).
- mm/hugetlb: filter out hugetlb pages if HUGEPAGE migration is not supported (bnc#1106697).
- mm/memory.c: check return value of ioremap_prot (bnc#1012382).
- mm/slub.c: add __printf verification to slab_err() (bnc#1012382).
- mm/tlb: Remove tlb_remove_table() non-concurrent condition (bnc#1012382).
- mm: Add vm_insert_pfn_prot() (bnc#1012382).
- mm: fix cache mode tracking in vm_insert_mixed() (bnc#1012382).
- mm: memcg: fix use after free in mem_cgroup_iter() (bnc#1012382).
- mm: vmalloc: avoid racy handling of debugobjects in vunmap (bnc#1012382).
- mm: x86: move _PAGE_SWP_SOFT_DIRTY from bit 7 to bit 1 (bnc#1012382).
- mtd: rawnand: fsl_ifc: fix FSL NAND driver to read all ONFI parameter pages (bnc#1012382).
- mtd: ubi: wl: Fix error return code in ubi_wl_init().
- mwifiex: correct histogram data with appropriate index (bnc#1012382).
- mwifiex: handle race during mwifiex_usb_disconnect (bnc#1012382).
- net/9p/client.c: version pointer uninitialized (bnc#1012382).
- net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree() (bnc#1012382).
- net/ethernet/freescale/fman: fix cross-build error (bnc#1012382).
- net/ipv4: Set oif in fib_compute_spec_dst (bnc#1012382).
- net/mlx4_core: Save the qpn from the input modifier in RST2INIT wrapper (bnc#1012382).
- net/mlx5: Add missing SET_DRIVER_VERSION command translation (bsc#1015342 bsc#1015343).
- net/mlx5: E-Switch, Include VF RDMA stats in vport statistics (bsc#966170 bsc#966172).
- net/mlx5: Eswitch, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1015342 bsc#1015343).
- net/mlx5: Fix wrong size allocation for QoS ETC TC regitster (bsc#966170 bsc#966172).
- net/mlx5: Vport, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#966170 bsc#966172).
- net/mlx5e: Do not allow aRFS for encapsulated packets (bsc#1015342 bsc#1015343).
- net/mlx5e: Err if asked to offload TC match on frag being first (bsc#1015342 bsc#1015343).
- net/mlx5e: Fix quota counting in aRFS expire flow (bsc#1015342 bsc#1015343).
- net/mlx5e: Refine ets validation function (bsc#966170 bsc#966172).
- net: 6lowpan: fix reserved space for single frames (bnc#1012382).
- net: Do not copy pfmemalloc flag in __copy_skb_header() (bnc#1012382).
- net: add skb_condense() helper (bsc#1089066).
- net: adjust skb->truesize in ___pskb_trim() (bsc#1089066).
- net: adjust skb->truesize in pskb_expand_head() (bsc#1089066).
- net: axienet: Fix double deregister of mdio (bnc#1012382).
- net: caif: Add a missing rcu_read_unlock() in caif_flow_cb (bnc#1012382).
- net: davinci_emac: match the mdio device against its compatible if possible (bnc#1012382).
- net: dsa: Do not suspend/resume closed slave_dev (bnc#1012382).
- net: ena: Fix use of uninitialized DMA address bits field (bsc#1027968).
- net: fix amd-xgbe flow-control issue (bnc#1012382).
- net: hamradio: use eth_broadcast_addr (bnc#1012382).
- net: lan78xx: Fix misplaced tasklet_schedule() call (bnc#1012382).
- net: lan78xx: fix rx handling before first packet is send (bnc#1012382).
- net: mac802154: tx: expand tailroom if necessary (bnc#1012382).
- net: phy: fix flag masking in __set_phy_supported (bnc#1012382).
- net: prevent ISA drivers from building on PPC32 (bnc#1012382).
- net: propagate dev_get_valid_name return code (bnc#1012382).
- net: qca_spi: Avoid packet drop during initial sync (bnc#1012382).
- net: qca_spi: Fix log level if probe fails (bnc#1012382).
- net: qca_spi: Make sure the QCA7000 reset is triggered (bnc#1012382).
- net: socket: fix potential spectre v1 gadget in socketcall (bnc#1012382).
- net: usb: rtl8150: demote allmulti message to dev_dbg() (bnc#1012382).
- net: vmxnet3: use new api ethtool_{get|set}_link_ksettings (bsc#1091860 bsc#1098253).
- net_sched: Fix missing res info when create new tc_index filter (bnc#1012382).
- net_sched: fix NULL pointer dereference when delete tcindex filter (bnc#1012382).
- netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state (bnc#1012382).
- netfilter: ipset: List timing out entries with 'timeout 1' instead of zero (bnc#1012382).
- netfilter: ipv6: nf_defrag: reduce struct net memory waste (bnc#1012382).
- netfilter: ipvs: do not create conn for ABORT packet in sctp_conn_schedule (bsc#1102797).
- netfilter: ipvs: fix the issue that sctp_conn_schedule drops non-INIT packet (bsc#1102797).
- netfilter: x_tables: set module owner for icmp(6) matches (bnc#1012382).
- netlink: Do not shift on 64 for ngroups (bnc#1012382).
- netlink: Do not shift with UB on nlk->ngroups (bnc#1012382).
- netlink: Do not subscribe to non-existent groups (bnc#1012382).
- netlink: Fix spectre v1 gadget in netlink_create() (bnc#1012382).
- netlink: do not enter direct reclaim from netlink_trim() (bsc#1042286).
- nfsd: fix potential use-after-free in nfsd4_decode_getdeviceinfo (bnc#1012382).
- nl80211: Add a missing break in parse_station_flags (bnc#1012382).
- nohz: Fix local_timer_softirq_pending() (bnc#1012382).
- nvme-fc: release io queues to allow fast fail (bsc#1102486).
- nvme: if_ready checks to fail io to deleting controller (bsc#1102486).
- nvme: kABI-compliant version of nvmf_fail_nonready_command() (bsc#1102486).
- nvmet-fc: fix target sgl list on large transfers (bsc#1102486).
- osf_getdomainname(): use copy_to_user() (bnc#1012382).
- ovl: Do d_type check only if work dir creation was successful (bnc#1012382).
- ovl: Ensure upper filesystem supports d_type (bnc#1012382).
- ovl: warn instead of error if d_type is not supported (bnc#1012382).
- packet: refine ring v3 block size test to hold one frame (bnc#1012382).
- packet: reset network header if packet shorter than ll reserved space (bnc#1012382).
- parisc: Define mb() and add memory barriers to assembler unlock sequences (bnc#1012382).
- parisc: Enable CONFIG_MLONGCALLS by default (bnc#1012382).
- parisc: Remove ordered stores from syscall.S (bnc#1012382).
- parisc: Remove unnecessary barriers from spinlock.h (bnc#1012382).
- perf auxtrace: Fix queue resize (bnc#1012382).
- perf llvm-utils: Remove bashism from kernel include fetch script (bnc#1012382).
- perf report powerpc: Fix crash if callchain is empty (bnc#1012382).
- perf test session topology: Fix test on s390 (bnc#1012382).
- perf/x86/intel/uncore: Correct fixed counter index check for NHM (bnc#1012382).
- perf/x86/intel/uncore: Correct fixed counter index check in generic code (bnc#1012382).
- perf: fix invalid bit in diagnostic entry (bnc#1012382).
- pinctrl: at91-pio4: add missing of_node_put (bnc#1012382).
- pinctrl: freescale: off by one in imx1_pinconf_group_dbg_show() (bnc#1012382).
- pnfs/blocklayout: off by one in bl_map_stripe() (bnc#1012382).
- powerpc/32: Add a missing include header (bnc#1012382).
- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032).
- powerpc/64s: Fix compiler store ordering to SLB shadow area (bnc#1012382).
- powerpc/8xx: fix invalid register expression in head_8xx.S (bnc#1012382).
- powerpc/chrp/time: Make some functions static, add missing header include (bnc#1012382).
- powerpc/embedded6xx/hlwd-pic: Prevent interrupts from being handled by Starlet (bnc#1012382).
- powerpc/fadump: handle crash memory ranges array index overflow (bsc#1103269).
- powerpc/fadump: merge adjacent memory ranges to reduce PT_LOAD segements (bsc#1103269).
- powerpc/lib: Fix the feature fixup tests to actually work (bsc#1066223).
- powerpc/powermac: Add missing prototype for note_bootable_part() (bnc#1012382).
- powerpc/powermac: Mark variable x as unused (bnc#1012382).
- powerpc/pseries: Fix endianness while restoring of r3 in MCE handler (bnc#1012382).
- powerpc/topology: Get topology for shared processors at boot (bsc#1104683).
- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157).
- powerpc: Avoid code patching freed init sections (bnc#1107735).
- powerpc: make feature-fixup tests fortify-safe (bsc#1066223).
- provide special timeout module parameters for EC2 (bsc#1065364).
- ptp: fix missing break in switch (bnc#1012382).
- pwm: tiehrpwm: Fix disabling of output of PWMs (bnc#1012382).
- qed: Add sanity check for SIMD fastpath handler (bnc#1012382).
- qed: Correct Multicast API to reflect existence of 256 approximate buckets (bsc#1019695 bsc#1019699 bsc#1022604).
- qed: Do not advertise DCBX_LLD_MANAGED capability (bsc#1019695 bsc#1019699 bsc#1022604).
- qed: Fix possible memory leak in Rx error path handling (bsc#1019695 bsc#1019699 bsc#1022604 ).
- qed: Fix possible race for the link state value (bnc#1012382).
- qed: Fix setting of incorrect eswitch mode (bsc#1019695 bsc#1019699 bsc#1022604).
- qed: Fix use of incorrect size in memcpy call (bsc#1019695 bsc#1019699 bsc#1022604).
- qede: Adverstise software timestamp caps when PHC is not available (bsc#1019695 bsc#1019699 bsc#1022604).
- qlge: Fix netdev features configuration (bsc#1098822).
- qlogic: check kstrtoul() for errors (bnc#1012382).
- random: mix rdrand with entropy sent in from userspace (bnc#1012382).
- readahead: stricter check for bdi io_pages (VM Functionality).
- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bnc#1012382).
- reiserfs: fix broken xattr handling (heap corruption, bad retval) (bnc#1012382).
- ring_buffer: tracing: Inherit the tracing setting to next ring buffer (bnc#1012382).
- root dentries need RCU-delayed freeing (bnc#1012382).
- rsi: Fix 'invalid vdd' warning in mmc (bnc#1012382).
- rtc: ensure rtc_set_alarm fails when alarms are not supported (bnc#1012382).
- rtnetlink: add rtnl_link_state check in rtnl_configure_link (bnc#1012382).
- s390/cpum_sf: Add data entry sizes to sampling trailer entry (bnc#1012382).
- s390/kvm: fix deadlock when killed by oom (bnc#1012382).
- s390/lib: use expoline for all bcr instructions (bnc#1106934, LTC#171029).
- s390/pci: fix out of bounds access during irq setup (bnc#1012382).
- s390/qdio: reset old sbal_state flags (bnc#1012382).
- s390/qeth: do not clobber buffer on async TX completion (bnc#1104485, LTC#170349).
- s390/qeth: fix race when setting MAC address (bnc#1104485, LTC#170726).
- s390: add explicit <linux/stringify.h> for jump label (bsc#1105271).
- s390: detect etoken facility (bnc#1106934, LTC#171029).
- s390: fix br_r1_trampoline for machines without exrl (bnc#1012382 bnc#1106934 LTC#171029).
- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).
- scripts/tar-up.sh: Do not package gitlog-excludes file Also fix the evaluation of gitlog-excludes file, too
- scsi: 3w-xxxx: fix a missing-check bug (bnc#1012382).
- scsi: core: Avoid that SCSI device removal through sysfs triggers a deadlock (bnc#1012382).
- scsi: fcoe: drop frames in ELS LOGO error path (bnc#1012382).
- scsi: hpsa: limit transfer length to 1MB, not 512kB (bsc#1102346).
- scsi: libiscsi: fix possible NULL pointer dereference in case of TMF (bnc#1012382).
- scsi: megaraid: silence a static checker bug (bnc#1012382).
- scsi: megaraid_sas: Increase timeout by 1 sec for non-RAID fastpath IOs (bnc#1012382).
- scsi: qla2xxx: Fix ISP recovery on unload (bnc#1012382).
- scsi: qla2xxx: Return error when TMF returns (bnc#1012382).
- scsi: scsi_dh: replace too broad 'TP9' string with the exact models (bnc#1012382).
- scsi: sr: Avoid that opening a CD-ROM hangs with runtime power management enabled (bnc#1012382).
- scsi: sysfs: Introduce sysfs_{un,}break_active_protection() (bnc#1012382).
- scsi: ufs: fix exception event handling (bnc#1012382).
- scsi: vmw_pvscsi: Return DID_RESET for status SAM_STAT_COMMAND_TERMINATED (bnc#1012382).
- scsi: xen-scsifront: add error handling for xenbus_printf (bnc#1012382).
- scsi_debug: call resp_XXX function after setting host_scribble (bsc#1069138).
- scsi_debug: reset injection flags for every_nth > 0 (bsc#1069138).
- selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC (bnc#1012382).
- selftest/seccomp: Fix the seccomp(2) signature (bnc#1012382).
- selftests/ftrace: Add snapshot and tracing_on test case (bnc#1012382).
- selftests/x86/sigreturn/64: Fix spurious failures on AMD CPUs (bnc#1012382).
- selftests: pstore: return Kselftest Skip code for skipped tests (bnc#1012382).
- selftests: static_keys: return Kselftest Skip code for skipped tests (bnc#1012382).
- selftests: sync: add config fragment for testing sync framework (bnc#1012382).
- selftests: user: return Kselftest Skip code for skipped tests (bnc#1012382).
- selftests: zram: return Kselftest Skip code for skipped tests (bnc#1012382).
- serial: 8250_dw: always set baud rate in dw8250_set_termios (bnc#1012382).
- sfc: stop the TX queue before pushing new buffers (bsc#1017967 ).
- skbuff: Unconditionally copy pfmemalloc in __skb_clone() (bnc#1012382).
- slab: __GFP_ZERO is incompatible with a constructor (bnc#1107060).
- smb3: Do not send SMB3 SET_INFO if nothing changed (bnc#1012382).
- smb3: do not request leases in symlink creation and query (bnc#1012382).
- spi: davinci: fix a NULL pointer dereference (bnc#1012382).
- squashfs: be more careful about metadata corruption (bnc#1012382).
- squashfs: more metadata hardening (bnc#1012382).
- squashfs: more metadata hardenings (bnc#1012382).
- staging: android: ion: check for kref overflow (bnc#1012382).
- string: drop __must_check from strscpy() and restore strscpy() usages in cgroup (bsc#1107319).
- sys: do not hold uts_sem while accessing userspace memory (bnc#1106995).
- target_core_rbd: use RCU in free_device (bsc#1105524).
- tcp: Fix missing range_truesize enlargement in the backport (bnc#1012382).
- tcp: add max_quickacks param to tcp_incr_quickack and tcp_enter_quickack_mode (bnc#1012382).
- tcp: add one more quick ack after after ECN events (bnc#1012382).
- tcp: do not aggressively quick ack after ECN events (bnc#1012382).
- tcp: do not cancel delay-AcK on DCTCP special ACK (bnc#1012382).
- tcp: do not delay ACK in DCTCP upon CE status change (bnc#1012382).
- tcp: do not force quickack when receiving out-of-order packets (bnc#1012382).
- tcp: fix dctcp delayed ACK schedule (bnc#1012382).
- tcp: helpers to send special DCTCP ack (bnc#1012382).
- tcp: identify cryptic messages as TCP seq # bugs (bnc#1012382).
- tcp: refactor tcp_ecn_check_ce to remove sk type cast (bnc#1012382).
- tcp: remove DELAYED ACK events in DCTCP (bnc#1012382).
- tg3: Add higher cpu clock for 5762 (bnc#1012382).
- thermal: exynos: fix setting rising_threshold for Exynos5433 (bnc#1012382).
- timekeeping: Eliminate the stale declaration of ktime_get_raw_and_real_ts64() (bsc#969470).
- tools/power turbostat: Read extended processor family from CPUID (bnc#1012382).
- tools/power turbostat: fix -S on UP systems (bnc#1012382).
- tools: usb: ffs-test: Fix build on big endian systems (bnc#1012382).
- tpm: fix race condition in tpm_common_write() (bnc#1012382).
- tracing/blktrace: Fix to allow setting same value (bnc#1012382).
- tracing/kprobes: Fix trace_probe flags on enable_trace_kprobe() failure (bnc#1012382).
- tracing: Do not call start/stop() functions when tracing_on does not change (bnc#1012382).
- tracing: Fix double free of event_trigger_data (bnc#1012382).
- tracing: Fix possible double free in event_enable_trigger_func() (bnc#1012382).
- tracing: Quiet gcc warning about maybe unused link variable (bnc#1012382).
- tracing: Use __printf markup to silence compiler (bnc#1012382).
- tty: Fix data race in tty_insert_flip_string_fixed_flag (bnc#1012382).
- turn off -Wattribute-alias (bnc#1012382).
- ubi: Be more paranoid while seaching for the most recent Fastmap (bnc#1012382).
- ubi: Fix Fastmap's update_vol() (bnc#1012382).
- ubi: Fix races around ubi_refill_pools() (bnc#1012382).
- ubi: Introduce vol_ignored() (bnc#1012382).
- ubi: Rework Fastmap attach base code (bnc#1012382).
- ubi: fastmap: Erase outdated anchor PEBs during attach (bnc#1012382).
- ubifs: Check data node size before truncate (bsc#1106276).
- ubifs: Fix memory leak in lprobs self-check (bsc#1106278).
- ubifs: Fix synced_i_size calculation for xattr inodes (bsc#1106275).
- ubifs: xattr: Do not operate on deleted inodes (bsc#1106271).
- udl-kms: change down_interruptible to down (bnc#1012382).
- udl-kms: fix crash due to uninitialized memory (bnc#1012382).
- udl-kms: handle allocation failure (bnc#1012382).
- udlfb: set optimal write delay (bnc#1012382).
- uprobes: Use synchronize_rcu() not synchronize_sched() (bnc#1012382).
- usb/phy: fix PPC64 build errors in phy-fsl-usb.c (bnc#1012382).
- usb: audio-v2: Correct the comment for struct uac_clock_selector_descriptor (bsc#1099810).
- usb: cdc_acm: Add quirk for Castles VEGA3000 (bnc#1012382).
- usb: dwc2: debugfs: Do not touch RX FIFO during register dump (bsc#1100132).
- usb: dwc2: fix isoc split in transfer with no data (bnc#1012382).
- usb: gadget: composite: fix delayed_status race condition when set_interface (bnc#1012382).
- usb: gadget: dwc2: fix memory leak in gadget_init() (bnc#1012382).
- usb: gadget: f_fs: Only return delayed status when len is 0 (bnc#1012382).
- usb: gadget: f_uac2: fix endianness of 'struct cntrl_*_lay3' (bnc#1012382).
- usb: gadget: r8a66597: Fix a possible sleep-in-atomic-context bugs in r8a66597_queue() (bnc#1012382).
- usb: gadget: r8a66597: Fix two possible sleep-in-atomic-context bugs in init_controller() (bnc#1012382).
- usb: hub: Do not wait for connect state at resume for powered-off ports (bnc#1012382).
- usb: renesas_usbhs: gadget: fix spin_lock_init() for &uep->lock (bsc#1085536).
- usb: xhci: increase CRS timeout value (bnc#1012382).
- usbip: usbip_detach: Fix memory, udev context and udev leak (bnc#1012382).
- userns: move user access out of the mutex (bnc#1012382).
- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).
- virtio_balloon: fix another race between migration and ballooning (bnc#1012382).
- vmw_balloon: VMCI_DOORBELL_SET does not check status (bnc#1012382).
- vmw_balloon: do not use 2MB without batching (bnc#1012382).
- vmw_balloon: fix VMCI use when balloon built into kernel (bnc#1012382).
- vmw_balloon: fix inflation of 64-bit GFNs (bnc#1012382).
- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1091860 bsc#1098253).
- vmxnet3: add receive data ring support (bsc#1091860 bsc#1098253).
- vmxnet3: add support for get_coalesce, set_coalesce ethtool operations (bsc#1091860 bsc#1098253).
- vmxnet3: allow variable length transmit data ring buffer (bsc#1091860 bsc#1098253).
- vmxnet3: avoid assumption about invalid dma_pa in vmxnet3_set_mc() (bsc#1091860 bsc#1098253).
- vmxnet3: avoid format strint overflow warning (bsc#1091860 bsc#1098253).
- vmxnet3: avoid xmit reset due to a race in vmxnet3 (bsc#1091860 bsc#1098253).
- vmxnet3: fix incorrect dereference when rxvlan is disabled (bsc#1091860 bsc#1098253).
- vmxnet3: fix non static symbol warning (bsc#1091860 bsc#1098253).
- vmxnet3: fix tx data ring copy for variable size (bsc#1091860 bsc#1098253).
- vmxnet3: increase default rx ring sizes (bsc#1091860 bsc#1098253).
- vmxnet3: introduce command to register memory region (bsc#1091860 bsc#1098253).
- vmxnet3: introduce generalized command interface to configure the device (bsc#1091860 bsc#1098253).
- vmxnet3: prepare for version 3 changes (bsc#1091860 bsc#1098253).
- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1091860 bsc#1098253).
- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1091860 bsc#1098253).
- vmxnet3: set the DMA mask before the first DMA map operation (bsc#1091860 bsc#1098253).
- vmxnet3: update to version 3 (bsc#1091860 bsc#1098253).
- vmxnet3: use DMA memory barriers where required (bsc#1091860 bsc#1098253).
- vmxnet3: use correct flag to indicate LRO feature (bsc#1091860 bsc#1098253).
- vsock: split dwork to avoid reinitializations (bnc#1012382).
- vti6: Fix dev->max_mtu setting (bsc#1033962).
- vti6: fix PMTU caching and reporting on xmit (bnc#1012382).
- wlcore: sdio: check for valid platform device data before suspend (bnc#1012382).
- x86/MCE: Remove min interval polling limitation (bnc#1012382).
- x86/amd: do not set X86_BUG_SYSRET_SS_ATTRS when running under Xen (bnc#1012382).
- x86/asm/entry/32: Simplify pushes of zeroed pt_regs->REGs (bnc#1012382).
- x86/bugs: Move the l1tf function and define pr_fmt properly (bnc#1012382).
- x86/bugs: Respect nospec command line option (bsc#1068032).
- x86/cpu/AMD: Fix erratum 1076 (CPB bit) (bnc#1012382).
- x86/cpu: Make alternative_msr_write work for 32-bit code (bnc#1012382).
- x86/cpu: Re-apply forced caps every time CPU caps are re-read (bnc#1012382).
- x86/cpufeatures: Add CPUID_7_EDX CPUID leaf (bnc#1012382).
- x86/cpufeatures: Clean up Spectre v2 related CPUID flags (bnc#1012382).
- x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface (bnc#1012382).
- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).
- x86/init: fix build with CONFIG_SWAP=n (bnc#1012382).
- x86/irqflags: Mark native_restore_fl extern inline (bnc#1012382).
- x86/irqflags: Provide a declaration for native_save_fl.
- x86/mm/kmmio: Make the tracer robust against L1TF (bnc#1012382).
- x86/mm/pat: Fix L1TF stable backport for CPA (bnc#1012382).
- x86/mm/pat: Fix L1TF stable backport for CPA, 2nd call (bnc#1012382).
- x86/mm/pat: Make set_memory_np() L1TF safe (bnc#1012382).
- x86/mm: Add TLB purge to free pmd/pte page interfaces (bnc#1012382).
- x86/mm: Disable ioremap free page handling on x86-PAE (bnc#1012382).
- x86/mm: Give each mm TLB flush generation a unique ID (bnc#1012382).
- x86/paravirt: Fix spectre-v2 mitigations for paravirt guests (bnc#1012382).
- x86/paravirt: Make native_save_fl() extern inline (bnc#1012382).
- x86/process: Correct and optimize TIF_BLOCKSTEP switch (bnc#1012382).
- x86/process: Optimize TIF checks in __switch_to_xtra() (bnc#1012382).
- x86/process: Optimize TIF_NOTSC switch (bnc#1012382).
- x86/process: Re-export start_thread() (bnc#1012382).
- x86/spectre: Add missing family 6 check to microcode check (bnc#1012382).
- x86/spectre_v2: Do not check microcode versions when running under hypervisors (bnc#1012382).
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion (bnc#1012382).
- x86/speculation/l1tf: Extend 64bit swap file size limit (bnc#1012382).
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1012382).
- x86/speculation/l1tf: Fix up CPU feature flags (bnc#1012382).
- x86/speculation/l1tf: Fix up pte->pfn conversion for PAE (bnc#1012382).
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- x86/speculation/l1tf: Invert all not present mappings (bnc#1012382).
- x86/speculation/l1tf: Make pmd/pud_mknotpresent() invert (bnc#1012382).
- x86/speculation/l1tf: Protect PAE swap entries against L1TF (bnc#1012382).
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).
- x86/speculation/l1tf: Unbreak !__HAVE_ARCH_PFN_MODIFY_ALLOWED architectures (bnc#1012382).
- x86/speculation: Add <asm/msr-index.h> dependency (bnc#1012382).
- x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support (bnc#1012382).
- x86/speculation: Clean up various Spectre related details (bnc#1012382).
- x86/speculation: Correct Speculation Control microcode blacklist again (bnc#1012382).
- x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP (bnc#1012382).
- x86/speculation: Update Speculation Control microcode blacklist (bnc#1012382).
- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).
- x86/speculation: Use IBRS if available before calling into firmware (bnc#1012382).
- x86/speculation: Use Indirect Branch Prediction Barrier in context switch (bnc#1012382).
- x86/xen: Add call of speculative_store_bypass_ht_init() to PV paths (bnc#1012382).
- xen-netfront: wait xenbus state change when load module manually (bnc#1012382).
- xen/blkback: do not keep persistent grants too long (bsc#1085042).
- xen/blkback: move persistent grants flags to bool (bsc#1085042).
- xen/blkfront: cleanup stale persistent grants (bsc#1085042).
- xen/blkfront: reorder tests in xlblk_init() (bsc#1085042).
- xen/netfront: do not cache skb_shinfo() (bnc#1012382).
- xen: set cpu capabilities from xen_start_kernel() (bnc#1012382).
- xfrm: fix missing dst_release() after policy blocking lbcast and multicast (bnc#1012382).
- xfrm: free skb if nlsk pointer is NULL (bnc#1012382).
- xfrm_user: prevent leaking 2 bytes of kernel memory (bnc#1012382).
- xfs: Remove dead code from inode recover function (bsc#1105396).
- xfs: repair malformed inode items during log recovery (bsc#1105396).
- xhci: Fix perceived dead host due to runtime suspend race with event handler (bnc#1012382).
- zswap: re-check zswap_is_full() after do zswap_shrink() (bnc#1012382).
Patchnames
SUSE-SLE-DESKTOP-12-SP3-2018-1941,SUSE-SLE-HA-12-SP3-2018-1941,SUSE-SLE-SDK-12-SP3-2018-1941,SUSE-SLE-SERVER-12-SP3-2018-1941,SUSE-SLE-WE-12-SP3-2018-1941
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.155 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-13093: Prevent NULL pointer dereference and panic in lookup_slow()\n on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image.\n This occured because of a lack of proper validation that cached inodes are free\n during allocation (bnc#1100001).\n- CVE-2018-13095: Prevent denial of service (memory corruption and BUG) that\n could have occurred for a corrupted xfs image upon encountering an inode that\n is in extent format, but has more extents than fit in the inode fork\n (bnc#1099999).\n- CVE-2018-13094: Prevent OOPS that may have occured for a corrupted xfs image\n after xfs_da_shrink_inode() is called with a NULL bp (bnc#1100000).\n- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was\n caused by the way the overrun accounting works. Depending on interval and\n expiry time values, the overrun can be larger than INT_MAX, but the accounting\n is int based. This basically made the accounting values, which are visible to\n user space via timer_getoverrun(2) and siginfo::si_overrun, random. This\n allowed a local user to cause a denial of service (signed integer overflow) via\n crafted mmap, futex, timer_create, and timer_settime system calls\n (bnc#1099922).\n- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that\n could have been used by local attackers to read kernel memory (bnc#1107689).\n- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a\n denial of service (ias_object use-after-free and system crash) or possibly have\n unspecified other impact via an AF_IRDA socket (bnc#1106511).\n- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed\n local users to cause a denial of service (memory consumption) by repeatedly\n binding an AF_IRDA socket (bnc#1106509).\n- CVE-2018-1129: A flaw was found in the way signature calculation was handled\n by cephx authentication protocol. An attacker having access to ceph cluster\n network who is able to alter the message payload was able to bypass signature\n checks done by cephx protocol (bnc#1096748).\n- CVE-2018-1128: It was found that cephx authentication protocol did not verify\n ceph clients correctly and was vulnerable to replay attack. Any attacker having\n access to ceph cluster network who is able to sniff packets on network can use\n this vulnerability to authenticate with ceph service and perform actions\n allowed by ceph service (bnc#1096748).\n- CVE-2018-10938: A crafted network packet sent remotely by an attacker forced\n the kernel to enter an infinite loop in the cipso_v4_optptr() function leading\n to a denial-of-service (bnc#1106016).\n- CVE-2018-15572: The spectre_v2_select_mitigation function did not always fill\n RSB upon a context switch, which made it easier for attackers to conduct\n userspace-userspace spectreRSB attacks (bnc#1102517).\n- CVE-2018-10902: Protect against concurrent access to prevent double realloc\n (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A\n malicious local attacker could have used this for privilege escalation\n (bnc#1105322 1105323).\n- CVE-2018-9363: Prevent buffer overflow in hidp_process_report (bsc#1105292)\n- CVE-2018-10883: A local user could have caused an out-of-bounds write in\n jbd2_journal_dirty_metadata(), a denial of service, and a system crash by\n mounting and operating on a crafted ext4 filesystem image (bsc#1099863).\n- CVE-2018-10879: A local user could have caused a use-after-free in\n ext4_xattr_set_entry function and a denial of service or unspecified other\n impact by renaming a file in a crafted ext4 filesystem image (bsc#1099844).\n- CVE-2018-10878: A local user could have caused an out-of-bounds write and a\n denial of service or unspecified other impact by mounting and operating a\n crafted ext4 filesystem image (bsc#1099813).\n- CVE-2018-10876: A use-after-free was possible in ext4_ext_remove_space()\n function when mounting and operating a crafted ext4 image (bsc#1099811).\n- CVE-2018-10877: Prevent out-of-bound access in the ext4_ext_drop_refs()\n function when operating on a crafted ext4 filesystem image (bsc#1099846).\n- CVE-2018-10881: A local user could have caused an out-of-bound access in\n ext4_get_group_info function, a denial of service, and a system crash by\n mounting and operating on a crafted ext4 filesystem image (bsc#1099864).\n- CVE-2018-10882: A local user could have caused an out-of-bound write, a\n denial of service, and a system crash by unmounting a crafted ext4 filesystem\n image (bsc#1099849).\n- CVE-2018-10880: Prevent stack-out-of-bounds write in the ext4 filesystem code\n when mounting and writing to a crafted ext4 image in ext4_update_inline_data().\n An attacker could have used this to cause a system crash and a denial of\n service (bsc#1099845).\n\nThe following non-security bugs were fixed:\n\n- 9p/net: Fix zero-copy path in the 9p virtio transport (bnc#1012382).\n- 9p/virtio: fix off-by-one error in sg list bounds check (bnc#1012382).\n- 9p: fix multiple NULL-pointer-dereferences (bnc#1012382).\n- ACPI / LPSS: Add missing prv_offset setting for byt/cht PWM devices (bnc#1012382).\n- ACPI / PCI: Bail early in acpi_pci_add_bus() if there is no ACPI handle (bnc#1012382).\n- ACPI / PM: save NVS memory for ASUS 1025C laptop (bnc#1012382).\n- ACPI: save NVS memory for Lenovo G50-45 (bnc#1012382).\n- ALSA: cs5535audio: Fix invalid endian conversion (bnc#1012382).\n- ALSA: emu10k1: Rate-limit error messages about page errors (bnc#1012382).\n- ALSA: emu10k1: add error handling for snd_ctl_add (bnc#1012382).\n- ALSA: fm801: add error handling for snd_ctl_add (bnc#1012382).\n- ALSA: hda - Sleep for 10ms after entering D3 on Conexant codecs (bnc#1012382).\n- ALSA: hda - Turn CX8200 into D3 as well upon reboot (bnc#1012382).\n- ALSA: hda/ca0132: fix build failure when a local macro is defined (bnc#1012382).\n- ALSA: hda: Correct Asrock B85M-ITX power_save blacklist entry (bnc#1012382).\n- ALSA: memalloc: Do not exceed over the requested size (bnc#1012382).\n- ALSA: rawmidi: Change resized buffers atomically (bnc#1012382).\n- ALSA: snd-aoa: add of_node_put() in error path (bsc#1099810).\n- ALSA: usb-audio: Apply rate limit to warning messages in URB complete callback (bnc#1012382).\n- ALSA: virmidi: Fix too long output trigger loop (bnc#1012382).\n- ALSA: vx222: Fix invalid endian conversions (bnc#1012382).\n- ALSA: vxpocket: Fix invalid endian conversions (bnc#1012382).\n- ARC: Enable machine_desc->init_per_cpu for !CONFIG_SMP (bnc#1012382).\n- ARC: Explicitly add -mmedium-calls to CFLAGS (bnc#1012382).\n- ARC: Fix CONFIG_SWAP (bnc#1012382).\n- ARC: mm: allow mprotect to make stack mappings executable (bnc#1012382).\n- ARM: 8780/1: ftrace: Only set kernel memory back to read-only after boot (bnc#1012382).\n- ARM: dts: Cygnus: Fix I2C controller interrupt type (bnc#1012382).\n- ARM: dts: am3517.dtsi: Disable reference to OMAP3 OTG controller (bnc#1012382).\n- ARM: dts: am437x: make edt-ft5x06 a wakeup source (bnc#1012382).\n- ARM: dts: da850: Fix interrups property for gpio (bnc#1012382).\n- ARM: dts: imx6sx: fix irq for pcie bridge (bnc#1012382).\n- ARM: fix put_user() for gcc-8 (bnc#1012382).\n- ARM: imx_v4_v5_defconfig: Select ULPI support (bnc#1012382).\n- ARM: imx_v6_v7_defconfig: Select ULPI support (bnc#1012382).\n- ARM: pxa: irq: fix handling of ICMR registers in suspend/resume (bnc#1012382).\n- ARM: tegra: Fix Tegra30 Cardhu PCA954x reset (bnc#1012382).\n- ASoC: Intel: cht_bsw_max98090: remove useless code, align with ChromeOS driver.\n- ASoC: Intel: cht_bsw_max98090_ti: Fix jack initialization (bnc#1012382).\n- ASoC: dpcm: do not merge format from invalid codec dai (bnc#1012382).\n- ASoC: dpcm: fix BE dai not hw_free and shutdown (bnc#1012382).\n- ASoC: pxa: Fix module autoload for platform drivers (bnc#1012382).\n- ASoC: sirf: Fix potential NULL pointer dereference (bnc#1012382).\n- Add reference to bsc#1091171 (bnc#1012382; bsc#1091171).\n- Bluetooth: avoid killing an already killed socket (bnc#1012382).\n- Bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bnc#1012382).\n- Bluetooth: btusb: Remove Yoga 920 from the btusb_needs_reset_resume_table (bsc#1087092).\n- Bluetooth: btusb: Use DMI matching for QCA reset_resume quirking (bsc#1087092).\n- Bluetooth: hci_qca: Fix 'Sleep inside atomic section' warning (bnc#1012382).\n- Documentation/spec_ctrl: Do some minor cleanups (bnc#1012382).\n- HID: hid-plantronics: Re-resend Update to map button for PTT products (bnc#1012382).\n- HID: i2c-hid: check if device is there before really probing (bnc#1012382).\n- HID: wacom: Correct touch maximum XY of 2nd-gen Intuos (bnc#1012382).\n- IB/core: Make testing MR flags for writability a static inline function (bnc#1012382).\n- IB/core: Remove duplicate declaration of gid_cache_wq (bsc#1056596).\n- IB/iser: Do not reduce max_sectors (bsc#1063646).\n- IB/mlx4: Fix an error handling path in 'mlx4_ib_rereg_user_mr()'.\n- IB/mlx4: Mark user MR as writable if actual virtual memory is writable (bnc#1012382).\n- IB/mlx5: Fetch soft WQE's on fatal error state (bsc#1015342 bsc#1015343).\n- IB/mlx5: Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1015342 bsc#1015343).\n- IB/ocrdma: fix out of bounds access to local buffer (bnc#1012382).\n- Input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bnc#1012382).\n- Input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bnc#1012382).\n- Input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bnc#1012382).\n- KVM/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel (bnc#1012382).\n- KVM: MMU: always terminate page walks at level 1 (bsc#1062604).\n- KVM: MMU: simplify last_pte_bitmap (bsc#1062604).\n- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).\n- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).\n- KVM: arm/arm64: Skip updating PMD entry if no change (bnc#1012382).\n- KVM: arm/arm64: Skip updating PTE entry if no change (bnc#1012382).\n- KVM: irqfd: fix race between EPOLLHUP and irq_bypass_register_consumer (bnc#1012382).\n- KVM: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).\n- MIPS: Correct the 64-bit DSP accumulator register size (bnc#1012382).\n- MIPS: Fix off-by-one in pci_resource_to_user() (bnc#1012382).\n- MIPS: ath79: fix register address in ath79_ddr_wb_flush() (bnc#1012382).\n- MIPS: lib: Provide MIPS64r6 __multi3() for GCC lower than < 7 (bnc#1012382).\n- NET: stmmac: align DMA stuff to largest cache line length (bnc#1012382).\n- PCI: Prevent sysfs disable of device while driver is attached (bnc#1012382).\n- PCI: Skip MPS logic for Virtual Functions (VFs) (bnc#1012382).\n- PCI: hotplug: Do not leak pci_slot on registration failure (bnc#1012382).\n- PCI: pciehp: Fix use-after-free on unplug (bnc#1012382).\n- PCI: pciehp: Request control of native hotplug only if supported (bnc#1012382).\n- PM / sleep: wakeup: Fix build error caused by missing SRCU support (bnc#1012382).\n- RDMA/i40iw: Avoid panic when objects are being created and destroyed (bsc#969476 bsc#969477).\n- RDMA/i40iw: Avoid panic when reading back the IRQ affinity hint (bsc#969476 bsc#969477).\n- RDMA/i40iw: Avoid reference leaks when processing the AEQ (bsc#969476 bsc#969477).\n- RDMA/i40w: Hold read semaphore while looking after VMA (bsc#1024376).\n- RDMA/mad: Convert BUG_ONs to error flows (bnc#1012382).\n- RDMA/mlx5: Use proper spec flow label type (bsc#1015342 bsc#1015343).\n- Revert 'MIPS: BCM47XX: Enable 74K Core ExternalSync for PCIe erratum' (bnc#1012382).\n- Revert 'UBIFS: Fix potential integer overflow in allocation' (bnc#1012382).\n- Revert 'f2fs: handle dirty segments inside refresh_sit_entry' (bsc#1106281).\n- Revert 'mm: page_alloc: skip over regions of invalid pfns where possible' (bnc#1107078).\n- Revert 'block-cancel-workqueue-entries-on-blk_mq_freeze_queue' (bsc#1103717).\n- Smack: Mark inode instant in smack_task_to_inode (bnc#1012382).\n- USB: musb: fix external abort on suspend (bsc#1085536).\n- USB: option: add support for DW5821e (bnc#1012382).\n- USB: serial: metro-usb: stop I/O after failed open (bsc#1085539).\n- USB: serial: sierra: fix potential deadlock at close (bnc#1012382).\n- Workaround kABI breakage by __must_check drop of strscpy() (bsc#1107319).\n- afs: Fix directory permissions check (bsc#1106283).\n- arc: fix build errors in arc/include/asm/delay.h (bnc#1012382).\n- arc: fix type warnings in arc/mm/cache.c (bnc#1012382).\n- arm64: make secondary_start_kernel() notrace (bnc#1012382).\n- arm64: mm: check for upper PAGE_SHIFT bits in pfn_valid() (bnc#1012382).\n- ath: Add regulatory mapping for APL13_WORLD (bnc#1012382).\n- ath: Add regulatory mapping for APL2_FCCA (bnc#1012382).\n- ath: Add regulatory mapping for Bahamas (bnc#1012382).\n- ath: Add regulatory mapping for Bermuda (bnc#1012382).\n- ath: Add regulatory mapping for ETSI8_WORLD (bnc#1012382).\n- ath: Add regulatory mapping for FCC3_ETSIC (bnc#1012382).\n- ath: Add regulatory mapping for Serbia (bnc#1012382).\n- ath: Add regulatory mapping for Tanzania (bnc#1012382).\n- ath: Add regulatory mapping for Uganda (bnc#1012382).\n- atl1c: reserve min skb headroom (bnc#1012382).\n- atm: Preserve value of skb->truesize when accounting to vcc (bsc#1089066).\n- audit: allow not equal op for audit by executable (bnc#1012382).\n- backlight: as3711_bl: Fix Device Tree node leaks (bsc#1106929).\n- backlight: lm3630a: Bump REG_MAX value to 0x50 instead of 0x1F (bsc#1106929).\n- bcache: avoid unncessary cache prefetch bch_btree_node_get() (bsc#1064232).\n- bcache: calculate the number of incremental GC nodes according to the total of btree nodes (bsc#1064232).\n- bcache: display rate debug parameters to 0 when writeback is not running (bsc#1064232).\n- bcache: do not check return value of debugfs_create_dir() (bsc#1064232).\n- bcache: finish incremental GC (bsc#1064232).\n- bcache: fix I/O significant decline while backend devices registering (bsc#1064232).\n- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064232).\n- bcache: free heap cache_set->flush_btree in bch_journal_free (bsc#1064232).\n- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section (bsc#1064232).\n- bcache: release dc->writeback_lock properly in bch_writeback_thread() (bsc#1064232).\n- bcache: set max writeback rate when I/O request is idle (bsc#1064232).\n- bcache: simplify the calculation of the total amount of flash dirty data (bsc#1064232).\n- be2net: remove unused old custom busy-poll fields (bsc#1021121 ).\n- blkdev: __blkdev_direct_IO_simple: fix leak in error case (bsc#1083663).\n- block: bio_iov_iter_get_pages: fix size of last iovec (bsc#1083663).\n- block: bio_iov_iter_get_pages: pin more pages for multi-segment IOs (bsc#1083663).\n- block: do not use interruptible wait anywhere (bnc#1012382).\n- bnx2x: Fix invalid memory access in rss hash config path (bnc#1012382).\n- bnx2x: Fix receiving tx-timeout in error or recovery state (bnc#1012382).\n- bnxt_en: Always set output parameters in bnxt_get_max_rings() (bsc#963575).\n- bnxt_en: Fix for system hang if request_irq fails (bnc#1012382).\n- bnxt_en: Fix inconsistent BNXT_FLAG_AGG_RINGS logic (bsc#1020412 ).\n- bpf: fix references to free_bpf_prog_info() in comments (bnc#1012382).\n- brcmfmac: Add support for bcm43364 wireless chipset (bnc#1012382).\n- brcmfmac: stop watchdog before detach and free everything (bnc#1012382).\n- bridge: Propagate vlan add failure to user (bnc#1012382).\n- btrfs: Do not remove block group still has pinned down bytes (bsc#1086457).\n- btrfs: add barriers to btrfs_sync_log before log_commit_wait wakeups (bnc#1012382).\n- btrfs: do not leak ret from do_chunk_alloc (bnc#1012382).\n- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bnc#1012382).\n- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf.\n- btrfs: round down size diff when shrinking/growing device (bsc#1097105).\n- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bnc#1012382).\n- can: mpc5xxx_can: check of_iomap return before use (bnc#1012382).\n- can: xilinx_can: fix RX loop if RXNEMP is asserted without RXOK (bnc#1012382).\n- can: xilinx_can: fix RX overflow interrupt not being enabled (bnc#1012382).\n- can: xilinx_can: fix device dropping off bus on RX overrun (bnc#1012382).\n- can: xilinx_can: fix incorrect clear of non-processed interrupts (bnc#1012382).\n- can: xilinx_can: fix recovery from error states not being propagated (bnc#1012382).\n- can: xilinx_can: keep only 1-2 frames in TX FIFO to fix TX accounting (bnc#1012382).\n- cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status (bnc#1012382).\n- ceph: fix incorrect use of strncpy (bsc#1107319).\n- ceph: return errors from posix_acl_equiv_mode() correctly (bsc#1107320).\n- cifs: Fix stack out-of-bounds in smb{2,3}_create_lease_buf() (bsc#1012382).\n- cifs: add missing debug entries for kconfig options (bnc#1012382).\n- cifs: check kmalloc before use (bsc#1012382).\n- cifs: store the leaseKey in the fid on SMB2_open (bsc#1012382).\n- clk: tegra: Fix PLL_U post divider and initial rate on Tegra30 (bnc#1012382).\n- crypto: ablkcipher - fix crash flushing dcache in error path (bnc#1012382).\n- crypto: authenc - do not leak pointers to authenc keys (bnc#1012382).\n- crypto: authencesn - do not leak pointers to authenc keys (bnc#1012382).\n- crypto: blkcipher - fix crash flushing dcache in error path (bnc#1012382).\n- crypto: padlock-aes - Fix Nano workaround data corruption (bnc#1012382).\n- crypto: vmac - require a block cipher with 128-bit block size (bnc#1012382).\n- crypto: vmac - separate tfm and request context (bnc#1012382).\n- crypto: vmx - Fix sleep-in-atomic bugs (bsc#1048317).\n- cxgb4: when disabling dcb set txq dcb priority to 0 (bnc#1012382).\n- cxl: Fix wrong comparison in cxl_adapter_context_get() (bsc#1055014).\n- dccp: fix undefined behavior with 'cwnd' shift in ccid2_cwnd_restart() (bnc#1012382).\n- disable loading f2fs module on PAGE_SIZE > 4KB (bnc#1012382).\n- dm cache metadata: save in-core policy_hint_size to on-disk superblock (bnc#1012382).\n- dma-iommu: Fix compilation when !CONFIG_IOMMU_DMA (bnc#1012382).\n- dmaengine: k3dma: Off by one in k3_of_dma_simple_xlate() (bnc#1012382).\n- dmaengine: pxa_dma: remove duplicate const qualifier (bnc#1012382).\n- driver core: Partially revert 'driver core: correct device's shutdown order' (bnc#1012382).\n- drivers: net: lmc: fix case value for target abort error (bnc#1012382).\n- drm/armada: fix colorkey mode property (bnc#1012382).\n- drm/atmel-hlcdc: check stride values in the first plane (bsc#1106929).\n- drm/atomic: Handling the case when setting old crtc for plane (bnc#1012382).\n- drm/bridge: adv7511: Reset registers on hotplug (bnc#1012382).\n- drm/cirrus: Use drm_framebuffer_put to avoid kernel oops in clean-up (bsc#1101822).\n- drm/drivers: add support for using the arch wc mapping API.\n- drm/exynos/dsi: mask frame-done interrupt (bsc#1106929).\n- drm/exynos: decon5433: Fix WINCONx reset value (bnc#1012382).\n- drm/exynos: decon5433: Fix per-plane global alpha for XRGB modes (bnc#1012382).\n- drm/exynos: gsc: Fix support for NV16/61, YUV420/YVU420 and YUV422 modes (bnc#1012382).\n- drm/gma500: fix psb_intel_lvds_mode_valid()'s return type (bnc#1012382).\n- drm/i915/userptr: reject zero user_size (bsc#1090888).\n- drm/i915: Correctly handle limited range YCbCr data on VLV/CHV (bsc#1087092).\n- drm/imx: fix typo in ipu_plane_formats (bsc#1106929).\n- drm/imx: imx-ldb: check if channel is enabled before printing warning (bnc#1012382).\n- drm/imx: imx-ldb: disable LDB on driver bind (bnc#1012382).\n- drm/msm/hdmi: Use bitwise operators when building register values (bsc#1106929).\n- drm/nouveau/gem: off by one bugs in nouveau_gem_pushbuf_reloc_apply() (bnc#1012382).\n- drm/panel: type promotion bug in s6e8aa0_read_mtp_id() (bsc#1105769).\n- drm/radeon: fix mode_valid's return type (bnc#1012382).\n- drm: Add DP PSR2 sink enable bit (bnc#1012382).\n- drm: Reject getfb for multi-plane framebuffers (bsc#1106929).\n- enic: do not call enic_change_mtu in enic_probe\n- enic: handle mtu change for vf properly (bnc#1012382).\n- enic: initialize enic->rfs_h.lock in enic_probe (bnc#1012382).\n- esp6: fix memleak on error path in esp6_input\n- ext4: check for NUL characters in extended attribute's name (bnc#1012382).\n- ext4: check for allocation block validity with block group locked (bsc#1104495).\n- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).\n- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).\n- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).\n- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).\n- ext4: fix inline data updates with checksums enabled (bsc#1104494).\n- ext4: fix spectre gadget in ext4_mb_regular_allocator() (bnc#1012382).\n- ext4: reset error code in ext4_find_entry in fallback (bnc#1012382).\n- ext4: sysfs: print ext4_super_block fields as little-endian (bsc#1106229).\n- f2fs: fix to do not trigger writeback during recovery (bnc#1012382).\n- fat: fix memory allocation failure handling of match_strdup() (bnc#1012382).\n- fb: fix lost console when the user unplugs a USB adapter (bnc#1012382).\n- fbdev: omapfb: off by one in omapfb_register_client() (bsc#1106929).\n- fix __legitimize_mnt()/mntput() race (bnc#1012382).\n- fix mntput/mntput race (bnc#1012382).\n- fork: unconditionally clear stack on fork (bnc#1012382).\n- fs/9p/xattr.c: catch the error of p9_client_clunk when setting xattr failed (bnc#1012382).\n- fs/dax.c: fix inefficiency in dax_writeback_mapping_range() (bsc#1106185).\n- fs/quota: Fix spectre gadget in do_quotactl (bnc#1012382).\n- fs: aio: fix the increment of aio-nr and counting against aio-max-nr (bsc#1068075, bsc#1078921).\n- fuse: Add missed unlock_page() to fuse_readpages_fill() (bnc#1012382).\n- fuse: Do not access pipe->buffers without pipe_lock() (bnc#1012382).\n- fuse: Fix oops at process_init_reply() (bnc#1012382).\n- fuse: fix double request_end() (bnc#1012382).\n- fuse: fix unlocked access to processing queue (bnc#1012382).\n- fuse: umount should wait for all requests (bnc#1012382).\n- genirq/proc: Return proper error code when irq_set_affinity() fails (bnc#1105392).\n- getxattr: use correct xattr length (bnc#1012382).\n- hfsplus: Do not clear SGID when inheriting ACLs (bsc#1030552).\n- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bnc#1012382).\n- hwrng: exynos - Disable runtime PM on driver unbind.\n- i2c: davinci: Avoid zero value of CLKH (bnc#1012382).\n- i2c: imx: Fix race condition in dma read (bnc#1012382).\n- i2c: imx: Fix reinit_completion() use (bnc#1012382).\n- i2c: ismt: fix wrong device address when unmap the data buffer (bnc#1012382).\n- i40e: use cpumask_copy instead of direct assignment (bsc#1053685).\n- i40iw: Fix memory leak in error path of create QP (bsc#969476 bsc#969477).\n- i40iw: Use correct address in dst_neigh_lookup for IPv6 (bsc#969476 bsc#969477).\n- ibmvnic: Include missing return code checks in reset function (bnc#1107966).\n- ieee802154: at86rf230: switch from BUG_ON() to WARN_ON() on problem (bnc#1012382).\n- ieee802154: at86rf230: use __func__ macro for debug messages (bnc#1012382).\n- ieee802154: fakelb: switch from BUG_ON() to WARN_ON() on problem (bnc#1012382).\n- igb: Fix not adding filter elements to the list (bsc#1024361 bsc#1024365).\n- iio: ad9523: Fix displayed phase (bnc#1012382).\n- iio: ad9523: Fix return value for ad952x_store() (bnc#1012382).\n- inet: frag: enforce memory limits earlier (bnc#1012382 bsc#970506).\n- iommu/amd: make sure TLB to be flushed before IOVA freed (bsc#1106105).\n- iommu/vt-d: Add definitions for PFSID (bnc#1012382).\n- iommu/vt-d: Fix dev iotlb pfsid use (bnc#1012382).\n- iommu/vt-d: Ratelimit each dmar fault printing (bsc#1106105).\n- ioremap: Update pgtable free interfaces with addr (bnc#1012382).\n- ip: hash fragments consistently (bnc#1012382).\n- ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull (bnc#1012382).\n- ipconfig: Correctly initialise ic_nameservers (bnc#1012382).\n- ipv4+ipv6: Make INET*_ESP select CRYPTO_ECHAINIV (bnc#1012382).\n- ipv4: Return EINVAL when ping_group_range sysctl does not map to user ns (bnc#1012382).\n- ipv4: remove BUG_ON() from fib_compute_spec_dst (bnc#1012382).\n- ipv6: fix useless rol32 call on hash (bnc#1012382).\n- ipv6: mcast: fix unsolicited report interval after receiving querys (bnc#1012382).\n- ipvlan: use ETH_MAX_MTU as max mtu (bsc#1033962).\n- iscsi target: fix session creation failure handling (bnc#1012382).\n- isdn: Disable IIOCDBGVAR (bnc#1012382).\n- iw_cxgb4: remove duplicate memcpy() in c4iw_create_listen() (bsc#969476 bsc#969477).\n- iwlwifi: pcie: fix race in Rx buffer allocator (bnc#1012382).\n- ixgbe: Be more careful when modifying MAC filters (bnc#1012382).\n- jfs: Do not clear SGID when inheriting ACLs (bsc#1030552).\n- jump_label: Add RELEASE barrier after text changes (bsc#1105271).\n- jump_label: Fix concurrent static_key_enable/disable() (bsc#1105271).\n- jump_label: Move CPU hotplug locking (bsc#1105271).\n- jump_label: Provide hotplug context variants (bsc#1105271).\n- jump_label: Reduce the size of struct static_key (bsc#1105271).\n- jump_label: Reorder hotplug lock and jump_label_lock (bsc#1105271).\n- jump_label: Split out code under the hotplug lock (bsc#1105271).\n- jump_label: remove bug.h, atomic.h dependencies for HAVE_JUMP_LABEL (bsc#1105271).\n- kABI: protect enum tcp_ca_event (kabi).\n- kABI: reexport tcp_send_ack (kabi).\n- kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)\n- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).\n- kasan: do not emit builtin calls when sanitization is off (bnc#1012382).\n- kasan: fix shadow_size calculation error in kasan_module_alloc (bnc#1012382).\n- kbuild: verify that $DEPMOD is installed (bnc#1012382).\n- kernel: improve spectre mitigation (bnc#1106934, LTC#171029).\n- kprobes/x86: Fix %p uses in error messages (bnc#1012382).\n- kprobes: Make list and blacklist root user read only (bnc#1012382).\n- kthread, tracing: Do not expose half-written comm when creating kthreads (bsc#1104897).\n- kvm: x86: vmx: fix vpid leak (bnc#1012382).\n- l2tp: use sk_dst_check() to avoid race on sk->sk_dst_cache (bnc#1012382).\n- lib/rhashtable: consider param->min_size when setting initial table size (bnc#1012382).\n- libata: Fix command retry decision (bnc#1012382).\n- libceph: check authorizer reply/challenge length before reading (bsc#1096748).\n- libceph: factor out __ceph_x_decrypt() (bsc#1096748).\n- libceph: factor out __prepare_write_connect() (bsc#1096748).\n- libceph: factor out encrypt_authorizer() (bsc#1096748).\n- libceph: store ceph_auth_handshake pointer in ceph_connection (bsc#1096748).\n- libceph: weaken sizeof check in ceph_x_verify_authorizer_reply() (bsc#1096748).\n- llc: use refcount_inc_not_zero() for llc_sap_find() (bnc#1012382).\n- locking/lockdep: Do not record IRQ state within lockdep code (bnc#1012382).\n- locks: pass inode pointer to locks_free_lock_context (bsc@1099832).\n- locks: prink more detail when there are leaked locks (bsc#1099832).\n- locks: restore a warn for leaked locks on close (bsc#1099832).\n- m68k: fix 'bad page state' oops on ColdFire boot (bnc#1012382).\n- mac80211: add stations tied to AP_VLANs during hw reconfig (bnc#1012382).\n- md/raid10: fix that replacement cannot complete recovery after reassemble (bnc#1012382).\n- md: fix NULL dereference of mddev->pers in remove_and_add_spares() (bnc#1012382).\n- media: omap3isp: fix unbalanced dma_iommu_mapping (bnc#1012382).\n- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bnc#1012382).\n- media: rtl28xxu: be sure that it won't go past the array size (bsc#1050431).\n- media: s5p-jpeg: fix number of components macro (bsc#1050431).\n- media: saa7164: Fix driver name in debug output (bnc#1012382).\n- media: si470x: fix __be16 annotations (bnc#1012382).\n- media: siano: get rid of __le32/__le16 cast warnings (bnc#1012382).\n- media: staging: omap4iss: Include asm/cacheflush.h after generic includes (bnc#1012382).\n- media: videobuf2-core: do not call memop 'finish' when queueing (bnc#1012382).\n- memory: tegra: Apply interrupts mask per SoC (bnc#1012382).\n- memory: tegra: Do not handle spurious interrupts (bnc#1012382).\n- mfd: cros_ec: Fail early if we cannot identify the EC (bnc#1012382).\n- microblaze: Fix simpleImage format generation (bnc#1012382).\n- mm/hugetlb: filter out hugetlb pages if HUGEPAGE migration is not supported (bnc#1106697).\n- mm/memory.c: check return value of ioremap_prot (bnc#1012382).\n- mm/slub.c: add __printf verification to slab_err() (bnc#1012382).\n- mm/tlb: Remove tlb_remove_table() non-concurrent condition (bnc#1012382).\n- mm: Add vm_insert_pfn_prot() (bnc#1012382).\n- mm: fix cache mode tracking in vm_insert_mixed() (bnc#1012382).\n- mm: memcg: fix use after free in mem_cgroup_iter() (bnc#1012382).\n- mm: vmalloc: avoid racy handling of debugobjects in vunmap (bnc#1012382).\n- mm: x86: move _PAGE_SWP_SOFT_DIRTY from bit 7 to bit 1 (bnc#1012382).\n- mtd: rawnand: fsl_ifc: fix FSL NAND driver to read all ONFI parameter pages (bnc#1012382).\n- mtd: ubi: wl: Fix error return code in ubi_wl_init().\n- mwifiex: correct histogram data with appropriate index (bnc#1012382).\n- mwifiex: handle race during mwifiex_usb_disconnect (bnc#1012382).\n- net/9p/client.c: version pointer uninitialized (bnc#1012382).\n- net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree() (bnc#1012382).\n- net/ethernet/freescale/fman: fix cross-build error (bnc#1012382).\n- net/ipv4: Set oif in fib_compute_spec_dst (bnc#1012382).\n- net/mlx4_core: Save the qpn from the input modifier in RST2INIT wrapper (bnc#1012382).\n- net/mlx5: Add missing SET_DRIVER_VERSION command translation (bsc#1015342 bsc#1015343).\n- net/mlx5: E-Switch, Include VF RDMA stats in vport statistics (bsc#966170 bsc#966172).\n- net/mlx5: Eswitch, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1015342 bsc#1015343).\n- net/mlx5: Fix wrong size allocation for QoS ETC TC regitster (bsc#966170 bsc#966172).\n- net/mlx5: Vport, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#966170 bsc#966172).\n- net/mlx5e: Do not allow aRFS for encapsulated packets (bsc#1015342 bsc#1015343).\n- net/mlx5e: Err if asked to offload TC match on frag being first (bsc#1015342 bsc#1015343).\n- net/mlx5e: Fix quota counting in aRFS expire flow (bsc#1015342 bsc#1015343).\n- net/mlx5e: Refine ets validation function (bsc#966170 bsc#966172).\n- net: 6lowpan: fix reserved space for single frames (bnc#1012382).\n- net: Do not copy pfmemalloc flag in __copy_skb_header() (bnc#1012382).\n- net: add skb_condense() helper (bsc#1089066).\n- net: adjust skb->truesize in ___pskb_trim() (bsc#1089066).\n- net: adjust skb->truesize in pskb_expand_head() (bsc#1089066).\n- net: axienet: Fix double deregister of mdio (bnc#1012382).\n- net: caif: Add a missing rcu_read_unlock() in caif_flow_cb (bnc#1012382).\n- net: davinci_emac: match the mdio device against its compatible if possible (bnc#1012382).\n- net: dsa: Do not suspend/resume closed slave_dev (bnc#1012382).\n- net: ena: Fix use of uninitialized DMA address bits field (bsc#1027968).\n- net: fix amd-xgbe flow-control issue (bnc#1012382).\n- net: hamradio: use eth_broadcast_addr (bnc#1012382).\n- net: lan78xx: Fix misplaced tasklet_schedule() call (bnc#1012382).\n- net: lan78xx: fix rx handling before first packet is send (bnc#1012382).\n- net: mac802154: tx: expand tailroom if necessary (bnc#1012382).\n- net: phy: fix flag masking in __set_phy_supported (bnc#1012382).\n- net: prevent ISA drivers from building on PPC32 (bnc#1012382).\n- net: propagate dev_get_valid_name return code (bnc#1012382).\n- net: qca_spi: Avoid packet drop during initial sync (bnc#1012382).\n- net: qca_spi: Fix log level if probe fails (bnc#1012382).\n- net: qca_spi: Make sure the QCA7000 reset is triggered (bnc#1012382).\n- net: socket: fix potential spectre v1 gadget in socketcall (bnc#1012382).\n- net: usb: rtl8150: demote allmulti message to dev_dbg() (bnc#1012382).\n- net: vmxnet3: use new api ethtool_{get|set}_link_ksettings (bsc#1091860 bsc#1098253).\n- net_sched: Fix missing res info when create new tc_index filter (bnc#1012382).\n- net_sched: fix NULL pointer dereference when delete tcindex filter (bnc#1012382).\n- netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state (bnc#1012382).\n- netfilter: ipset: List timing out entries with 'timeout 1' instead of zero (bnc#1012382).\n- netfilter: ipv6: nf_defrag: reduce struct net memory waste (bnc#1012382).\n- netfilter: ipvs: do not create conn for ABORT packet in sctp_conn_schedule (bsc#1102797).\n- netfilter: ipvs: fix the issue that sctp_conn_schedule drops non-INIT packet (bsc#1102797).\n- netfilter: x_tables: set module owner for icmp(6) matches (bnc#1012382).\n- netlink: Do not shift on 64 for ngroups (bnc#1012382).\n- netlink: Do not shift with UB on nlk->ngroups (bnc#1012382).\n- netlink: Do not subscribe to non-existent groups (bnc#1012382).\n- netlink: Fix spectre v1 gadget in netlink_create() (bnc#1012382).\n- netlink: do not enter direct reclaim from netlink_trim() (bsc#1042286).\n- nfsd: fix potential use-after-free in nfsd4_decode_getdeviceinfo (bnc#1012382).\n- nl80211: Add a missing break in parse_station_flags (bnc#1012382).\n- nohz: Fix local_timer_softirq_pending() (bnc#1012382).\n- nvme-fc: release io queues to allow fast fail (bsc#1102486).\n- nvme: if_ready checks to fail io to deleting controller (bsc#1102486).\n- nvme: kABI-compliant version of nvmf_fail_nonready_command() (bsc#1102486).\n- nvmet-fc: fix target sgl list on large transfers (bsc#1102486).\n- osf_getdomainname(): use copy_to_user() (bnc#1012382).\n- ovl: Do d_type check only if work dir creation was successful (bnc#1012382).\n- ovl: Ensure upper filesystem supports d_type (bnc#1012382).\n- ovl: warn instead of error if d_type is not supported (bnc#1012382).\n- packet: refine ring v3 block size test to hold one frame (bnc#1012382).\n- packet: reset network header if packet shorter than ll reserved space (bnc#1012382).\n- parisc: Define mb() and add memory barriers to assembler unlock sequences (bnc#1012382).\n- parisc: Enable CONFIG_MLONGCALLS by default (bnc#1012382).\n- parisc: Remove ordered stores from syscall.S (bnc#1012382).\n- parisc: Remove unnecessary barriers from spinlock.h (bnc#1012382).\n- perf auxtrace: Fix queue resize (bnc#1012382).\n- perf llvm-utils: Remove bashism from kernel include fetch script (bnc#1012382).\n- perf report powerpc: Fix crash if callchain is empty (bnc#1012382).\n- perf test session topology: Fix test on s390 (bnc#1012382).\n- perf/x86/intel/uncore: Correct fixed counter index check for NHM (bnc#1012382).\n- perf/x86/intel/uncore: Correct fixed counter index check in generic code (bnc#1012382).\n- perf: fix invalid bit in diagnostic entry (bnc#1012382).\n- pinctrl: at91-pio4: add missing of_node_put (bnc#1012382).\n- pinctrl: freescale: off by one in imx1_pinconf_group_dbg_show() (bnc#1012382).\n- pnfs/blocklayout: off by one in bl_map_stripe() (bnc#1012382).\n- powerpc/32: Add a missing include header (bnc#1012382).\n- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032).\n- powerpc/64s: Fix compiler store ordering to SLB shadow area (bnc#1012382).\n- powerpc/8xx: fix invalid register expression in head_8xx.S (bnc#1012382).\n- powerpc/chrp/time: Make some functions static, add missing header include (bnc#1012382).\n- powerpc/embedded6xx/hlwd-pic: Prevent interrupts from being handled by Starlet (bnc#1012382).\n- powerpc/fadump: handle crash memory ranges array index overflow (bsc#1103269).\n- powerpc/fadump: merge adjacent memory ranges to reduce PT_LOAD segements (bsc#1103269).\n- powerpc/lib: Fix the feature fixup tests to actually work (bsc#1066223).\n- powerpc/powermac: Add missing prototype for note_bootable_part() (bnc#1012382).\n- powerpc/powermac: Mark variable x as unused (bnc#1012382).\n- powerpc/pseries: Fix endianness while restoring of r3 in MCE handler (bnc#1012382).\n- powerpc/topology: Get topology for shared processors at boot (bsc#1104683).\n- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157).\n- powerpc: Avoid code patching freed init sections (bnc#1107735).\n- powerpc: make feature-fixup tests fortify-safe (bsc#1066223).\n- provide special timeout module parameters for EC2 (bsc#1065364).\n- ptp: fix missing break in switch (bnc#1012382).\n- pwm: tiehrpwm: Fix disabling of output of PWMs (bnc#1012382).\n- qed: Add sanity check for SIMD fastpath handler (bnc#1012382).\n- qed: Correct Multicast API to reflect existence of 256 approximate buckets (bsc#1019695 bsc#1019699 bsc#1022604).\n- qed: Do not advertise DCBX_LLD_MANAGED capability (bsc#1019695 bsc#1019699 bsc#1022604).\n- qed: Fix possible memory leak in Rx error path handling (bsc#1019695 bsc#1019699 bsc#1022604 ).\n- qed: Fix possible race for the link state value (bnc#1012382).\n- qed: Fix setting of incorrect eswitch mode (bsc#1019695 bsc#1019699 bsc#1022604).\n- qed: Fix use of incorrect size in memcpy call (bsc#1019695 bsc#1019699 bsc#1022604).\n- qede: Adverstise software timestamp caps when PHC is not available (bsc#1019695 bsc#1019699 bsc#1022604).\n- qlge: Fix netdev features configuration (bsc#1098822).\n- qlogic: check kstrtoul() for errors (bnc#1012382).\n- random: mix rdrand with entropy sent in from userspace (bnc#1012382).\n- readahead: stricter check for bdi io_pages (VM Functionality).\n- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bnc#1012382).\n- reiserfs: fix broken xattr handling (heap corruption, bad retval) (bnc#1012382).\n- ring_buffer: tracing: Inherit the tracing setting to next ring buffer (bnc#1012382).\n- root dentries need RCU-delayed freeing (bnc#1012382).\n- rsi: Fix 'invalid vdd' warning in mmc (bnc#1012382).\n- rtc: ensure rtc_set_alarm fails when alarms are not supported (bnc#1012382).\n- rtnetlink: add rtnl_link_state check in rtnl_configure_link (bnc#1012382).\n- s390/cpum_sf: Add data entry sizes to sampling trailer entry (bnc#1012382).\n- s390/kvm: fix deadlock when killed by oom (bnc#1012382).\n- s390/lib: use expoline for all bcr instructions (bnc#1106934, LTC#171029).\n- s390/pci: fix out of bounds access during irq setup (bnc#1012382).\n- s390/qdio: reset old sbal_state flags (bnc#1012382).\n- s390/qeth: do not clobber buffer on async TX completion (bnc#1104485, LTC#170349).\n- s390/qeth: fix race when setting MAC address (bnc#1104485, LTC#170726).\n- s390: add explicit <linux/stringify.h> for jump label (bsc#1105271).\n- s390: detect etoken facility (bnc#1106934, LTC#171029).\n- s390: fix br_r1_trampoline for machines without exrl (bnc#1012382 bnc#1106934 LTC#171029).\n- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).\n- scripts/tar-up.sh: Do not package gitlog-excludes file Also fix the evaluation of gitlog-excludes file, too\n- scsi: 3w-xxxx: fix a missing-check bug (bnc#1012382).\n- scsi: core: Avoid that SCSI device removal through sysfs triggers a deadlock (bnc#1012382).\n- scsi: fcoe: drop frames in ELS LOGO error path (bnc#1012382).\n- scsi: hpsa: limit transfer length to 1MB, not 512kB (bsc#1102346).\n- scsi: libiscsi: fix possible NULL pointer dereference in case of TMF (bnc#1012382).\n- scsi: megaraid: silence a static checker bug (bnc#1012382).\n- scsi: megaraid_sas: Increase timeout by 1 sec for non-RAID fastpath IOs (bnc#1012382).\n- scsi: qla2xxx: Fix ISP recovery on unload (bnc#1012382).\n- scsi: qla2xxx: Return error when TMF returns (bnc#1012382).\n- scsi: scsi_dh: replace too broad 'TP9' string with the exact models (bnc#1012382).\n- scsi: sr: Avoid that opening a CD-ROM hangs with runtime power management enabled (bnc#1012382).\n- scsi: sysfs: Introduce sysfs_{un,}break_active_protection() (bnc#1012382).\n- scsi: ufs: fix exception event handling (bnc#1012382).\n- scsi: vmw_pvscsi: Return DID_RESET for status SAM_STAT_COMMAND_TERMINATED (bnc#1012382).\n- scsi: xen-scsifront: add error handling for xenbus_printf (bnc#1012382).\n- scsi_debug: call resp_XXX function after setting host_scribble (bsc#1069138).\n- scsi_debug: reset injection flags for every_nth > 0 (bsc#1069138).\n- selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC (bnc#1012382).\n- selftest/seccomp: Fix the seccomp(2) signature (bnc#1012382).\n- selftests/ftrace: Add snapshot and tracing_on test case (bnc#1012382).\n- selftests/x86/sigreturn/64: Fix spurious failures on AMD CPUs (bnc#1012382).\n- selftests: pstore: return Kselftest Skip code for skipped tests (bnc#1012382).\n- selftests: static_keys: return Kselftest Skip code for skipped tests (bnc#1012382).\n- selftests: sync: add config fragment for testing sync framework (bnc#1012382).\n- selftests: user: return Kselftest Skip code for skipped tests (bnc#1012382).\n- selftests: zram: return Kselftest Skip code for skipped tests (bnc#1012382).\n- serial: 8250_dw: always set baud rate in dw8250_set_termios (bnc#1012382).\n- sfc: stop the TX queue before pushing new buffers (bsc#1017967 ).\n- skbuff: Unconditionally copy pfmemalloc in __skb_clone() (bnc#1012382).\n- slab: __GFP_ZERO is incompatible with a constructor (bnc#1107060).\n- smb3: Do not send SMB3 SET_INFO if nothing changed (bnc#1012382).\n- smb3: do not request leases in symlink creation and query (bnc#1012382).\n- spi: davinci: fix a NULL pointer dereference (bnc#1012382).\n- squashfs: be more careful about metadata corruption (bnc#1012382).\n- squashfs: more metadata hardening (bnc#1012382).\n- squashfs: more metadata hardenings (bnc#1012382).\n- staging: android: ion: check for kref overflow (bnc#1012382).\n- string: drop __must_check from strscpy() and restore strscpy() usages in cgroup (bsc#1107319).\n- sys: do not hold uts_sem while accessing userspace memory (bnc#1106995).\n- target_core_rbd: use RCU in free_device (bsc#1105524).\n- tcp: Fix missing range_truesize enlargement in the backport (bnc#1012382).\n- tcp: add max_quickacks param to tcp_incr_quickack and tcp_enter_quickack_mode (bnc#1012382).\n- tcp: add one more quick ack after after ECN events (bnc#1012382).\n- tcp: do not aggressively quick ack after ECN events (bnc#1012382).\n- tcp: do not cancel delay-AcK on DCTCP special ACK (bnc#1012382).\n- tcp: do not delay ACK in DCTCP upon CE status change (bnc#1012382).\n- tcp: do not force quickack when receiving out-of-order packets (bnc#1012382).\n- tcp: fix dctcp delayed ACK schedule (bnc#1012382).\n- tcp: helpers to send special DCTCP ack (bnc#1012382).\n- tcp: identify cryptic messages as TCP seq # bugs (bnc#1012382).\n- tcp: refactor tcp_ecn_check_ce to remove sk type cast (bnc#1012382).\n- tcp: remove DELAYED ACK events in DCTCP (bnc#1012382).\n- tg3: Add higher cpu clock for 5762 (bnc#1012382).\n- thermal: exynos: fix setting rising_threshold for Exynos5433 (bnc#1012382).\n- timekeeping: Eliminate the stale declaration of ktime_get_raw_and_real_ts64() (bsc#969470).\n- tools/power turbostat: Read extended processor family from CPUID (bnc#1012382).\n- tools/power turbostat: fix -S on UP systems (bnc#1012382).\n- tools: usb: ffs-test: Fix build on big endian systems (bnc#1012382).\n- tpm: fix race condition in tpm_common_write() (bnc#1012382).\n- tracing/blktrace: Fix to allow setting same value (bnc#1012382).\n- tracing/kprobes: Fix trace_probe flags on enable_trace_kprobe() failure (bnc#1012382).\n- tracing: Do not call start/stop() functions when tracing_on does not change (bnc#1012382).\n- tracing: Fix double free of event_trigger_data (bnc#1012382).\n- tracing: Fix possible double free in event_enable_trigger_func() (bnc#1012382).\n- tracing: Quiet gcc warning about maybe unused link variable (bnc#1012382).\n- tracing: Use __printf markup to silence compiler (bnc#1012382).\n- tty: Fix data race in tty_insert_flip_string_fixed_flag (bnc#1012382).\n- turn off -Wattribute-alias (bnc#1012382).\n- ubi: Be more paranoid while seaching for the most recent Fastmap (bnc#1012382).\n- ubi: Fix Fastmap's update_vol() (bnc#1012382).\n- ubi: Fix races around ubi_refill_pools() (bnc#1012382).\n- ubi: Introduce vol_ignored() (bnc#1012382).\n- ubi: Rework Fastmap attach base code (bnc#1012382).\n- ubi: fastmap: Erase outdated anchor PEBs during attach (bnc#1012382).\n- ubifs: Check data node size before truncate (bsc#1106276).\n- ubifs: Fix memory leak in lprobs self-check (bsc#1106278).\n- ubifs: Fix synced_i_size calculation for xattr inodes (bsc#1106275).\n- ubifs: xattr: Do not operate on deleted inodes (bsc#1106271).\n- udl-kms: change down_interruptible to down (bnc#1012382).\n- udl-kms: fix crash due to uninitialized memory (bnc#1012382).\n- udl-kms: handle allocation failure (bnc#1012382).\n- udlfb: set optimal write delay (bnc#1012382).\n- uprobes: Use synchronize_rcu() not synchronize_sched() (bnc#1012382).\n- usb/phy: fix PPC64 build errors in phy-fsl-usb.c (bnc#1012382).\n- usb: audio-v2: Correct the comment for struct uac_clock_selector_descriptor (bsc#1099810).\n- usb: cdc_acm: Add quirk for Castles VEGA3000 (bnc#1012382).\n- usb: dwc2: debugfs: Do not touch RX FIFO during register dump (bsc#1100132).\n- usb: dwc2: fix isoc split in transfer with no data (bnc#1012382).\n- usb: gadget: composite: fix delayed_status race condition when set_interface (bnc#1012382).\n- usb: gadget: dwc2: fix memory leak in gadget_init() (bnc#1012382).\n- usb: gadget: f_fs: Only return delayed status when len is 0 (bnc#1012382).\n- usb: gadget: f_uac2: fix endianness of 'struct cntrl_*_lay3' (bnc#1012382).\n- usb: gadget: r8a66597: Fix a possible sleep-in-atomic-context bugs in r8a66597_queue() (bnc#1012382).\n- usb: gadget: r8a66597: Fix two possible sleep-in-atomic-context bugs in init_controller() (bnc#1012382).\n- usb: hub: Do not wait for connect state at resume for powered-off ports (bnc#1012382).\n- usb: renesas_usbhs: gadget: fix spin_lock_init() for &uep->lock (bsc#1085536).\n- usb: xhci: increase CRS timeout value (bnc#1012382).\n- usbip: usbip_detach: Fix memory, udev context and udev leak (bnc#1012382).\n- userns: move user access out of the mutex (bnc#1012382).\n- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).\n- virtio_balloon: fix another race between migration and ballooning (bnc#1012382).\n- vmw_balloon: VMCI_DOORBELL_SET does not check status (bnc#1012382).\n- vmw_balloon: do not use 2MB without batching (bnc#1012382).\n- vmw_balloon: fix VMCI use when balloon built into kernel (bnc#1012382).\n- vmw_balloon: fix inflation of 64-bit GFNs (bnc#1012382).\n- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1091860 bsc#1098253).\n- vmxnet3: add receive data ring support (bsc#1091860 bsc#1098253).\n- vmxnet3: add support for get_coalesce, set_coalesce ethtool operations (bsc#1091860 bsc#1098253).\n- vmxnet3: allow variable length transmit data ring buffer (bsc#1091860 bsc#1098253).\n- vmxnet3: avoid assumption about invalid dma_pa in vmxnet3_set_mc() (bsc#1091860 bsc#1098253).\n- vmxnet3: avoid format strint overflow warning (bsc#1091860 bsc#1098253).\n- vmxnet3: avoid xmit reset due to a race in vmxnet3 (bsc#1091860 bsc#1098253).\n- vmxnet3: fix incorrect dereference when rxvlan is disabled (bsc#1091860 bsc#1098253).\n- vmxnet3: fix non static symbol warning (bsc#1091860 bsc#1098253).\n- vmxnet3: fix tx data ring copy for variable size (bsc#1091860 bsc#1098253).\n- vmxnet3: increase default rx ring sizes (bsc#1091860 bsc#1098253).\n- vmxnet3: introduce command to register memory region (bsc#1091860 bsc#1098253).\n- vmxnet3: introduce generalized command interface to configure the device (bsc#1091860 bsc#1098253).\n- vmxnet3: prepare for version 3 changes (bsc#1091860 bsc#1098253).\n- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1091860 bsc#1098253).\n- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1091860 bsc#1098253).\n- vmxnet3: set the DMA mask before the first DMA map operation (bsc#1091860 bsc#1098253).\n- vmxnet3: update to version 3 (bsc#1091860 bsc#1098253).\n- vmxnet3: use DMA memory barriers where required (bsc#1091860 bsc#1098253).\n- vmxnet3: use correct flag to indicate LRO feature (bsc#1091860 bsc#1098253).\n- vsock: split dwork to avoid reinitializations (bnc#1012382).\n- vti6: Fix dev->max_mtu setting (bsc#1033962).\n- vti6: fix PMTU caching and reporting on xmit (bnc#1012382).\n- wlcore: sdio: check for valid platform device data before suspend (bnc#1012382).\n- x86/MCE: Remove min interval polling limitation (bnc#1012382).\n- x86/amd: do not set X86_BUG_SYSRET_SS_ATTRS when running under Xen (bnc#1012382).\n- x86/asm/entry/32: Simplify pushes of zeroed pt_regs->REGs (bnc#1012382).\n- x86/bugs: Move the l1tf function and define pr_fmt properly (bnc#1012382).\n- x86/bugs: Respect nospec command line option (bsc#1068032).\n- x86/cpu/AMD: Fix erratum 1076 (CPB bit) (bnc#1012382).\n- x86/cpu: Make alternative_msr_write work for 32-bit code (bnc#1012382).\n- x86/cpu: Re-apply forced caps every time CPU caps are re-read (bnc#1012382).\n- x86/cpufeatures: Add CPUID_7_EDX CPUID leaf (bnc#1012382).\n- x86/cpufeatures: Clean up Spectre v2 related CPUID flags (bnc#1012382).\n- x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface (bnc#1012382).\n- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).\n- x86/init: fix build with CONFIG_SWAP=n (bnc#1012382).\n- x86/irqflags: Mark native_restore_fl extern inline (bnc#1012382).\n- x86/irqflags: Provide a declaration for native_save_fl.\n- x86/mm/kmmio: Make the tracer robust against L1TF (bnc#1012382).\n- x86/mm/pat: Fix L1TF stable backport for CPA (bnc#1012382).\n- x86/mm/pat: Fix L1TF stable backport for CPA, 2nd call (bnc#1012382).\n- x86/mm/pat: Make set_memory_np() L1TF safe (bnc#1012382).\n- x86/mm: Add TLB purge to free pmd/pte page interfaces (bnc#1012382).\n- x86/mm: Disable ioremap free page handling on x86-PAE (bnc#1012382).\n- x86/mm: Give each mm TLB flush generation a unique ID (bnc#1012382).\n- x86/paravirt: Fix spectre-v2 mitigations for paravirt guests (bnc#1012382).\n- x86/paravirt: Make native_save_fl() extern inline (bnc#1012382).\n- x86/process: Correct and optimize TIF_BLOCKSTEP switch (bnc#1012382).\n- x86/process: Optimize TIF checks in __switch_to_xtra() (bnc#1012382).\n- x86/process: Optimize TIF_NOTSC switch (bnc#1012382).\n- x86/process: Re-export start_thread() (bnc#1012382).\n- x86/spectre: Add missing family 6 check to microcode check (bnc#1012382).\n- x86/spectre_v2: Do not check microcode versions when running under hypervisors (bnc#1012382).\n- x86/speculation/l1tf: Exempt zeroed PTEs from inversion (bnc#1012382).\n- x86/speculation/l1tf: Extend 64bit swap file size limit (bnc#1012382).\n- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).\n- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1012382).\n- x86/speculation/l1tf: Fix up CPU feature flags (bnc#1012382).\n- x86/speculation/l1tf: Fix up pte->pfn conversion for PAE (bnc#1012382).\n- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).\n- x86/speculation/l1tf: Invert all not present mappings (bnc#1012382).\n- x86/speculation/l1tf: Make pmd/pud_mknotpresent() invert (bnc#1012382).\n- x86/speculation/l1tf: Protect PAE swap entries against L1TF (bnc#1012382).\n- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).\n- x86/speculation/l1tf: Unbreak !__HAVE_ARCH_PFN_MODIFY_ALLOWED architectures (bnc#1012382).\n- x86/speculation: Add <asm/msr-index.h> dependency (bnc#1012382).\n- x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support (bnc#1012382).\n- x86/speculation: Clean up various Spectre related details (bnc#1012382).\n- x86/speculation: Correct Speculation Control microcode blacklist again (bnc#1012382).\n- x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP (bnc#1012382).\n- x86/speculation: Update Speculation Control microcode blacklist (bnc#1012382).\n- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).\n- x86/speculation: Use IBRS if available before calling into firmware (bnc#1012382).\n- x86/speculation: Use Indirect Branch Prediction Barrier in context switch (bnc#1012382).\n- x86/xen: Add call of speculative_store_bypass_ht_init() to PV paths (bnc#1012382).\n- xen-netfront: wait xenbus state change when load module manually (bnc#1012382).\n- xen/blkback: do not keep persistent grants too long (bsc#1085042).\n- xen/blkback: move persistent grants flags to bool (bsc#1085042).\n- xen/blkfront: cleanup stale persistent grants (bsc#1085042).\n- xen/blkfront: reorder tests in xlblk_init() (bsc#1085042).\n- xen/netfront: do not cache skb_shinfo() (bnc#1012382).\n- xen: set cpu capabilities from xen_start_kernel() (bnc#1012382).\n- xfrm: fix missing dst_release() after policy blocking lbcast and multicast (bnc#1012382).\n- xfrm: free skb if nlsk pointer is NULL (bnc#1012382).\n- xfrm_user: prevent leaking 2 bytes of kernel memory (bnc#1012382).\n- xfs: Remove dead code from inode recover function (bsc#1105396).\n- xfs: repair malformed inode items during log recovery (bsc#1105396).\n- xhci: Fix perceived dead host due to runtime suspend race with event handler (bnc#1012382).\n- zswap: re-check zswap_is_full() after do zswap_shrink() (bnc#1012382).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-DESKTOP-12-SP3-2018-1941,SUSE-SLE-HA-12-SP3-2018-1941,SUSE-SLE-SDK-12-SP3-2018-1941,SUSE-SLE-SERVER-12-SP3-2018-1941,SUSE-SLE-WE-12-SP3-2018-1941", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2776-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:2776-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20182776-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:2776-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html", }, { category: "self", summary: "SUSE Bug 1012382", url: "https://bugzilla.suse.com/1012382", }, { category: "self", summary: "SUSE Bug 1015342", url: "https://bugzilla.suse.com/1015342", }, { category: "self", summary: "SUSE Bug 1015343", url: "https://bugzilla.suse.com/1015343", }, { category: "self", summary: "SUSE Bug 1017967", url: "https://bugzilla.suse.com/1017967", }, { category: "self", summary: "SUSE Bug 1019695", url: "https://bugzilla.suse.com/1019695", }, { category: "self", summary: "SUSE Bug 1019699", url: "https://bugzilla.suse.com/1019699", }, { category: "self", summary: "SUSE Bug 1020412", url: "https://bugzilla.suse.com/1020412", }, { category: "self", summary: "SUSE Bug 1021121", url: "https://bugzilla.suse.com/1021121", }, { category: "self", summary: "SUSE Bug 1022604", url: "https://bugzilla.suse.com/1022604", }, { category: "self", summary: "SUSE Bug 1024361", url: "https://bugzilla.suse.com/1024361", }, { category: "self", summary: "SUSE Bug 1024365", url: "https://bugzilla.suse.com/1024365", }, { category: "self", summary: "SUSE Bug 1024376", url: "https://bugzilla.suse.com/1024376", }, { category: "self", summary: "SUSE Bug 1027968", url: "https://bugzilla.suse.com/1027968", }, { category: "self", summary: "SUSE Bug 1030552", url: "https://bugzilla.suse.com/1030552", }, { category: "self", summary: "SUSE Bug 1031492", url: "https://bugzilla.suse.com/1031492", }, { category: "self", summary: "SUSE Bug 1033962", url: "https://bugzilla.suse.com/1033962", }, { category: "self", summary: "SUSE Bug 1042286", url: "https://bugzilla.suse.com/1042286", }, { category: "self", summary: "SUSE Bug 1048317", url: "https://bugzilla.suse.com/1048317", }, { category: "self", summary: "SUSE Bug 1050431", url: "https://bugzilla.suse.com/1050431", }, { category: "self", summary: "SUSE Bug 1053685", url: "https://bugzilla.suse.com/1053685", }, { category: "self", summary: "SUSE Bug 1055014", url: "https://bugzilla.suse.com/1055014", }, { category: "self", summary: "SUSE Bug 1056596", url: "https://bugzilla.suse.com/1056596", }, { category: "self", summary: "SUSE Bug 1062604", url: "https://bugzilla.suse.com/1062604", }, { category: "self", summary: "SUSE Bug 1063646", url: "https://bugzilla.suse.com/1063646", }, { category: "self", summary: "SUSE Bug 1064232", url: "https://bugzilla.suse.com/1064232", }, { category: "self", summary: "SUSE Bug 1065364", url: "https://bugzilla.suse.com/1065364", }, { category: "self", summary: "SUSE Bug 1066223", url: "https://bugzilla.suse.com/1066223", }, { category: "self", summary: "SUSE Bug 1068032", url: "https://bugzilla.suse.com/1068032", }, { category: "self", summary: "SUSE Bug 1068075", url: "https://bugzilla.suse.com/1068075", }, { category: "self", summary: "SUSE Bug 1069138", url: "https://bugzilla.suse.com/1069138", }, { category: "self", summary: "SUSE Bug 1078921", url: "https://bugzilla.suse.com/1078921", }, { category: "self", summary: "SUSE Bug 1080157", url: "https://bugzilla.suse.com/1080157", }, { category: "self", summary: "SUSE Bug 1083663", url: "https://bugzilla.suse.com/1083663", }, { category: "self", summary: "SUSE Bug 1085042", url: "https://bugzilla.suse.com/1085042", }, { category: "self", summary: "SUSE Bug 1085536", url: "https://bugzilla.suse.com/1085536", }, { category: "self", summary: "SUSE Bug 1085539", url: "https://bugzilla.suse.com/1085539", }, { category: "self", summary: "SUSE Bug 1086457", url: "https://bugzilla.suse.com/1086457", }, { category: "self", summary: "SUSE Bug 1087092", url: "https://bugzilla.suse.com/1087092", }, { category: "self", summary: "SUSE Bug 1089066", url: "https://bugzilla.suse.com/1089066", }, { category: "self", summary: "SUSE Bug 1090888", url: "https://bugzilla.suse.com/1090888", }, { category: "self", summary: "SUSE Bug 1091171", url: "https://bugzilla.suse.com/1091171", }, { category: "self", summary: "SUSE Bug 1091860", url: "https://bugzilla.suse.com/1091860", }, { category: "self", summary: "SUSE Bug 1096254", url: "https://bugzilla.suse.com/1096254", }, { category: "self", summary: "SUSE Bug 1096748", url: "https://bugzilla.suse.com/1096748", }, { category: "self", summary: "SUSE Bug 1097105", url: "https://bugzilla.suse.com/1097105", }, { category: "self", summary: "SUSE Bug 1098253", url: "https://bugzilla.suse.com/1098253", }, { category: "self", summary: "SUSE Bug 1098822", url: "https://bugzilla.suse.com/1098822", }, { category: "self", summary: "SUSE Bug 1099597", url: "https://bugzilla.suse.com/1099597", }, { category: "self", summary: "SUSE Bug 1099810", url: "https://bugzilla.suse.com/1099810", }, { category: "self", summary: "SUSE Bug 1099811", url: "https://bugzilla.suse.com/1099811", }, { category: "self", summary: "SUSE Bug 1099813", url: "https://bugzilla.suse.com/1099813", }, { category: "self", summary: "SUSE Bug 1099832", url: "https://bugzilla.suse.com/1099832", }, { category: "self", summary: "SUSE Bug 1099844", url: "https://bugzilla.suse.com/1099844", }, { category: "self", summary: "SUSE Bug 1099845", url: "https://bugzilla.suse.com/1099845", }, { category: "self", summary: "SUSE Bug 1099846", url: "https://bugzilla.suse.com/1099846", }, { category: "self", summary: "SUSE Bug 1099849", url: "https://bugzilla.suse.com/1099849", }, { category: "self", summary: "SUSE Bug 1099863", url: "https://bugzilla.suse.com/1099863", }, { category: "self", summary: "SUSE Bug 1099864", url: "https://bugzilla.suse.com/1099864", }, { category: "self", summary: "SUSE Bug 1099922", url: "https://bugzilla.suse.com/1099922", }, { category: "self", summary: "SUSE Bug 1099999", url: "https://bugzilla.suse.com/1099999", }, { category: "self", summary: "SUSE Bug 1100000", url: "https://bugzilla.suse.com/1100000", }, { category: "self", summary: "SUSE Bug 1100001", url: "https://bugzilla.suse.com/1100001", }, { category: "self", summary: "SUSE Bug 1100132", url: "https://bugzilla.suse.com/1100132", }, { category: "self", summary: "SUSE Bug 1101822", url: "https://bugzilla.suse.com/1101822", }, { category: "self", summary: "SUSE Bug 1101841", url: "https://bugzilla.suse.com/1101841", }, { category: "self", summary: "SUSE Bug 1102346", url: "https://bugzilla.suse.com/1102346", }, { category: "self", summary: "SUSE Bug 1102486", url: "https://bugzilla.suse.com/1102486", }, { category: "self", summary: "SUSE Bug 1102517", url: "https://bugzilla.suse.com/1102517", }, { category: "self", summary: "SUSE Bug 1102715", url: "https://bugzilla.suse.com/1102715", }, { category: "self", summary: "SUSE Bug 1102797", url: "https://bugzilla.suse.com/1102797", }, { category: "self", summary: "SUSE Bug 1103269", url: "https://bugzilla.suse.com/1103269", }, { category: "self", summary: "SUSE Bug 1103445", url: "https://bugzilla.suse.com/1103445", }, { category: "self", summary: "SUSE Bug 1103717", url: "https://bugzilla.suse.com/1103717", }, { category: "self", summary: "SUSE Bug 1104319", url: "https://bugzilla.suse.com/1104319", }, { category: "self", summary: "SUSE Bug 1104485", url: "https://bugzilla.suse.com/1104485", }, { category: "self", summary: "SUSE Bug 1104494", url: "https://bugzilla.suse.com/1104494", }, { category: "self", summary: "SUSE Bug 1104495", url: "https://bugzilla.suse.com/1104495", }, { category: "self", summary: "SUSE Bug 1104683", url: "https://bugzilla.suse.com/1104683", }, { category: "self", summary: "SUSE Bug 1104897", url: "https://bugzilla.suse.com/1104897", }, { category: "self", summary: "SUSE Bug 1105271", url: "https://bugzilla.suse.com/1105271", }, { category: "self", summary: "SUSE Bug 1105292", url: "https://bugzilla.suse.com/1105292", }, { category: "self", summary: "SUSE Bug 1105322", url: "https://bugzilla.suse.com/1105322", }, { category: "self", summary: "SUSE Bug 1105323", url: "https://bugzilla.suse.com/1105323", }, { category: "self", summary: "SUSE Bug 1105392", url: "https://bugzilla.suse.com/1105392", }, { category: "self", summary: "SUSE Bug 1105396", url: "https://bugzilla.suse.com/1105396", }, { category: "self", summary: "SUSE Bug 1105524", url: "https://bugzilla.suse.com/1105524", }, { category: "self", summary: "SUSE Bug 1105536", url: "https://bugzilla.suse.com/1105536", }, { category: "self", summary: "SUSE Bug 1105769", url: "https://bugzilla.suse.com/1105769", }, { category: "self", summary: "SUSE Bug 1106016", url: "https://bugzilla.suse.com/1106016", }, { category: "self", summary: "SUSE Bug 1106105", url: "https://bugzilla.suse.com/1106105", }, { category: "self", summary: "SUSE Bug 1106185", url: "https://bugzilla.suse.com/1106185", }, { category: "self", summary: "SUSE Bug 1106229", url: "https://bugzilla.suse.com/1106229", }, { category: "self", summary: "SUSE Bug 1106271", url: "https://bugzilla.suse.com/1106271", }, { category: "self", summary: "SUSE Bug 1106275", url: "https://bugzilla.suse.com/1106275", }, { category: "self", summary: "SUSE Bug 1106276", url: "https://bugzilla.suse.com/1106276", }, { category: "self", summary: "SUSE Bug 1106278", url: "https://bugzilla.suse.com/1106278", }, { category: "self", summary: "SUSE Bug 1106281", url: "https://bugzilla.suse.com/1106281", }, { category: "self", summary: "SUSE Bug 1106283", url: "https://bugzilla.suse.com/1106283", }, { category: "self", summary: "SUSE Bug 1106369", url: "https://bugzilla.suse.com/1106369", }, { category: "self", summary: "SUSE Bug 1106509", url: "https://bugzilla.suse.com/1106509", }, { category: "self", summary: "SUSE Bug 1106511", url: "https://bugzilla.suse.com/1106511", }, { category: "self", summary: "SUSE Bug 1106697", url: "https://bugzilla.suse.com/1106697", }, { category: "self", summary: "SUSE Bug 1106929", url: "https://bugzilla.suse.com/1106929", }, { category: "self", summary: "SUSE Bug 1106934", url: "https://bugzilla.suse.com/1106934", }, { category: "self", summary: "SUSE Bug 1106995", url: "https://bugzilla.suse.com/1106995", }, { category: "self", summary: "SUSE Bug 1107060", url: "https://bugzilla.suse.com/1107060", }, { category: "self", summary: "SUSE Bug 1107078", url: "https://bugzilla.suse.com/1107078", }, { category: "self", summary: "SUSE Bug 1107319", url: "https://bugzilla.suse.com/1107319", }, { category: "self", summary: "SUSE Bug 1107320", url: "https://bugzilla.suse.com/1107320", }, { category: "self", summary: "SUSE Bug 1107689", url: "https://bugzilla.suse.com/1107689", }, { category: "self", summary: "SUSE Bug 1107735", url: "https://bugzilla.suse.com/1107735", }, { category: "self", summary: "SUSE Bug 1107966", url: "https://bugzilla.suse.com/1107966", }, { category: "self", summary: "SUSE Bug 963575", url: "https://bugzilla.suse.com/963575", }, { category: "self", summary: "SUSE Bug 966170", url: "https://bugzilla.suse.com/966170", }, { category: "self", summary: "SUSE Bug 966172", url: "https://bugzilla.suse.com/966172", }, { category: "self", summary: "SUSE Bug 969470", url: "https://bugzilla.suse.com/969470", }, { category: "self", summary: "SUSE Bug 969476", url: "https://bugzilla.suse.com/969476", }, { category: "self", summary: "SUSE Bug 969477", url: "https://bugzilla.suse.com/969477", }, { category: "self", summary: "SUSE Bug 970506", url: "https://bugzilla.suse.com/970506", }, { category: "self", summary: "SUSE CVE CVE-2018-10876 page", url: "https://www.suse.com/security/cve/CVE-2018-10876/", }, { category: "self", summary: "SUSE CVE CVE-2018-10877 page", url: "https://www.suse.com/security/cve/CVE-2018-10877/", }, { category: "self", summary: "SUSE CVE CVE-2018-10878 page", url: "https://www.suse.com/security/cve/CVE-2018-10878/", }, { category: "self", summary: "SUSE CVE CVE-2018-10879 page", url: "https://www.suse.com/security/cve/CVE-2018-10879/", }, { category: "self", summary: "SUSE CVE CVE-2018-10880 page", url: "https://www.suse.com/security/cve/CVE-2018-10880/", }, { category: "self", summary: "SUSE CVE CVE-2018-10881 page", url: "https://www.suse.com/security/cve/CVE-2018-10881/", }, { category: "self", summary: "SUSE CVE CVE-2018-10882 page", url: "https://www.suse.com/security/cve/CVE-2018-10882/", }, { category: "self", summary: "SUSE CVE CVE-2018-10883 page", url: "https://www.suse.com/security/cve/CVE-2018-10883/", }, { category: "self", summary: "SUSE CVE CVE-2018-10902 page", url: "https://www.suse.com/security/cve/CVE-2018-10902/", }, { category: "self", summary: "SUSE CVE CVE-2018-10938 page", url: "https://www.suse.com/security/cve/CVE-2018-10938/", }, { category: "self", summary: "SUSE CVE CVE-2018-1128 page", url: "https://www.suse.com/security/cve/CVE-2018-1128/", }, { category: "self", summary: "SUSE CVE CVE-2018-1129 page", url: "https://www.suse.com/security/cve/CVE-2018-1129/", }, { category: "self", summary: "SUSE CVE CVE-2018-12896 page", url: "https://www.suse.com/security/cve/CVE-2018-12896/", }, { category: "self", summary: "SUSE CVE CVE-2018-13093 page", url: "https://www.suse.com/security/cve/CVE-2018-13093/", }, { category: "self", summary: "SUSE CVE CVE-2018-13094 page", url: "https://www.suse.com/security/cve/CVE-2018-13094/", }, { category: "self", summary: "SUSE CVE CVE-2018-13095 page", url: "https://www.suse.com/security/cve/CVE-2018-13095/", }, { category: "self", summary: "SUSE CVE CVE-2018-15572 page", url: "https://www.suse.com/security/cve/CVE-2018-15572/", }, { category: "self", summary: "SUSE CVE CVE-2018-16658 page", url: "https://www.suse.com/security/cve/CVE-2018-16658/", }, { category: "self", summary: "SUSE CVE CVE-2018-6554 page", url: "https://www.suse.com/security/cve/CVE-2018-6554/", }, { category: "self", summary: "SUSE CVE CVE-2018-6555 page", url: "https://www.suse.com/security/cve/CVE-2018-6555/", }, { category: "self", summary: "SUSE CVE CVE-2018-9363 page", url: "https://www.suse.com/security/cve/CVE-2018-9363/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2018-09-20T16:27:28Z", generator: { date: "2018-09-20T16:27:28Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:2776-1", initial_release_date: "2018-09-20T16:27:28Z", revision_history: [ { date: "2018-09-20T16:27:28Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-obs-build-4.4.155-94.50.1.aarch64", product: { name: "kernel-obs-build-4.4.155-94.50.1.aarch64", product_id: "kernel-obs-build-4.4.155-94.50.1.aarch64", }, }, { category: "product_version", name: "kernel-default-4.4.155-94.50.1.aarch64", product: { name: "kernel-default-4.4.155-94.50.1.aarch64", product_id: "kernel-default-4.4.155-94.50.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-4.4.155-94.50.1.aarch64", product: { name: "kernel-default-base-4.4.155-94.50.1.aarch64", product_id: "kernel-default-base-4.4.155-94.50.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.4.155-94.50.1.aarch64", product: { name: "kernel-default-devel-4.4.155-94.50.1.aarch64", product_id: "kernel-default-devel-4.4.155-94.50.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.4.155-94.50.1.aarch64", product: { name: "kernel-syms-4.4.155-94.50.1.aarch64", product_id: "kernel-syms-4.4.155-94.50.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.4.155-94.50.1.noarch", product: { name: "kernel-devel-4.4.155-94.50.1.noarch", product_id: "kernel-devel-4.4.155-94.50.1.noarch", }, }, { category: "product_version", name: "kernel-macros-4.4.155-94.50.1.noarch", product: { name: "kernel-macros-4.4.155-94.50.1.noarch", product_id: "kernel-macros-4.4.155-94.50.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.4.155-94.50.1.noarch", product: { name: "kernel-source-4.4.155-94.50.1.noarch", product_id: "kernel-source-4.4.155-94.50.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.4.155-94.50.1.noarch", product: { name: "kernel-docs-4.4.155-94.50.1.noarch", product_id: "kernel-docs-4.4.155-94.50.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", product: { name: "cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", product_id: "cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.155-94.50.1.ppc64le", product: { name: "dlm-kmp-default-4.4.155-94.50.1.ppc64le", product_id: "dlm-kmp-default-4.4.155-94.50.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.155-94.50.1.ppc64le", product: { name: "gfs2-kmp-default-4.4.155-94.50.1.ppc64le", product_id: "gfs2-kmp-default-4.4.155-94.50.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", product: { name: "ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", product_id: "ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.4.155-94.50.1.ppc64le", product: { name: "kernel-obs-build-4.4.155-94.50.1.ppc64le", product_id: "kernel-obs-build-4.4.155-94.50.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.4.155-94.50.1.ppc64le", product: { name: "kernel-default-4.4.155-94.50.1.ppc64le", product_id: "kernel-default-4.4.155-94.50.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.4.155-94.50.1.ppc64le", product: { name: "kernel-default-base-4.4.155-94.50.1.ppc64le", product_id: "kernel-default-base-4.4.155-94.50.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.4.155-94.50.1.ppc64le", product: { name: "kernel-default-devel-4.4.155-94.50.1.ppc64le", product_id: "kernel-default-devel-4.4.155-94.50.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.4.155-94.50.1.ppc64le", product: { name: "kernel-syms-4.4.155-94.50.1.ppc64le", product_id: "kernel-syms-4.4.155-94.50.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.4.155-94.50.1.s390x", product: { name: "cluster-md-kmp-default-4.4.155-94.50.1.s390x", product_id: "cluster-md-kmp-default-4.4.155-94.50.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.155-94.50.1.s390x", product: { name: "dlm-kmp-default-4.4.155-94.50.1.s390x", product_id: "dlm-kmp-default-4.4.155-94.50.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.155-94.50.1.s390x", product: { name: "gfs2-kmp-default-4.4.155-94.50.1.s390x", product_id: "gfs2-kmp-default-4.4.155-94.50.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.155-94.50.1.s390x", product: { name: "ocfs2-kmp-default-4.4.155-94.50.1.s390x", product_id: "ocfs2-kmp-default-4.4.155-94.50.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.4.155-94.50.1.s390x", product: { name: "kernel-obs-build-4.4.155-94.50.1.s390x", product_id: "kernel-obs-build-4.4.155-94.50.1.s390x", }, }, { category: "product_version", name: "kernel-default-4.4.155-94.50.1.s390x", product: { name: "kernel-default-4.4.155-94.50.1.s390x", product_id: "kernel-default-4.4.155-94.50.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.4.155-94.50.1.s390x", product: { name: "kernel-default-base-4.4.155-94.50.1.s390x", product_id: "kernel-default-base-4.4.155-94.50.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.4.155-94.50.1.s390x", product: { name: "kernel-default-devel-4.4.155-94.50.1.s390x", product_id: "kernel-default-devel-4.4.155-94.50.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.4.155-94.50.1.s390x", product: { name: "kernel-default-man-4.4.155-94.50.1.s390x", product_id: "kernel-default-man-4.4.155-94.50.1.s390x", }, }, { category: "product_version", name: "kernel-syms-4.4.155-94.50.1.s390x", product: { name: "kernel-syms-4.4.155-94.50.1.s390x", product_id: "kernel-syms-4.4.155-94.50.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-default-4.4.155-94.50.1.x86_64", product: { name: "kernel-default-4.4.155-94.50.1.x86_64", product_id: "kernel-default-4.4.155-94.50.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.4.155-94.50.1.x86_64", product: { name: "kernel-default-devel-4.4.155-94.50.1.x86_64", product_id: "kernel-default-devel-4.4.155-94.50.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.4.155-94.50.1.x86_64", product: { name: "kernel-default-extra-4.4.155-94.50.1.x86_64", product_id: "kernel-default-extra-4.4.155-94.50.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.4.155-94.50.1.x86_64", product: { name: "kernel-syms-4.4.155-94.50.1.x86_64", product_id: "kernel-syms-4.4.155-94.50.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-default-4.4.155-94.50.1.x86_64", product: { name: "cluster-md-kmp-default-4.4.155-94.50.1.x86_64", product_id: "cluster-md-kmp-default-4.4.155-94.50.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.155-94.50.1.x86_64", product: { name: "dlm-kmp-default-4.4.155-94.50.1.x86_64", product_id: "dlm-kmp-default-4.4.155-94.50.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.155-94.50.1.x86_64", product: { name: "gfs2-kmp-default-4.4.155-94.50.1.x86_64", product_id: "gfs2-kmp-default-4.4.155-94.50.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.155-94.50.1.x86_64", product: { name: "ocfs2-kmp-default-4.4.155-94.50.1.x86_64", product_id: "ocfs2-kmp-default-4.4.155-94.50.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.4.155-94.50.1.x86_64", product: { name: "kernel-obs-build-4.4.155-94.50.1.x86_64", product_id: "kernel-obs-build-4.4.155-94.50.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.4.155-94.50.1.x86_64", product: { name: "kernel-default-base-4.4.155-94.50.1.x86_64", product_id: "kernel-default-base-4.4.155-94.50.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP3", product: { name: "SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 12 SP3", product: { name: "SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP3", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3", product: { name: "SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 12 SP3", product: { name: "SUSE Linux Enterprise Workstation Extension 12 SP3", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:12:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.155-94.50.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", }, product_reference: "kernel-default-4.4.155-94.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.155-94.50.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", }, product_reference: "kernel-default-devel-4.4.155-94.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-4.4.155-94.50.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", }, product_reference: "kernel-default-extra-4.4.155-94.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.155-94.50.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", }, product_reference: "kernel-devel-4.4.155-94.50.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.155-94.50.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", }, product_reference: "kernel-macros-4.4.155-94.50.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.155-94.50.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", }, product_reference: "kernel-source-4.4.155-94.50.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.155-94.50.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", }, product_reference: "kernel-syms-4.4.155-94.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.4.155-94.50.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", }, product_reference: "cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.4.155-94.50.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", }, product_reference: "cluster-md-kmp-default-4.4.155-94.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.4.155-94.50.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.4.155-94.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.4.155-94.50.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", }, product_reference: "dlm-kmp-default-4.4.155-94.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.4.155-94.50.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", }, product_reference: "dlm-kmp-default-4.4.155-94.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.4.155-94.50.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", }, product_reference: "dlm-kmp-default-4.4.155-94.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.4.155-94.50.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", }, product_reference: "gfs2-kmp-default-4.4.155-94.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.4.155-94.50.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", }, product_reference: "gfs2-kmp-default-4.4.155-94.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.4.155-94.50.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", }, product_reference: "gfs2-kmp-default-4.4.155-94.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.4.155-94.50.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", }, product_reference: "ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.4.155-94.50.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", }, product_reference: "ocfs2-kmp-default-4.4.155-94.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.4.155-94.50.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.4.155-94.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.4.155-94.50.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", }, product_reference: "kernel-docs-4.4.155-94.50.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.4.155-94.50.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", }, product_reference: "kernel-obs-build-4.4.155-94.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.4.155-94.50.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", }, product_reference: "kernel-obs-build-4.4.155-94.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.4.155-94.50.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", }, product_reference: "kernel-obs-build-4.4.155-94.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.4.155-94.50.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", }, product_reference: "kernel-obs-build-4.4.155-94.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.155-94.50.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", }, product_reference: "kernel-default-4.4.155-94.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.155-94.50.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", }, product_reference: "kernel-default-4.4.155-94.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.155-94.50.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", }, product_reference: "kernel-default-4.4.155-94.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.155-94.50.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", }, product_reference: "kernel-default-4.4.155-94.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.155-94.50.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", }, product_reference: "kernel-default-base-4.4.155-94.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.155-94.50.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", }, product_reference: "kernel-default-base-4.4.155-94.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.155-94.50.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", }, product_reference: "kernel-default-base-4.4.155-94.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.155-94.50.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", }, product_reference: "kernel-default-base-4.4.155-94.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.155-94.50.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", }, product_reference: "kernel-default-devel-4.4.155-94.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.155-94.50.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", }, product_reference: "kernel-default-devel-4.4.155-94.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.155-94.50.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", }, product_reference: "kernel-default-devel-4.4.155-94.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.155-94.50.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", }, product_reference: "kernel-default-devel-4.4.155-94.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.4.155-94.50.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", }, product_reference: "kernel-default-man-4.4.155-94.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.155-94.50.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", }, product_reference: "kernel-devel-4.4.155-94.50.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.155-94.50.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", }, product_reference: "kernel-macros-4.4.155-94.50.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.155-94.50.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", }, product_reference: "kernel-source-4.4.155-94.50.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.155-94.50.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", }, product_reference: "kernel-syms-4.4.155-94.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.155-94.50.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", }, product_reference: "kernel-syms-4.4.155-94.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.155-94.50.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", }, product_reference: "kernel-syms-4.4.155-94.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.155-94.50.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", }, product_reference: "kernel-syms-4.4.155-94.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.155-94.50.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", }, product_reference: "kernel-default-4.4.155-94.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.155-94.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", }, product_reference: "kernel-default-4.4.155-94.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.155-94.50.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", }, product_reference: "kernel-default-4.4.155-94.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.155-94.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", }, product_reference: "kernel-default-4.4.155-94.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.155-94.50.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", }, product_reference: "kernel-default-base-4.4.155-94.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.155-94.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", }, product_reference: "kernel-default-base-4.4.155-94.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.155-94.50.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", }, product_reference: "kernel-default-base-4.4.155-94.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.155-94.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", }, product_reference: "kernel-default-base-4.4.155-94.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.155-94.50.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", }, product_reference: "kernel-default-devel-4.4.155-94.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.155-94.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", }, product_reference: "kernel-default-devel-4.4.155-94.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.155-94.50.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", }, product_reference: "kernel-default-devel-4.4.155-94.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.155-94.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", }, product_reference: "kernel-default-devel-4.4.155-94.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.4.155-94.50.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", }, product_reference: "kernel-default-man-4.4.155-94.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.155-94.50.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", }, product_reference: "kernel-devel-4.4.155-94.50.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.155-94.50.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", }, product_reference: "kernel-macros-4.4.155-94.50.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.155-94.50.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", }, product_reference: "kernel-source-4.4.155-94.50.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.155-94.50.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", }, product_reference: "kernel-syms-4.4.155-94.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.155-94.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", }, product_reference: "kernel-syms-4.4.155-94.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.155-94.50.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", }, product_reference: "kernel-syms-4.4.155-94.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.155-94.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", }, product_reference: "kernel-syms-4.4.155-94.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-4.4.155-94.50.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", }, product_reference: "kernel-default-extra-4.4.155-94.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 12 SP3", }, ], }, vulnerabilities: [ { cve: "CVE-2018-10876", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10876", }, ], notes: [ { category: "general", text: "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10876", url: "https://www.suse.com/security/cve/CVE-2018-10876", }, { category: "external", summary: "SUSE Bug 1099811 for CVE-2018-10876", url: "https://bugzilla.suse.com/1099811", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:28Z", details: "low", }, ], title: "CVE-2018-10876", }, { cve: "CVE-2018-10877", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10877", }, ], notes: [ { category: "general", text: "Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10877", url: "https://www.suse.com/security/cve/CVE-2018-10877", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10877", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099846 for CVE-2018-10877", url: "https://bugzilla.suse.com/1099846", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:28Z", details: "low", }, ], title: "CVE-2018-10877", }, { cve: "CVE-2018-10878", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10878", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10878", url: "https://www.suse.com/security/cve/CVE-2018-10878", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10878", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099813 for CVE-2018-10878", url: "https://bugzilla.suse.com/1099813", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:28Z", details: "moderate", }, ], title: "CVE-2018-10878", }, { cve: "CVE-2018-10879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10879", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10879", url: "https://www.suse.com/security/cve/CVE-2018-10879", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10879", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099844 for CVE-2018-10879", url: "https://bugzilla.suse.com/1099844", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:28Z", details: "moderate", }, ], title: "CVE-2018-10879", }, { cve: "CVE-2018-10880", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10880", }, ], notes: [ { category: "general", text: "Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10880", url: "https://www.suse.com/security/cve/CVE-2018-10880", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10880", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099845 for CVE-2018-10880", url: "https://bugzilla.suse.com/1099845", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:28Z", details: "moderate", }, ], title: "CVE-2018-10880", }, { cve: "CVE-2018-10881", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10881", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10881", url: "https://www.suse.com/security/cve/CVE-2018-10881", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10881", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099864 for CVE-2018-10881", url: "https://bugzilla.suse.com/1099864", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:28Z", details: "moderate", }, ], title: "CVE-2018-10881", }, { cve: "CVE-2018-10882", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10882", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10882", url: "https://www.suse.com/security/cve/CVE-2018-10882", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10882", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099849 for CVE-2018-10882", url: "https://bugzilla.suse.com/1099849", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:28Z", details: "moderate", }, ], title: "CVE-2018-10882", }, { cve: "CVE-2018-10883", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10883", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10883", url: "https://www.suse.com/security/cve/CVE-2018-10883", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10883", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099863 for CVE-2018-10883", url: "https://bugzilla.suse.com/1099863", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:28Z", details: "moderate", }, ], title: "CVE-2018-10883", }, { cve: "CVE-2018-10902", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10902", }, ], notes: [ { category: "general", text: "It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10902", url: "https://www.suse.com/security/cve/CVE-2018-10902", }, { category: "external", summary: "SUSE Bug 1105322 for CVE-2018-10902", url: "https://bugzilla.suse.com/1105322", }, { category: "external", summary: "SUSE Bug 1105323 for CVE-2018-10902", url: "https://bugzilla.suse.com/1105323", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:28Z", details: "moderate", }, ], title: "CVE-2018-10902", }, { cve: "CVE-2018-10938", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10938", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10938", url: "https://www.suse.com/security/cve/CVE-2018-10938", }, { category: "external", summary: "SUSE Bug 1106016 for CVE-2018-10938", url: "https://bugzilla.suse.com/1106016", }, { category: "external", summary: "SUSE Bug 1106191 for CVE-2018-10938", url: "https://bugzilla.suse.com/1106191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:28Z", details: "important", }, ], title: "CVE-2018-10938", }, { cve: "CVE-2018-1128", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1128", }, ], notes: [ { category: "general", text: "It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1128", url: "https://www.suse.com/security/cve/CVE-2018-1128", }, { category: "external", summary: "SUSE Bug 1096748 for CVE-2018-1128", url: "https://bugzilla.suse.com/1096748", }, { category: "external", summary: "SUSE Bug 1114710 for CVE-2018-1128", url: "https://bugzilla.suse.com/1114710", }, { category: "external", summary: "SUSE Bug 1177843 for CVE-2018-1128", url: "https://bugzilla.suse.com/1177843", }, { category: "external", summary: "SUSE Bug 1177859 for CVE-2018-1128", url: "https://bugzilla.suse.com/1177859", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:28Z", details: "important", }, ], title: "CVE-2018-1128", }, { cve: "CVE-2018-1129", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1129", }, ], notes: [ { category: "general", text: "A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1129", url: "https://www.suse.com/security/cve/CVE-2018-1129", }, { category: "external", summary: "SUSE Bug 1096748 for CVE-2018-1129", url: "https://bugzilla.suse.com/1096748", }, { category: "external", summary: "SUSE Bug 1114710 for CVE-2018-1129", url: "https://bugzilla.suse.com/1114710", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:28Z", details: "important", }, ], title: "CVE-2018-1129", }, { cve: "CVE-2018-12896", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12896", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12896", url: "https://www.suse.com/security/cve/CVE-2018-12896", }, { category: "external", summary: "SUSE Bug 1099922 for CVE-2018-12896", url: "https://bugzilla.suse.com/1099922", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:28Z", details: "low", }, ], title: "CVE-2018-12896", }, { cve: "CVE-2018-13093", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-13093", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/xfs/xfs_icache.c in the Linux kernel through 4.17.3. There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-13093", url: "https://www.suse.com/security/cve/CVE-2018-13093", }, { category: "external", summary: "SUSE Bug 1100001 for CVE-2018-13093", url: "https://bugzilla.suse.com/1100001", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:28Z", details: "moderate", }, ], title: "CVE-2018-13093", }, { cve: "CVE-2018-13094", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-13094", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/xfs/libxfs/xfs_attr_leaf.c in the Linux kernel through 4.17.3. An OOPS may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-13094", url: "https://www.suse.com/security/cve/CVE-2018-13094", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-13094", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1100000 for CVE-2018-13094", url: "https://bugzilla.suse.com/1100000", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:28Z", details: "moderate", }, ], title: "CVE-2018-13094", }, { cve: "CVE-2018-13095", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-13095", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.17.3. A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-13095", url: "https://www.suse.com/security/cve/CVE-2018-13095", }, { category: "external", summary: "SUSE Bug 1099999 for CVE-2018-13095", url: "https://bugzilla.suse.com/1099999", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:28Z", details: "moderate", }, ], title: "CVE-2018-13095", }, { cve: "CVE-2018-15572", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-15572", }, ], notes: [ { category: "general", text: "The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-15572", url: "https://www.suse.com/security/cve/CVE-2018-15572", }, { category: "external", summary: "SUSE Bug 1102517 for CVE-2018-15572", url: "https://bugzilla.suse.com/1102517", }, { category: "external", summary: "SUSE Bug 1105296 for CVE-2018-15572", url: "https://bugzilla.suse.com/1105296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:28Z", details: "important", }, ], title: "CVE-2018-15572", }, { cve: "CVE-2018-16658", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16658", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16658", url: "https://www.suse.com/security/cve/CVE-2018-16658", }, { category: "external", summary: "SUSE Bug 1092903 for CVE-2018-16658", url: "https://bugzilla.suse.com/1092903", }, { category: "external", summary: "SUSE Bug 1107689 for CVE-2018-16658", url: "https://bugzilla.suse.com/1107689", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-16658", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:28Z", details: "low", }, ], title: "CVE-2018-16658", }, { cve: "CVE-2018-6554", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6554", }, ], notes: [ { category: "general", text: "Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6554", url: "https://www.suse.com/security/cve/CVE-2018-6554", }, { category: "external", summary: "SUSE Bug 1106509 for CVE-2018-6554", url: "https://bugzilla.suse.com/1106509", }, { category: "external", summary: "SUSE Bug 1106511 for CVE-2018-6554", url: "https://bugzilla.suse.com/1106511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:28Z", details: "low", }, ], title: "CVE-2018-6554", }, { cve: "CVE-2018-6555", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6555", }, ], notes: [ { category: "general", text: "The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6555", url: "https://www.suse.com/security/cve/CVE-2018-6555", }, { category: "external", summary: "SUSE Bug 1106509 for CVE-2018-6555", url: "https://bugzilla.suse.com/1106509", }, { category: "external", summary: "SUSE Bug 1106511 for CVE-2018-6555", url: "https://bugzilla.suse.com/1106511", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2018-6555", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:28Z", details: "moderate", }, ], title: "CVE-2018-6555", }, { cve: "CVE-2018-9363", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-9363", }, ], notes: [ { category: "general", text: "In the hidp_process_report in bluetooth, there is an integer overflow. This could lead to an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-65853588 References: Upstream kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-9363", url: "https://www.suse.com/security/cve/CVE-2018-9363", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-9363", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1105292 for CVE-2018-9363", url: "https://bugzilla.suse.com/1105292", }, { category: "external", summary: "SUSE Bug 1105293 for CVE-2018-9363", url: "https://bugzilla.suse.com/1105293", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.155-94.50.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.155-94.50.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.155-94.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:28Z", details: "important", }, ], title: "CVE-2018-9363", }, ], }
suse-su-2018:2775-1
Vulnerability from csaf_suse
Published
2018-09-20 16:27
Modified
2018-09-20 16:27
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.155 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-13093: Prevent NULL pointer dereference and panic in lookup_slow()
on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image.
This occured because of a lack of proper validation that cached inodes are free
during allocation (bnc#1100001).
- CVE-2018-13095: Prevent denial of service (memory corruption and BUG) that
could have occurred for a corrupted xfs image upon encountering an inode that
is in extent format, but has more extents than fit in the inode fork
(bnc#1099999).
- CVE-2018-13094: Prevent OOPS that may have occured for a corrupted xfs image
after xfs_da_shrink_inode() is called with a NULL bp (bnc#1100000).
- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was
caused by the way the overrun accounting works. Depending on interval and
expiry time values, the overrun can be larger than INT_MAX, but the accounting
is int based. This basically made the accounting values, which are visible to
user space via timer_getoverrun(2) and siginfo::si_overrun, random. This
allowed a local user to cause a denial of service (signed integer overflow) via
crafted mmap, futex, timer_create, and timer_settime system calls
(bnc#1099922).
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that
could have been used by local attackers to read kernel memory (bnc#1107689).
- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a
denial of service (ias_object use-after-free and system crash) or possibly have
unspecified other impact via an AF_IRDA socket (bnc#1106511).
- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed
local users to cause a denial of service (memory consumption) by repeatedly
binding an AF_IRDA socket (bnc#1106509).
- CVE-2018-1129: A flaw was found in the way signature calculation was handled
by cephx authentication protocol. An attacker having access to ceph cluster
network who is able to alter the message payload was able to bypass signature
checks done by cephx protocol (bnc#1096748).
- CVE-2018-1128: It was found that cephx authentication protocol did not verify
ceph clients correctly and was vulnerable to replay attack. Any attacker having
access to ceph cluster network who is able to sniff packets on network can use
this vulnerability to authenticate with ceph service and perform actions
allowed by ceph service (bnc#1096748).
- CVE-2018-10938: A crafted network packet sent remotely by an attacker forced
the kernel to enter an infinite loop in the cipso_v4_optptr() function leading
to a denial-of-service (bnc#1106016).
- CVE-2018-15572: The spectre_v2_select_mitigation function did not always fill
RSB upon a context switch, which made it easier for attackers to conduct
userspace-userspace spectreRSB attacks (bnc#1102517).
- CVE-2018-10902: Protect against concurrent access to prevent double realloc
(double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A
malicious local attacker could have used this for privilege escalation
(bnc#1105322 1105323).
- CVE-2018-9363: Prevent buffer overflow in hidp_process_report (bsc#1105292)
- CVE-2018-10883: A local user could have caused an out-of-bounds write in
jbd2_journal_dirty_metadata(), a denial of service, and a system crash by
mounting and operating on a crafted ext4 filesystem image (bsc#1099863).
- CVE-2018-10879: A local user could have caused a use-after-free in
ext4_xattr_set_entry function and a denial of service or unspecified other
impact by renaming a file in a crafted ext4 filesystem image (bsc#1099844).
- CVE-2018-10878: A local user could have caused an out-of-bounds write and a
denial of service or unspecified other impact by mounting and operating a
crafted ext4 filesystem image (bsc#1099813).
- CVE-2018-10876: A use-after-free was possible in ext4_ext_remove_space()
function when mounting and operating a crafted ext4 image (bsc#1099811).
- CVE-2018-10877: Prevent out-of-bound access in the ext4_ext_drop_refs()
function when operating on a crafted ext4 filesystem image (bsc#1099846).
- CVE-2018-10881: A local user could have caused an out-of-bound access in
ext4_get_group_info function, a denial of service, and a system crash by
mounting and operating on a crafted ext4 filesystem image (bsc#1099864).
- CVE-2018-10882: A local user could have caused an out-of-bound write, a
denial of service, and a system crash by unmounting a crafted ext4 filesystem
image (bsc#1099849).
- CVE-2018-10880: Prevent stack-out-of-bounds write in the ext4 filesystem code
when mounting and writing to a crafted ext4 image in ext4_update_inline_data().
An attacker could have used this to cause a system crash and a denial of
service (bsc#1099845).
The following non-security bugs were fixed:
- 9p/net: Fix zero-copy path in the 9p virtio transport (bnc#1012382).
- 9p/virtio: fix off-by-one error in sg list bounds check (bnc#1012382).
- 9p: fix multiple NULL-pointer-dereferences (bnc#1012382).
- ACPI / LPSS: Add missing prv_offset setting for byt/cht PWM devices (bnc#1012382).
- ACPI / PCI: Bail early in acpi_pci_add_bus() if there is no ACPI handle (bnc#1012382).
- ACPI / PM: save NVS memory for ASUS 1025C laptop (bnc#1012382).
- ACPI: save NVS memory for Lenovo G50-45 (bnc#1012382).
- ALSA: cs5535audio: Fix invalid endian conversion (bnc#1012382).
- ALSA: emu10k1: Rate-limit error messages about page errors (bnc#1012382).
- ALSA: emu10k1: add error handling for snd_ctl_add (bnc#1012382).
- ALSA: fm801: add error handling for snd_ctl_add (bnc#1012382).
- ALSA: hda - Sleep for 10ms after entering D3 on Conexant codecs (bnc#1012382).
- ALSA: hda - Turn CX8200 into D3 as well upon reboot (bnc#1012382).
- ALSA: hda/ca0132: fix build failure when a local macro is defined (bnc#1012382).
- ALSA: hda: Correct Asrock B85M-ITX power_save blacklist entry (bnc#1012382).
- ALSA: memalloc: Do not exceed over the requested size (bnc#1012382).
- ALSA: rawmidi: Change resized buffers atomically (bnc#1012382).
- ALSA: snd-aoa: add of_node_put() in error path (bsc#1099810).
- ALSA: usb-audio: Apply rate limit to warning messages in URB complete callback (bnc#1012382).
- ALSA: virmidi: Fix too long output trigger loop (bnc#1012382).
- ALSA: vx222: Fix invalid endian conversions (bnc#1012382).
- ALSA: vxpocket: Fix invalid endian conversions (bnc#1012382).
- ARC: Enable machine_desc->init_per_cpu for !CONFIG_SMP (bnc#1012382).
- ARC: Explicitly add -mmedium-calls to CFLAGS (bnc#1012382).
- ARC: Fix CONFIG_SWAP (bnc#1012382).
- ARC: mm: allow mprotect to make stack mappings executable (bnc#1012382).
- ARM: 8780/1: ftrace: Only set kernel memory back to read-only after boot (bnc#1012382).
- ARM: dts: Cygnus: Fix I2C controller interrupt type (bnc#1012382).
- ARM: dts: am3517.dtsi: Disable reference to OMAP3 OTG controller (bnc#1012382).
- ARM: dts: am437x: make edt-ft5x06 a wakeup source (bnc#1012382).
- ARM: dts: da850: Fix interrups property for gpio (bnc#1012382).
- ARM: dts: imx6sx: fix irq for pcie bridge (bnc#1012382).
- ARM: fix put_user() for gcc-8 (bnc#1012382).
- ARM: imx_v4_v5_defconfig: Select ULPI support (bnc#1012382).
- ARM: imx_v6_v7_defconfig: Select ULPI support (bnc#1012382).
- ARM: pxa: irq: fix handling of ICMR registers in suspend/resume (bnc#1012382).
- ARM: tegra: Fix Tegra30 Cardhu PCA954x reset (bnc#1012382).
- ASoC: Intel: cht_bsw_max98090: remove useless code, align with ChromeOS driver.
- ASoC: Intel: cht_bsw_max98090_ti: Fix jack initialization (bnc#1012382).
- ASoC: dpcm: do not merge format from invalid codec dai (bnc#1012382).
- ASoC: dpcm: fix BE dai not hw_free and shutdown (bnc#1012382).
- ASoC: pxa: Fix module autoload for platform drivers (bnc#1012382).
- ASoC: sirf: Fix potential NULL pointer dereference (bnc#1012382).
- Add reference to bsc#1091171 (bnc#1012382; bsc#1091171).
- Bluetooth: avoid killing an already killed socket (bnc#1012382).
- Bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bnc#1012382).
- Bluetooth: btusb: Remove Yoga 920 from the btusb_needs_reset_resume_table (bsc#1087092).
- Bluetooth: btusb: Use DMI matching for QCA reset_resume quirking (bsc#1087092).
- Bluetooth: hci_qca: Fix 'Sleep inside atomic section' warning (bnc#1012382).
- Documentation/spec_ctrl: Do some minor cleanups (bnc#1012382).
- HID: hid-plantronics: Re-resend Update to map button for PTT products (bnc#1012382).
- HID: i2c-hid: check if device is there before really probing (bnc#1012382).
- HID: wacom: Correct touch maximum XY of 2nd-gen Intuos (bnc#1012382).
- IB/core: Make testing MR flags for writability a static inline function (bnc#1012382).
- IB/core: Remove duplicate declaration of gid_cache_wq (bsc#1056596).
- IB/iser: Do not reduce max_sectors (bsc#1063646).
- IB/mlx4: Fix an error handling path in 'mlx4_ib_rereg_user_mr()'.
- IB/mlx4: Mark user MR as writable if actual virtual memory is writable (bnc#1012382).
- IB/mlx5: Fetch soft WQE's on fatal error state (bsc#1015342 bsc#1015343).
- IB/mlx5: Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1015342 bsc#1015343).
- IB/ocrdma: fix out of bounds access to local buffer (bnc#1012382).
- Input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bnc#1012382).
- Input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bnc#1012382).
- Input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bnc#1012382).
- KVM/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel (bnc#1012382).
- KVM: MMU: always terminate page walks at level 1 (bsc#1062604).
- KVM: MMU: simplify last_pte_bitmap (bsc#1062604).
- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- KVM: arm/arm64: Skip updating PMD entry if no change (bnc#1012382).
- KVM: arm/arm64: Skip updating PTE entry if no change (bnc#1012382).
- KVM: irqfd: fix race between EPOLLHUP and irq_bypass_register_consumer (bnc#1012382).
- KVM: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).
- MIPS: Correct the 64-bit DSP accumulator register size (bnc#1012382).
- MIPS: Fix off-by-one in pci_resource_to_user() (bnc#1012382).
- MIPS: ath79: fix register address in ath79_ddr_wb_flush() (bnc#1012382).
- MIPS: lib: Provide MIPS64r6 __multi3() for GCC lower than < 7 (bnc#1012382).
- NET: stmmac: align DMA stuff to largest cache line length (bnc#1012382).
- PCI: Prevent sysfs disable of device while driver is attached (bnc#1012382).
- PCI: Skip MPS logic for Virtual Functions (VFs) (bnc#1012382).
- PCI: hotplug: Do not leak pci_slot on registration failure (bnc#1012382).
- PCI: pciehp: Fix use-after-free on unplug (bnc#1012382).
- PCI: pciehp: Request control of native hotplug only if supported (bnc#1012382).
- PM / sleep: wakeup: Fix build error caused by missing SRCU support (bnc#1012382).
- RDMA/i40iw: Avoid panic when objects are being created and destroyed (bsc#969476 bsc#969477).
- RDMA/i40iw: Avoid panic when reading back the IRQ affinity hint (bsc#969476 bsc#969477).
- RDMA/i40iw: Avoid reference leaks when processing the AEQ (bsc#969476 bsc#969477).
- RDMA/i40w: Hold read semaphore while looking after VMA (bsc#1024376).
- RDMA/mad: Convert BUG_ONs to error flows (bnc#1012382).
- RDMA/mlx5: Use proper spec flow label type (bsc#1015342 bsc#1015343).
- Revert 'MIPS: BCM47XX: Enable 74K Core ExternalSync for PCIe erratum' (bnc#1012382).
- Revert 'UBIFS: Fix potential integer overflow in allocation' (bnc#1012382).
- Revert 'f2fs: handle dirty segments inside refresh_sit_entry' (bsc#1106281).
- Revert 'mm: page_alloc: skip over regions of invalid pfns where possible' (bnc#1107078).
- Revert 'block-cancel-workqueue-entries-on-blk_mq_freeze_queue' (bsc#1103717).
- Smack: Mark inode instant in smack_task_to_inode (bnc#1012382).
- USB: musb: fix external abort on suspend (bsc#1085536).
- USB: option: add support for DW5821e (bnc#1012382).
- USB: serial: metro-usb: stop I/O after failed open (bsc#1085539).
- USB: serial: sierra: fix potential deadlock at close (bnc#1012382).
- Workaround kABI breakage by __must_check drop of strscpy() (bsc#1107319).
- afs: Fix directory permissions check (bsc#1106283).
- arc: fix build errors in arc/include/asm/delay.h (bnc#1012382).
- arc: fix type warnings in arc/mm/cache.c (bnc#1012382).
- arm64: make secondary_start_kernel() notrace (bnc#1012382).
- arm64: mm: check for upper PAGE_SHIFT bits in pfn_valid() (bnc#1012382).
- ath: Add regulatory mapping for APL13_WORLD (bnc#1012382).
- ath: Add regulatory mapping for APL2_FCCA (bnc#1012382).
- ath: Add regulatory mapping for Bahamas (bnc#1012382).
- ath: Add regulatory mapping for Bermuda (bnc#1012382).
- ath: Add regulatory mapping for ETSI8_WORLD (bnc#1012382).
- ath: Add regulatory mapping for FCC3_ETSIC (bnc#1012382).
- ath: Add regulatory mapping for Serbia (bnc#1012382).
- ath: Add regulatory mapping for Tanzania (bnc#1012382).
- ath: Add regulatory mapping for Uganda (bnc#1012382).
- atl1c: reserve min skb headroom (bnc#1012382).
- atm: Preserve value of skb->truesize when accounting to vcc (bsc#1089066).
- audit: allow not equal op for audit by executable (bnc#1012382).
- backlight: as3711_bl: Fix Device Tree node leaks (bsc#1106929).
- backlight: lm3630a: Bump REG_MAX value to 0x50 instead of 0x1F (bsc#1106929).
- bcache: avoid unncessary cache prefetch bch_btree_node_get() (bsc#1064232).
- bcache: calculate the number of incremental GC nodes according to the total of btree nodes (bsc#1064232).
- bcache: display rate debug parameters to 0 when writeback is not running (bsc#1064232).
- bcache: do not check return value of debugfs_create_dir() (bsc#1064232).
- bcache: finish incremental GC (bsc#1064232).
- bcache: fix I/O significant decline while backend devices registering (bsc#1064232).
- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064232).
- bcache: free heap cache_set->flush_btree in bch_journal_free (bsc#1064232).
- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section (bsc#1064232).
- bcache: release dc->writeback_lock properly in bch_writeback_thread() (bsc#1064232).
- bcache: set max writeback rate when I/O request is idle (bsc#1064232).
- bcache: simplify the calculation of the total amount of flash dirty data (bsc#1064232).
- be2net: remove unused old custom busy-poll fields (bsc#1021121 ).
- blkdev: __blkdev_direct_IO_simple: fix leak in error case (bsc#1083663).
- block: bio_iov_iter_get_pages: fix size of last iovec (bsc#1083663).
- block: bio_iov_iter_get_pages: pin more pages for multi-segment IOs (bsc#1083663).
- block: do not use interruptible wait anywhere (bnc#1012382).
- bnx2x: Fix invalid memory access in rss hash config path (bnc#1012382).
- bnx2x: Fix receiving tx-timeout in error or recovery state (bnc#1012382).
- bnxt_en: Always set output parameters in bnxt_get_max_rings() (bsc#963575).
- bnxt_en: Fix for system hang if request_irq fails (bnc#1012382).
- bnxt_en: Fix inconsistent BNXT_FLAG_AGG_RINGS logic (bsc#1020412 ).
- bpf: fix references to free_bpf_prog_info() in comments (bnc#1012382).
- brcmfmac: Add support for bcm43364 wireless chipset (bnc#1012382).
- brcmfmac: stop watchdog before detach and free everything (bnc#1012382).
- bridge: Propagate vlan add failure to user (bnc#1012382).
- btrfs: Do not remove block group still has pinned down bytes (bsc#1086457).
- btrfs: add barriers to btrfs_sync_log before log_commit_wait wakeups (bnc#1012382).
- btrfs: do not leak ret from do_chunk_alloc (bnc#1012382).
- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bnc#1012382).
- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf.
- btrfs: round down size diff when shrinking/growing device (bsc#1097105).
- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bnc#1012382).
- can: mpc5xxx_can: check of_iomap return before use (bnc#1012382).
- can: xilinx_can: fix RX loop if RXNEMP is asserted without RXOK (bnc#1012382).
- can: xilinx_can: fix RX overflow interrupt not being enabled (bnc#1012382).
- can: xilinx_can: fix device dropping off bus on RX overrun (bnc#1012382).
- can: xilinx_can: fix incorrect clear of non-processed interrupts (bnc#1012382).
- can: xilinx_can: fix recovery from error states not being propagated (bnc#1012382).
- can: xilinx_can: keep only 1-2 frames in TX FIFO to fix TX accounting (bnc#1012382).
- cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status (bnc#1012382).
- ceph: fix incorrect use of strncpy (bsc#1107319).
- ceph: return errors from posix_acl_equiv_mode() correctly (bsc#1107320).
- cifs: Fix stack out-of-bounds in smb{2,3}_create_lease_buf() (bsc#1012382).
- cifs: add missing debug entries for kconfig options (bnc#1012382).
- cifs: check kmalloc before use (bsc#1012382).
- cifs: store the leaseKey in the fid on SMB2_open (bsc#1012382).
- clk: tegra: Fix PLL_U post divider and initial rate on Tegra30 (bnc#1012382).
- crypto: ablkcipher - fix crash flushing dcache in error path (bnc#1012382).
- crypto: authenc - do not leak pointers to authenc keys (bnc#1012382).
- crypto: authencesn - do not leak pointers to authenc keys (bnc#1012382).
- crypto: blkcipher - fix crash flushing dcache in error path (bnc#1012382).
- crypto: padlock-aes - Fix Nano workaround data corruption (bnc#1012382).
- crypto: vmac - require a block cipher with 128-bit block size (bnc#1012382).
- crypto: vmac - separate tfm and request context (bnc#1012382).
- crypto: vmx - Fix sleep-in-atomic bugs (bsc#1048317).
- cxgb4: when disabling dcb set txq dcb priority to 0 (bnc#1012382).
- cxl: Fix wrong comparison in cxl_adapter_context_get() (bsc#1055014).
- dccp: fix undefined behavior with 'cwnd' shift in ccid2_cwnd_restart() (bnc#1012382).
- disable loading f2fs module on PAGE_SIZE > 4KB (bnc#1012382).
- dm cache metadata: save in-core policy_hint_size to on-disk superblock (bnc#1012382).
- dma-iommu: Fix compilation when !CONFIG_IOMMU_DMA (bnc#1012382).
- dmaengine: k3dma: Off by one in k3_of_dma_simple_xlate() (bnc#1012382).
- dmaengine: pxa_dma: remove duplicate const qualifier (bnc#1012382).
- driver core: Partially revert 'driver core: correct device's shutdown order' (bnc#1012382).
- drivers: net: lmc: fix case value for target abort error (bnc#1012382).
- drm/armada: fix colorkey mode property (bnc#1012382).
- drm/atmel-hlcdc: check stride values in the first plane (bsc#1106929).
- drm/atomic: Handling the case when setting old crtc for plane (bnc#1012382).
- drm/bridge: adv7511: Reset registers on hotplug (bnc#1012382).
- drm/cirrus: Use drm_framebuffer_put to avoid kernel oops in clean-up (bsc#1101822).
- drm/drivers: add support for using the arch wc mapping API.
- drm/exynos/dsi: mask frame-done interrupt (bsc#1106929).
- drm/exynos: decon5433: Fix WINCONx reset value (bnc#1012382).
- drm/exynos: decon5433: Fix per-plane global alpha for XRGB modes (bnc#1012382).
- drm/exynos: gsc: Fix support for NV16/61, YUV420/YVU420 and YUV422 modes (bnc#1012382).
- drm/gma500: fix psb_intel_lvds_mode_valid()'s return type (bnc#1012382).
- drm/i915/userptr: reject zero user_size (bsc#1090888).
- drm/i915: Correctly handle limited range YCbCr data on VLV/CHV (bsc#1087092).
- drm/imx: fix typo in ipu_plane_formats (bsc#1106929).
- drm/imx: imx-ldb: check if channel is enabled before printing warning (bnc#1012382).
- drm/imx: imx-ldb: disable LDB on driver bind (bnc#1012382).
- drm/msm/hdmi: Use bitwise operators when building register values (bsc#1106929).
- drm/nouveau/gem: off by one bugs in nouveau_gem_pushbuf_reloc_apply() (bnc#1012382).
- drm/panel: type promotion bug in s6e8aa0_read_mtp_id() (bsc#1105769).
- drm/radeon: fix mode_valid's return type (bnc#1012382).
- drm: Add DP PSR2 sink enable bit (bnc#1012382).
- drm: Reject getfb for multi-plane framebuffers (bsc#1106929).
- enic: do not call enic_change_mtu in enic_probe
- enic: handle mtu change for vf properly (bnc#1012382).
- enic: initialize enic->rfs_h.lock in enic_probe (bnc#1012382).
- esp6: fix memleak on error path in esp6_input
- ext4: check for NUL characters in extended attribute's name (bnc#1012382).
- ext4: check for allocation block validity with block group locked (bsc#1104495).
- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).
- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).
- ext4: fix inline data updates with checksums enabled (bsc#1104494).
- ext4: fix spectre gadget in ext4_mb_regular_allocator() (bnc#1012382).
- ext4: reset error code in ext4_find_entry in fallback (bnc#1012382).
- ext4: sysfs: print ext4_super_block fields as little-endian (bsc#1106229).
- f2fs: fix to do not trigger writeback during recovery (bnc#1012382).
- fat: fix memory allocation failure handling of match_strdup() (bnc#1012382).
- fb: fix lost console when the user unplugs a USB adapter (bnc#1012382).
- fbdev: omapfb: off by one in omapfb_register_client() (bsc#1106929).
- fix __legitimize_mnt()/mntput() race (bnc#1012382).
- fix mntput/mntput race (bnc#1012382).
- fork: unconditionally clear stack on fork (bnc#1012382).
- fs/9p/xattr.c: catch the error of p9_client_clunk when setting xattr failed (bnc#1012382).
- fs/dax.c: fix inefficiency in dax_writeback_mapping_range() (bsc#1106185).
- fs/quota: Fix spectre gadget in do_quotactl (bnc#1012382).
- fs: aio: fix the increment of aio-nr and counting against aio-max-nr (bsc#1068075, bsc#1078921).
- fuse: Add missed unlock_page() to fuse_readpages_fill() (bnc#1012382).
- fuse: Do not access pipe->buffers without pipe_lock() (bnc#1012382).
- fuse: Fix oops at process_init_reply() (bnc#1012382).
- fuse: fix double request_end() (bnc#1012382).
- fuse: fix unlocked access to processing queue (bnc#1012382).
- fuse: umount should wait for all requests (bnc#1012382).
- genirq/proc: Return proper error code when irq_set_affinity() fails (bnc#1105392).
- getxattr: use correct xattr length (bnc#1012382).
- hfsplus: Do not clear SGID when inheriting ACLs (bsc#1030552).
- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bnc#1012382).
- hwrng: exynos - Disable runtime PM on driver unbind.
- i2c: davinci: Avoid zero value of CLKH (bnc#1012382).
- i2c: imx: Fix race condition in dma read (bnc#1012382).
- i2c: imx: Fix reinit_completion() use (bnc#1012382).
- i2c: ismt: fix wrong device address when unmap the data buffer (bnc#1012382).
- i40e: use cpumask_copy instead of direct assignment (bsc#1053685).
- i40iw: Fix memory leak in error path of create QP (bsc#969476 bsc#969477).
- i40iw: Use correct address in dst_neigh_lookup for IPv6 (bsc#969476 bsc#969477).
- ibmvnic: Include missing return code checks in reset function (bnc#1107966).
- ieee802154: at86rf230: switch from BUG_ON() to WARN_ON() on problem (bnc#1012382).
- ieee802154: at86rf230: use __func__ macro for debug messages (bnc#1012382).
- ieee802154: fakelb: switch from BUG_ON() to WARN_ON() on problem (bnc#1012382).
- igb: Fix not adding filter elements to the list (bsc#1024361 bsc#1024365).
- iio: ad9523: Fix displayed phase (bnc#1012382).
- iio: ad9523: Fix return value for ad952x_store() (bnc#1012382).
- inet: frag: enforce memory limits earlier (bnc#1012382 bsc#970506).
- iommu/amd: make sure TLB to be flushed before IOVA freed (bsc#1106105).
- iommu/vt-d: Add definitions for PFSID (bnc#1012382).
- iommu/vt-d: Fix dev iotlb pfsid use (bnc#1012382).
- iommu/vt-d: Ratelimit each dmar fault printing (bsc#1106105).
- ioremap: Update pgtable free interfaces with addr (bnc#1012382).
- ip: hash fragments consistently (bnc#1012382).
- ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull (bnc#1012382).
- ipconfig: Correctly initialise ic_nameservers (bnc#1012382).
- ipv4+ipv6: Make INET*_ESP select CRYPTO_ECHAINIV (bnc#1012382).
- ipv4: Return EINVAL when ping_group_range sysctl does not map to user ns (bnc#1012382).
- ipv4: remove BUG_ON() from fib_compute_spec_dst (bnc#1012382).
- ipv6: fix useless rol32 call on hash (bnc#1012382).
- ipv6: mcast: fix unsolicited report interval after receiving querys (bnc#1012382).
- ipvlan: use ETH_MAX_MTU as max mtu (bsc#1033962).
- iscsi target: fix session creation failure handling (bnc#1012382).
- isdn: Disable IIOCDBGVAR (bnc#1012382).
- iw_cxgb4: remove duplicate memcpy() in c4iw_create_listen() (bsc#969476 bsc#969477).
- iwlwifi: pcie: fix race in Rx buffer allocator (bnc#1012382).
- ixgbe: Be more careful when modifying MAC filters (bnc#1012382).
- jfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- jump_label: Add RELEASE barrier after text changes (bsc#1105271).
- jump_label: Fix concurrent static_key_enable/disable() (bsc#1105271).
- jump_label: Move CPU hotplug locking (bsc#1105271).
- jump_label: Provide hotplug context variants (bsc#1105271).
- jump_label: Reduce the size of struct static_key (bsc#1105271).
- jump_label: Reorder hotplug lock and jump_label_lock (bsc#1105271).
- jump_label: Split out code under the hotplug lock (bsc#1105271).
- jump_label: remove bug.h, atomic.h dependencies for HAVE_JUMP_LABEL (bsc#1105271).
- kABI: protect enum tcp_ca_event (kabi).
- kABI: reexport tcp_send_ack (kabi).
- kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- kasan: do not emit builtin calls when sanitization is off (bnc#1012382).
- kasan: fix shadow_size calculation error in kasan_module_alloc (bnc#1012382).
- kbuild: verify that $DEPMOD is installed (bnc#1012382).
- kernel: improve spectre mitigation (bnc#1106934, LTC#171029).
- kprobes/x86: Fix %p uses in error messages (bnc#1012382).
- kprobes: Make list and blacklist root user read only (bnc#1012382).
- kthread, tracing: Do not expose half-written comm when creating kthreads (bsc#1104897).
- kvm: x86: vmx: fix vpid leak (bnc#1012382).
- l2tp: use sk_dst_check() to avoid race on sk->sk_dst_cache (bnc#1012382).
- lib/rhashtable: consider param->min_size when setting initial table size (bnc#1012382).
- libata: Fix command retry decision (bnc#1012382).
- libceph: check authorizer reply/challenge length before reading (bsc#1096748).
- libceph: factor out __ceph_x_decrypt() (bsc#1096748).
- libceph: factor out __prepare_write_connect() (bsc#1096748).
- libceph: factor out encrypt_authorizer() (bsc#1096748).
- libceph: store ceph_auth_handshake pointer in ceph_connection (bsc#1096748).
- libceph: weaken sizeof check in ceph_x_verify_authorizer_reply() (bsc#1096748).
- llc: use refcount_inc_not_zero() for llc_sap_find() (bnc#1012382).
- locking/lockdep: Do not record IRQ state within lockdep code (bnc#1012382).
- locks: pass inode pointer to locks_free_lock_context (bsc@1099832).
- locks: prink more detail when there are leaked locks (bsc#1099832).
- locks: restore a warn for leaked locks on close (bsc#1099832).
- m68k: fix 'bad page state' oops on ColdFire boot (bnc#1012382).
- mac80211: add stations tied to AP_VLANs during hw reconfig (bnc#1012382).
- md/raid10: fix that replacement cannot complete recovery after reassemble (bnc#1012382).
- md: fix NULL dereference of mddev->pers in remove_and_add_spares() (bnc#1012382).
- media: omap3isp: fix unbalanced dma_iommu_mapping (bnc#1012382).
- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bnc#1012382).
- media: rtl28xxu: be sure that it won't go past the array size (bsc#1050431).
- media: s5p-jpeg: fix number of components macro (bsc#1050431).
- media: saa7164: Fix driver name in debug output (bnc#1012382).
- media: si470x: fix __be16 annotations (bnc#1012382).
- media: siano: get rid of __le32/__le16 cast warnings (bnc#1012382).
- media: staging: omap4iss: Include asm/cacheflush.h after generic includes (bnc#1012382).
- media: videobuf2-core: do not call memop 'finish' when queueing (bnc#1012382).
- memory: tegra: Apply interrupts mask per SoC (bnc#1012382).
- memory: tegra: Do not handle spurious interrupts (bnc#1012382).
- mfd: cros_ec: Fail early if we cannot identify the EC (bnc#1012382).
- microblaze: Fix simpleImage format generation (bnc#1012382).
- mm/hugetlb: filter out hugetlb pages if HUGEPAGE migration is not supported (bnc#1106697).
- mm/memory.c: check return value of ioremap_prot (bnc#1012382).
- mm/slub.c: add __printf verification to slab_err() (bnc#1012382).
- mm/tlb: Remove tlb_remove_table() non-concurrent condition (bnc#1012382).
- mm: Add vm_insert_pfn_prot() (bnc#1012382).
- mm: fix cache mode tracking in vm_insert_mixed() (bnc#1012382).
- mm: memcg: fix use after free in mem_cgroup_iter() (bnc#1012382).
- mm: vmalloc: avoid racy handling of debugobjects in vunmap (bnc#1012382).
- mm: x86: move _PAGE_SWP_SOFT_DIRTY from bit 7 to bit 1 (bnc#1012382).
- mtd: rawnand: fsl_ifc: fix FSL NAND driver to read all ONFI parameter pages (bnc#1012382).
- mtd: ubi: wl: Fix error return code in ubi_wl_init().
- mwifiex: correct histogram data with appropriate index (bnc#1012382).
- mwifiex: handle race during mwifiex_usb_disconnect (bnc#1012382).
- net/9p/client.c: version pointer uninitialized (bnc#1012382).
- net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree() (bnc#1012382).
- net/ethernet/freescale/fman: fix cross-build error (bnc#1012382).
- net/ipv4: Set oif in fib_compute_spec_dst (bnc#1012382).
- net/mlx4_core: Save the qpn from the input modifier in RST2INIT wrapper (bnc#1012382).
- net/mlx5: Add missing SET_DRIVER_VERSION command translation (bsc#1015342 bsc#1015343).
- net/mlx5: E-Switch, Include VF RDMA stats in vport statistics (bsc#966170 bsc#966172).
- net/mlx5: Eswitch, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1015342 bsc#1015343).
- net/mlx5: Fix wrong size allocation for QoS ETC TC regitster (bsc#966170 bsc#966172).
- net/mlx5: Vport, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#966170 bsc#966172).
- net/mlx5e: Do not allow aRFS for encapsulated packets (bsc#1015342 bsc#1015343).
- net/mlx5e: Err if asked to offload TC match on frag being first (bsc#1015342 bsc#1015343).
- net/mlx5e: Fix quota counting in aRFS expire flow (bsc#1015342 bsc#1015343).
- net/mlx5e: Refine ets validation function (bsc#966170 bsc#966172).
- net: 6lowpan: fix reserved space for single frames (bnc#1012382).
- net: Do not copy pfmemalloc flag in __copy_skb_header() (bnc#1012382).
- net: add skb_condense() helper (bsc#1089066).
- net: adjust skb->truesize in ___pskb_trim() (bsc#1089066).
- net: adjust skb->truesize in pskb_expand_head() (bsc#1089066).
- net: axienet: Fix double deregister of mdio (bnc#1012382).
- net: caif: Add a missing rcu_read_unlock() in caif_flow_cb (bnc#1012382).
- net: davinci_emac: match the mdio device against its compatible if possible (bnc#1012382).
- net: dsa: Do not suspend/resume closed slave_dev (bnc#1012382).
- net: ena: Fix use of uninitialized DMA address bits field (bsc#1027968).
- net: fix amd-xgbe flow-control issue (bnc#1012382).
- net: hamradio: use eth_broadcast_addr (bnc#1012382).
- net: lan78xx: Fix misplaced tasklet_schedule() call (bnc#1012382).
- net: lan78xx: fix rx handling before first packet is send (bnc#1012382).
- net: mac802154: tx: expand tailroom if necessary (bnc#1012382).
- net: phy: fix flag masking in __set_phy_supported (bnc#1012382).
- net: prevent ISA drivers from building on PPC32 (bnc#1012382).
- net: propagate dev_get_valid_name return code (bnc#1012382).
- net: qca_spi: Avoid packet drop during initial sync (bnc#1012382).
- net: qca_spi: Fix log level if probe fails (bnc#1012382).
- net: qca_spi: Make sure the QCA7000 reset is triggered (bnc#1012382).
- net: socket: fix potential spectre v1 gadget in socketcall (bnc#1012382).
- net: usb: rtl8150: demote allmulti message to dev_dbg() (bnc#1012382).
- net: vmxnet3: use new api ethtool_{get|set}_link_ksettings (bsc#1091860 bsc#1098253).
- net_sched: Fix missing res info when create new tc_index filter (bnc#1012382).
- net_sched: fix NULL pointer dereference when delete tcindex filter (bnc#1012382).
- netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state (bnc#1012382).
- netfilter: ipset: List timing out entries with 'timeout 1' instead of zero (bnc#1012382).
- netfilter: ipv6: nf_defrag: reduce struct net memory waste (bnc#1012382).
- netfilter: ipvs: do not create conn for ABORT packet in sctp_conn_schedule (bsc#1102797).
- netfilter: ipvs: fix the issue that sctp_conn_schedule drops non-INIT packet (bsc#1102797).
- netfilter: x_tables: set module owner for icmp(6) matches (bnc#1012382).
- netlink: Do not shift on 64 for ngroups (bnc#1012382).
- netlink: Do not shift with UB on nlk->ngroups (bnc#1012382).
- netlink: Do not subscribe to non-existent groups (bnc#1012382).
- netlink: Fix spectre v1 gadget in netlink_create() (bnc#1012382).
- netlink: do not enter direct reclaim from netlink_trim() (bsc#1042286).
- nfsd: fix potential use-after-free in nfsd4_decode_getdeviceinfo (bnc#1012382).
- nl80211: Add a missing break in parse_station_flags (bnc#1012382).
- nohz: Fix local_timer_softirq_pending() (bnc#1012382).
- nvme-fc: release io queues to allow fast fail (bsc#1102486).
- nvme: if_ready checks to fail io to deleting controller (bsc#1102486).
- nvme: kABI-compliant version of nvmf_fail_nonready_command() (bsc#1102486).
- nvmet-fc: fix target sgl list on large transfers (bsc#1102486).
- osf_getdomainname(): use copy_to_user() (bnc#1012382).
- ovl: Do d_type check only if work dir creation was successful (bnc#1012382).
- ovl: Ensure upper filesystem supports d_type (bnc#1012382).
- ovl: warn instead of error if d_type is not supported (bnc#1012382).
- packet: refine ring v3 block size test to hold one frame (bnc#1012382).
- packet: reset network header if packet shorter than ll reserved space (bnc#1012382).
- parisc: Define mb() and add memory barriers to assembler unlock sequences (bnc#1012382).
- parisc: Enable CONFIG_MLONGCALLS by default (bnc#1012382).
- parisc: Remove ordered stores from syscall.S (bnc#1012382).
- parisc: Remove unnecessary barriers from spinlock.h (bnc#1012382).
- perf auxtrace: Fix queue resize (bnc#1012382).
- perf llvm-utils: Remove bashism from kernel include fetch script (bnc#1012382).
- perf report powerpc: Fix crash if callchain is empty (bnc#1012382).
- perf test session topology: Fix test on s390 (bnc#1012382).
- perf/x86/intel/uncore: Correct fixed counter index check for NHM (bnc#1012382).
- perf/x86/intel/uncore: Correct fixed counter index check in generic code (bnc#1012382).
- perf: fix invalid bit in diagnostic entry (bnc#1012382).
- pinctrl: at91-pio4: add missing of_node_put (bnc#1012382).
- pinctrl: freescale: off by one in imx1_pinconf_group_dbg_show() (bnc#1012382).
- pnfs/blocklayout: off by one in bl_map_stripe() (bnc#1012382).
- powerpc/32: Add a missing include header (bnc#1012382).
- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032).
- powerpc/64s: Fix compiler store ordering to SLB shadow area (bnc#1012382).
- powerpc/8xx: fix invalid register expression in head_8xx.S (bnc#1012382).
- powerpc/chrp/time: Make some functions static, add missing header include (bnc#1012382).
- powerpc/embedded6xx/hlwd-pic: Prevent interrupts from being handled by Starlet (bnc#1012382).
- powerpc/fadump: handle crash memory ranges array index overflow (bsc#1103269).
- powerpc/fadump: merge adjacent memory ranges to reduce PT_LOAD segements (bsc#1103269).
- powerpc/lib: Fix the feature fixup tests to actually work (bsc#1066223).
- powerpc/powermac: Add missing prototype for note_bootable_part() (bnc#1012382).
- powerpc/powermac: Mark variable x as unused (bnc#1012382).
- powerpc/pseries: Fix endianness while restoring of r3 in MCE handler (bnc#1012382).
- powerpc/topology: Get topology for shared processors at boot (bsc#1104683).
- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157).
- powerpc: Avoid code patching freed init sections (bnc#1107735).
- powerpc: make feature-fixup tests fortify-safe (bsc#1066223).
- provide special timeout module parameters for EC2 (bsc#1065364).
- ptp: fix missing break in switch (bnc#1012382).
- pwm: tiehrpwm: Fix disabling of output of PWMs (bnc#1012382).
- qed: Add sanity check for SIMD fastpath handler (bnc#1012382).
- qed: Correct Multicast API to reflect existence of 256 approximate buckets (bsc#1019695 bsc#1019699 bsc#1022604).
- qed: Do not advertise DCBX_LLD_MANAGED capability (bsc#1019695 bsc#1019699 bsc#1022604).
- qed: Fix possible memory leak in Rx error path handling (bsc#1019695 bsc#1019699 bsc#1022604 ).
- qed: Fix possible race for the link state value (bnc#1012382).
- qed: Fix setting of incorrect eswitch mode (bsc#1019695 bsc#1019699 bsc#1022604).
- qed: Fix use of incorrect size in memcpy call (bsc#1019695 bsc#1019699 bsc#1022604).
- qede: Adverstise software timestamp caps when PHC is not available (bsc#1019695 bsc#1019699 bsc#1022604).
- qlge: Fix netdev features configuration (bsc#1098822).
- qlogic: check kstrtoul() for errors (bnc#1012382).
- random: mix rdrand with entropy sent in from userspace (bnc#1012382).
- readahead: stricter check for bdi io_pages (VM Functionality).
- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bnc#1012382).
- reiserfs: fix broken xattr handling (heap corruption, bad retval) (bnc#1012382).
- ring_buffer: tracing: Inherit the tracing setting to next ring buffer (bnc#1012382).
- root dentries need RCU-delayed freeing (bnc#1012382).
- rsi: Fix 'invalid vdd' warning in mmc (bnc#1012382).
- rtc: ensure rtc_set_alarm fails when alarms are not supported (bnc#1012382).
- rtnetlink: add rtnl_link_state check in rtnl_configure_link (bnc#1012382).
- s390/cpum_sf: Add data entry sizes to sampling trailer entry (bnc#1012382).
- s390/kvm: fix deadlock when killed by oom (bnc#1012382).
- s390/lib: use expoline for all bcr instructions (bnc#1106934, LTC#171029).
- s390/pci: fix out of bounds access during irq setup (bnc#1012382).
- s390/qdio: reset old sbal_state flags (bnc#1012382).
- s390/qeth: do not clobber buffer on async TX completion (bnc#1104485, LTC#170349).
- s390/qeth: fix race when setting MAC address (bnc#1104485, LTC#170726).
- s390: add explicit <linux/stringify.h> for jump label (bsc#1105271).
- s390: detect etoken facility (bnc#1106934, LTC#171029).
- s390: fix br_r1_trampoline for machines without exrl (bnc#1012382 bnc#1106934 LTC#171029).
- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).
- scripts/tar-up.sh: Do not package gitlog-excludes file Also fix the evaluation of gitlog-excludes file, too
- scsi: 3w-xxxx: fix a missing-check bug (bnc#1012382).
- scsi: core: Avoid that SCSI device removal through sysfs triggers a deadlock (bnc#1012382).
- scsi: fcoe: drop frames in ELS LOGO error path (bnc#1012382).
- scsi: hpsa: limit transfer length to 1MB, not 512kB (bsc#1102346).
- scsi: libiscsi: fix possible NULL pointer dereference in case of TMF (bnc#1012382).
- scsi: megaraid: silence a static checker bug (bnc#1012382).
- scsi: megaraid_sas: Increase timeout by 1 sec for non-RAID fastpath IOs (bnc#1012382).
- scsi: qla2xxx: Fix ISP recovery on unload (bnc#1012382).
- scsi: qla2xxx: Return error when TMF returns (bnc#1012382).
- scsi: scsi_dh: replace too broad 'TP9' string with the exact models (bnc#1012382).
- scsi: sr: Avoid that opening a CD-ROM hangs with runtime power management enabled (bnc#1012382).
- scsi: sysfs: Introduce sysfs_{un,}break_active_protection() (bnc#1012382).
- scsi: ufs: fix exception event handling (bnc#1012382).
- scsi: vmw_pvscsi: Return DID_RESET for status SAM_STAT_COMMAND_TERMINATED (bnc#1012382).
- scsi: xen-scsifront: add error handling for xenbus_printf (bnc#1012382).
- scsi_debug: call resp_XXX function after setting host_scribble (bsc#1069138).
- scsi_debug: reset injection flags for every_nth > 0 (bsc#1069138).
- selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC (bnc#1012382).
- selftest/seccomp: Fix the seccomp(2) signature (bnc#1012382).
- selftests/ftrace: Add snapshot and tracing_on test case (bnc#1012382).
- selftests/x86/sigreturn/64: Fix spurious failures on AMD CPUs (bnc#1012382).
- selftests: pstore: return Kselftest Skip code for skipped tests (bnc#1012382).
- selftests: static_keys: return Kselftest Skip code for skipped tests (bnc#1012382).
- selftests: sync: add config fragment for testing sync framework (bnc#1012382).
- selftests: user: return Kselftest Skip code for skipped tests (bnc#1012382).
- selftests: zram: return Kselftest Skip code for skipped tests (bnc#1012382).
- serial: 8250_dw: always set baud rate in dw8250_set_termios (bnc#1012382).
- sfc: stop the TX queue before pushing new buffers (bsc#1017967 ).
- skbuff: Unconditionally copy pfmemalloc in __skb_clone() (bnc#1012382).
- slab: __GFP_ZERO is incompatible with a constructor (bnc#1107060).
- smb3: Do not send SMB3 SET_INFO if nothing changed (bnc#1012382).
- smb3: do not request leases in symlink creation and query (bnc#1012382).
- spi: davinci: fix a NULL pointer dereference (bnc#1012382).
- squashfs: be more careful about metadata corruption (bnc#1012382).
- squashfs: more metadata hardening (bnc#1012382).
- squashfs: more metadata hardenings (bnc#1012382).
- staging: android: ion: check for kref overflow (bnc#1012382).
- string: drop __must_check from strscpy() and restore strscpy() usages in cgroup (bsc#1107319).
- sys: do not hold uts_sem while accessing userspace memory (bnc#1106995).
- target_core_rbd: use RCU in free_device (bsc#1105524).
- tcp: Fix missing range_truesize enlargement in the backport (bnc#1012382).
- tcp: add max_quickacks param to tcp_incr_quickack and tcp_enter_quickack_mode (bnc#1012382).
- tcp: add one more quick ack after after ECN events (bnc#1012382).
- tcp: do not aggressively quick ack after ECN events (bnc#1012382).
- tcp: do not cancel delay-AcK on DCTCP special ACK (bnc#1012382).
- tcp: do not delay ACK in DCTCP upon CE status change (bnc#1012382).
- tcp: do not force quickack when receiving out-of-order packets (bnc#1012382).
- tcp: fix dctcp delayed ACK schedule (bnc#1012382).
- tcp: helpers to send special DCTCP ack (bnc#1012382).
- tcp: identify cryptic messages as TCP seq # bugs (bnc#1012382).
- tcp: refactor tcp_ecn_check_ce to remove sk type cast (bnc#1012382).
- tcp: remove DELAYED ACK events in DCTCP (bnc#1012382).
- tg3: Add higher cpu clock for 5762 (bnc#1012382).
- thermal: exynos: fix setting rising_threshold for Exynos5433 (bnc#1012382).
- timekeeping: Eliminate the stale declaration of ktime_get_raw_and_real_ts64() (bsc#969470).
- tools/power turbostat: Read extended processor family from CPUID (bnc#1012382).
- tools/power turbostat: fix -S on UP systems (bnc#1012382).
- tools: usb: ffs-test: Fix build on big endian systems (bnc#1012382).
- tpm: fix race condition in tpm_common_write() (bnc#1012382).
- tracing/blktrace: Fix to allow setting same value (bnc#1012382).
- tracing/kprobes: Fix trace_probe flags on enable_trace_kprobe() failure (bnc#1012382).
- tracing: Do not call start/stop() functions when tracing_on does not change (bnc#1012382).
- tracing: Fix double free of event_trigger_data (bnc#1012382).
- tracing: Fix possible double free in event_enable_trigger_func() (bnc#1012382).
- tracing: Quiet gcc warning about maybe unused link variable (bnc#1012382).
- tracing: Use __printf markup to silence compiler (bnc#1012382).
- tty: Fix data race in tty_insert_flip_string_fixed_flag (bnc#1012382).
- turn off -Wattribute-alias (bnc#1012382).
- ubi: Be more paranoid while seaching for the most recent Fastmap (bnc#1012382).
- ubi: Fix Fastmap's update_vol() (bnc#1012382).
- ubi: Fix races around ubi_refill_pools() (bnc#1012382).
- ubi: Introduce vol_ignored() (bnc#1012382).
- ubi: Rework Fastmap attach base code (bnc#1012382).
- ubi: fastmap: Erase outdated anchor PEBs during attach (bnc#1012382).
- ubifs: Check data node size before truncate (bsc#1106276).
- ubifs: Fix memory leak in lprobs self-check (bsc#1106278).
- ubifs: Fix synced_i_size calculation for xattr inodes (bsc#1106275).
- ubifs: xattr: Do not operate on deleted inodes (bsc#1106271).
- udl-kms: change down_interruptible to down (bnc#1012382).
- udl-kms: fix crash due to uninitialized memory (bnc#1012382).
- udl-kms: handle allocation failure (bnc#1012382).
- udlfb: set optimal write delay (bnc#1012382).
- uprobes: Use synchronize_rcu() not synchronize_sched() (bnc#1012382).
- usb/phy: fix PPC64 build errors in phy-fsl-usb.c (bnc#1012382).
- usb: audio-v2: Correct the comment for struct uac_clock_selector_descriptor (bsc#1099810).
- usb: cdc_acm: Add quirk for Castles VEGA3000 (bnc#1012382).
- usb: dwc2: debugfs: Do not touch RX FIFO during register dump (bsc#1100132).
- usb: dwc2: fix isoc split in transfer with no data (bnc#1012382).
- usb: gadget: composite: fix delayed_status race condition when set_interface (bnc#1012382).
- usb: gadget: dwc2: fix memory leak in gadget_init() (bnc#1012382).
- usb: gadget: f_fs: Only return delayed status when len is 0 (bnc#1012382).
- usb: gadget: f_uac2: fix endianness of 'struct cntrl_*_lay3' (bnc#1012382).
- usb: gadget: r8a66597: Fix a possible sleep-in-atomic-context bugs in r8a66597_queue() (bnc#1012382).
- usb: gadget: r8a66597: Fix two possible sleep-in-atomic-context bugs in init_controller() (bnc#1012382).
- usb: hub: Do not wait for connect state at resume for powered-off ports (bnc#1012382).
- usb: renesas_usbhs: gadget: fix spin_lock_init() for &uep->lock (bsc#1085536).
- usb: xhci: increase CRS timeout value (bnc#1012382).
- usbip: usbip_detach: Fix memory, udev context and udev leak (bnc#1012382).
- userns: move user access out of the mutex (bnc#1012382).
- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).
- virtio_balloon: fix another race between migration and ballooning (bnc#1012382).
- vmw_balloon: VMCI_DOORBELL_SET does not check status (bnc#1012382).
- vmw_balloon: do not use 2MB without batching (bnc#1012382).
- vmw_balloon: fix VMCI use when balloon built into kernel (bnc#1012382).
- vmw_balloon: fix inflation of 64-bit GFNs (bnc#1012382).
- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1091860 bsc#1098253).
- vmxnet3: add receive data ring support (bsc#1091860 bsc#1098253).
- vmxnet3: add support for get_coalesce, set_coalesce ethtool operations (bsc#1091860 bsc#1098253).
- vmxnet3: allow variable length transmit data ring buffer (bsc#1091860 bsc#1098253).
- vmxnet3: avoid assumption about invalid dma_pa in vmxnet3_set_mc() (bsc#1091860 bsc#1098253).
- vmxnet3: avoid format strint overflow warning (bsc#1091860 bsc#1098253).
- vmxnet3: avoid xmit reset due to a race in vmxnet3 (bsc#1091860 bsc#1098253).
- vmxnet3: fix incorrect dereference when rxvlan is disabled (bsc#1091860 bsc#1098253).
- vmxnet3: fix non static symbol warning (bsc#1091860 bsc#1098253).
- vmxnet3: fix tx data ring copy for variable size (bsc#1091860 bsc#1098253).
- vmxnet3: increase default rx ring sizes (bsc#1091860 bsc#1098253).
- vmxnet3: introduce command to register memory region (bsc#1091860 bsc#1098253).
- vmxnet3: introduce generalized command interface to configure the device (bsc#1091860 bsc#1098253).
- vmxnet3: prepare for version 3 changes (bsc#1091860 bsc#1098253).
- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1091860 bsc#1098253).
- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1091860 bsc#1098253).
- vmxnet3: set the DMA mask before the first DMA map operation (bsc#1091860 bsc#1098253).
- vmxnet3: update to version 3 (bsc#1091860 bsc#1098253).
- vmxnet3: use DMA memory barriers where required (bsc#1091860 bsc#1098253).
- vmxnet3: use correct flag to indicate LRO feature (bsc#1091860 bsc#1098253).
- vsock: split dwork to avoid reinitializations (bnc#1012382).
- vti6: Fix dev->max_mtu setting (bsc#1033962).
- vti6: fix PMTU caching and reporting on xmit (bnc#1012382).
- wlcore: sdio: check for valid platform device data before suspend (bnc#1012382).
- x86/MCE: Remove min interval polling limitation (bnc#1012382).
- x86/amd: do not set X86_BUG_SYSRET_SS_ATTRS when running under Xen (bnc#1012382).
- x86/asm/entry/32: Simplify pushes of zeroed pt_regs->REGs (bnc#1012382).
- x86/bugs: Move the l1tf function and define pr_fmt properly (bnc#1012382).
- x86/bugs: Respect nospec command line option (bsc#1068032).
- x86/cpu/AMD: Fix erratum 1076 (CPB bit) (bnc#1012382).
- x86/cpu: Make alternative_msr_write work for 32-bit code (bnc#1012382).
- x86/cpu: Re-apply forced caps every time CPU caps are re-read (bnc#1012382).
- x86/cpufeatures: Add CPUID_7_EDX CPUID leaf (bnc#1012382).
- x86/cpufeatures: Clean up Spectre v2 related CPUID flags (bnc#1012382).
- x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface (bnc#1012382).
- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).
- x86/init: fix build with CONFIG_SWAP=n (bnc#1012382).
- x86/irqflags: Mark native_restore_fl extern inline (bnc#1012382).
- x86/irqflags: Provide a declaration for native_save_fl.
- x86/mm/kmmio: Make the tracer robust against L1TF (bnc#1012382).
- x86/mm/pat: Fix L1TF stable backport for CPA (bnc#1012382).
- x86/mm/pat: Fix L1TF stable backport for CPA, 2nd call (bnc#1012382).
- x86/mm/pat: Make set_memory_np() L1TF safe (bnc#1012382).
- x86/mm: Add TLB purge to free pmd/pte page interfaces (bnc#1012382).
- x86/mm: Disable ioremap free page handling on x86-PAE (bnc#1012382).
- x86/mm: Give each mm TLB flush generation a unique ID (bnc#1012382).
- x86/paravirt: Fix spectre-v2 mitigations for paravirt guests (bnc#1012382).
- x86/paravirt: Make native_save_fl() extern inline (bnc#1012382).
- x86/process: Correct and optimize TIF_BLOCKSTEP switch (bnc#1012382).
- x86/process: Optimize TIF checks in __switch_to_xtra() (bnc#1012382).
- x86/process: Optimize TIF_NOTSC switch (bnc#1012382).
- x86/process: Re-export start_thread() (bnc#1012382).
- x86/spectre: Add missing family 6 check to microcode check (bnc#1012382).
- x86/spectre_v2: Do not check microcode versions when running under hypervisors (bnc#1012382).
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion (bnc#1012382).
- x86/speculation/l1tf: Extend 64bit swap file size limit (bnc#1012382).
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1012382).
- x86/speculation/l1tf: Fix up CPU feature flags (bnc#1012382).
- x86/speculation/l1tf: Fix up pte->pfn conversion for PAE (bnc#1012382).
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- x86/speculation/l1tf: Invert all not present mappings (bnc#1012382).
- x86/speculation/l1tf: Make pmd/pud_mknotpresent() invert (bnc#1012382).
- x86/speculation/l1tf: Protect PAE swap entries against L1TF (bnc#1012382).
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).
- x86/speculation/l1tf: Unbreak !__HAVE_ARCH_PFN_MODIFY_ALLOWED architectures (bnc#1012382).
- x86/speculation: Add <asm/msr-index.h> dependency (bnc#1012382).
- x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support (bnc#1012382).
- x86/speculation: Clean up various Spectre related details (bnc#1012382).
- x86/speculation: Correct Speculation Control microcode blacklist again (bnc#1012382).
- x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP (bnc#1012382).
- x86/speculation: Update Speculation Control microcode blacklist (bnc#1012382).
- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).
- x86/speculation: Use IBRS if available before calling into firmware (bnc#1012382).
- x86/speculation: Use Indirect Branch Prediction Barrier in context switch (bnc#1012382).
- x86/xen: Add call of speculative_store_bypass_ht_init() to PV paths (bnc#1012382).
- xen-netfront: wait xenbus state change when load module manually (bnc#1012382).
- xen/blkback: do not keep persistent grants too long (bsc#1085042).
- xen/blkback: move persistent grants flags to bool (bsc#1085042).
- xen/blkfront: cleanup stale persistent grants (bsc#1085042).
- xen/blkfront: reorder tests in xlblk_init() (bsc#1085042).
- xen/netfront: do not cache skb_shinfo() (bnc#1012382).
- xen: set cpu capabilities from xen_start_kernel() (bnc#1012382).
- xfrm: fix missing dst_release() after policy blocking lbcast and multicast (bnc#1012382).
- xfrm: free skb if nlsk pointer is NULL (bnc#1012382).
- xfrm_user: prevent leaking 2 bytes of kernel memory (bnc#1012382).
- xfs: Remove dead code from inode recover function (bsc#1105396).
- xfs: repair malformed inode items during log recovery (bsc#1105396).
- xhci: Fix perceived dead host due to runtime suspend race with event handler (bnc#1012382).
- zswap: re-check zswap_is_full() after do zswap_shrink() (bnc#1012382).
Patchnames
SUSE-SLE-Live-Patching-12-SP3-2018-1941
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.155 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-13093: Prevent NULL pointer dereference and panic in lookup_slow()\n on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image.\n This occured because of a lack of proper validation that cached inodes are free\n during allocation (bnc#1100001).\n- CVE-2018-13095: Prevent denial of service (memory corruption and BUG) that\n could have occurred for a corrupted xfs image upon encountering an inode that\n is in extent format, but has more extents than fit in the inode fork\n (bnc#1099999).\n- CVE-2018-13094: Prevent OOPS that may have occured for a corrupted xfs image\n after xfs_da_shrink_inode() is called with a NULL bp (bnc#1100000).\n- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was\n caused by the way the overrun accounting works. Depending on interval and\n expiry time values, the overrun can be larger than INT_MAX, but the accounting\n is int based. This basically made the accounting values, which are visible to\n user space via timer_getoverrun(2) and siginfo::si_overrun, random. This\n allowed a local user to cause a denial of service (signed integer overflow) via\n crafted mmap, futex, timer_create, and timer_settime system calls\n (bnc#1099922).\n- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that\n could have been used by local attackers to read kernel memory (bnc#1107689).\n- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a\n denial of service (ias_object use-after-free and system crash) or possibly have\n unspecified other impact via an AF_IRDA socket (bnc#1106511).\n- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed\n local users to cause a denial of service (memory consumption) by repeatedly\n binding an AF_IRDA socket (bnc#1106509).\n- CVE-2018-1129: A flaw was found in the way signature calculation was handled\n by cephx authentication protocol. An attacker having access to ceph cluster\n network who is able to alter the message payload was able to bypass signature\n checks done by cephx protocol (bnc#1096748).\n- CVE-2018-1128: It was found that cephx authentication protocol did not verify\n ceph clients correctly and was vulnerable to replay attack. Any attacker having\n access to ceph cluster network who is able to sniff packets on network can use\n this vulnerability to authenticate with ceph service and perform actions\n allowed by ceph service (bnc#1096748).\n- CVE-2018-10938: A crafted network packet sent remotely by an attacker forced\n the kernel to enter an infinite loop in the cipso_v4_optptr() function leading\n to a denial-of-service (bnc#1106016).\n- CVE-2018-15572: The spectre_v2_select_mitigation function did not always fill\n RSB upon a context switch, which made it easier for attackers to conduct\n userspace-userspace spectreRSB attacks (bnc#1102517).\n- CVE-2018-10902: Protect against concurrent access to prevent double realloc\n (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A\n malicious local attacker could have used this for privilege escalation\n (bnc#1105322 1105323).\n- CVE-2018-9363: Prevent buffer overflow in hidp_process_report (bsc#1105292)\n- CVE-2018-10883: A local user could have caused an out-of-bounds write in\n jbd2_journal_dirty_metadata(), a denial of service, and a system crash by\n mounting and operating on a crafted ext4 filesystem image (bsc#1099863).\n- CVE-2018-10879: A local user could have caused a use-after-free in\n ext4_xattr_set_entry function and a denial of service or unspecified other\n impact by renaming a file in a crafted ext4 filesystem image (bsc#1099844).\n- CVE-2018-10878: A local user could have caused an out-of-bounds write and a\n denial of service or unspecified other impact by mounting and operating a\n crafted ext4 filesystem image (bsc#1099813).\n- CVE-2018-10876: A use-after-free was possible in ext4_ext_remove_space()\n function when mounting and operating a crafted ext4 image (bsc#1099811).\n- CVE-2018-10877: Prevent out-of-bound access in the ext4_ext_drop_refs()\n function when operating on a crafted ext4 filesystem image (bsc#1099846).\n- CVE-2018-10881: A local user could have caused an out-of-bound access in\n ext4_get_group_info function, a denial of service, and a system crash by\n mounting and operating on a crafted ext4 filesystem image (bsc#1099864).\n- CVE-2018-10882: A local user could have caused an out-of-bound write, a\n denial of service, and a system crash by unmounting a crafted ext4 filesystem\n image (bsc#1099849).\n- CVE-2018-10880: Prevent stack-out-of-bounds write in the ext4 filesystem code\n when mounting and writing to a crafted ext4 image in ext4_update_inline_data().\n An attacker could have used this to cause a system crash and a denial of\n service (bsc#1099845).\n\nThe following non-security bugs were fixed:\n\n- 9p/net: Fix zero-copy path in the 9p virtio transport (bnc#1012382).\n- 9p/virtio: fix off-by-one error in sg list bounds check (bnc#1012382).\n- 9p: fix multiple NULL-pointer-dereferences (bnc#1012382).\n- ACPI / LPSS: Add missing prv_offset setting for byt/cht PWM devices (bnc#1012382).\n- ACPI / PCI: Bail early in acpi_pci_add_bus() if there is no ACPI handle (bnc#1012382).\n- ACPI / PM: save NVS memory for ASUS 1025C laptop (bnc#1012382).\n- ACPI: save NVS memory for Lenovo G50-45 (bnc#1012382).\n- ALSA: cs5535audio: Fix invalid endian conversion (bnc#1012382).\n- ALSA: emu10k1: Rate-limit error messages about page errors (bnc#1012382).\n- ALSA: emu10k1: add error handling for snd_ctl_add (bnc#1012382).\n- ALSA: fm801: add error handling for snd_ctl_add (bnc#1012382).\n- ALSA: hda - Sleep for 10ms after entering D3 on Conexant codecs (bnc#1012382).\n- ALSA: hda - Turn CX8200 into D3 as well upon reboot (bnc#1012382).\n- ALSA: hda/ca0132: fix build failure when a local macro is defined (bnc#1012382).\n- ALSA: hda: Correct Asrock B85M-ITX power_save blacklist entry (bnc#1012382).\n- ALSA: memalloc: Do not exceed over the requested size (bnc#1012382).\n- ALSA: rawmidi: Change resized buffers atomically (bnc#1012382).\n- ALSA: snd-aoa: add of_node_put() in error path (bsc#1099810).\n- ALSA: usb-audio: Apply rate limit to warning messages in URB complete callback (bnc#1012382).\n- ALSA: virmidi: Fix too long output trigger loop (bnc#1012382).\n- ALSA: vx222: Fix invalid endian conversions (bnc#1012382).\n- ALSA: vxpocket: Fix invalid endian conversions (bnc#1012382).\n- ARC: Enable machine_desc->init_per_cpu for !CONFIG_SMP (bnc#1012382).\n- ARC: Explicitly add -mmedium-calls to CFLAGS (bnc#1012382).\n- ARC: Fix CONFIG_SWAP (bnc#1012382).\n- ARC: mm: allow mprotect to make stack mappings executable (bnc#1012382).\n- ARM: 8780/1: ftrace: Only set kernel memory back to read-only after boot (bnc#1012382).\n- ARM: dts: Cygnus: Fix I2C controller interrupt type (bnc#1012382).\n- ARM: dts: am3517.dtsi: Disable reference to OMAP3 OTG controller (bnc#1012382).\n- ARM: dts: am437x: make edt-ft5x06 a wakeup source (bnc#1012382).\n- ARM: dts: da850: Fix interrups property for gpio (bnc#1012382).\n- ARM: dts: imx6sx: fix irq for pcie bridge (bnc#1012382).\n- ARM: fix put_user() for gcc-8 (bnc#1012382).\n- ARM: imx_v4_v5_defconfig: Select ULPI support (bnc#1012382).\n- ARM: imx_v6_v7_defconfig: Select ULPI support (bnc#1012382).\n- ARM: pxa: irq: fix handling of ICMR registers in suspend/resume (bnc#1012382).\n- ARM: tegra: Fix Tegra30 Cardhu PCA954x reset (bnc#1012382).\n- ASoC: Intel: cht_bsw_max98090: remove useless code, align with ChromeOS driver.\n- ASoC: Intel: cht_bsw_max98090_ti: Fix jack initialization (bnc#1012382).\n- ASoC: dpcm: do not merge format from invalid codec dai (bnc#1012382).\n- ASoC: dpcm: fix BE dai not hw_free and shutdown (bnc#1012382).\n- ASoC: pxa: Fix module autoload for platform drivers (bnc#1012382).\n- ASoC: sirf: Fix potential NULL pointer dereference (bnc#1012382).\n- Add reference to bsc#1091171 (bnc#1012382; bsc#1091171).\n- Bluetooth: avoid killing an already killed socket (bnc#1012382).\n- Bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bnc#1012382).\n- Bluetooth: btusb: Remove Yoga 920 from the btusb_needs_reset_resume_table (bsc#1087092).\n- Bluetooth: btusb: Use DMI matching for QCA reset_resume quirking (bsc#1087092).\n- Bluetooth: hci_qca: Fix 'Sleep inside atomic section' warning (bnc#1012382).\n- Documentation/spec_ctrl: Do some minor cleanups (bnc#1012382).\n- HID: hid-plantronics: Re-resend Update to map button for PTT products (bnc#1012382).\n- HID: i2c-hid: check if device is there before really probing (bnc#1012382).\n- HID: wacom: Correct touch maximum XY of 2nd-gen Intuos (bnc#1012382).\n- IB/core: Make testing MR flags for writability a static inline function (bnc#1012382).\n- IB/core: Remove duplicate declaration of gid_cache_wq (bsc#1056596).\n- IB/iser: Do not reduce max_sectors (bsc#1063646).\n- IB/mlx4: Fix an error handling path in 'mlx4_ib_rereg_user_mr()'.\n- IB/mlx4: Mark user MR as writable if actual virtual memory is writable (bnc#1012382).\n- IB/mlx5: Fetch soft WQE's on fatal error state (bsc#1015342 bsc#1015343).\n- IB/mlx5: Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1015342 bsc#1015343).\n- IB/ocrdma: fix out of bounds access to local buffer (bnc#1012382).\n- Input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bnc#1012382).\n- Input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bnc#1012382).\n- Input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bnc#1012382).\n- KVM/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel (bnc#1012382).\n- KVM: MMU: always terminate page walks at level 1 (bsc#1062604).\n- KVM: MMU: simplify last_pte_bitmap (bsc#1062604).\n- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).\n- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).\n- KVM: arm/arm64: Skip updating PMD entry if no change (bnc#1012382).\n- KVM: arm/arm64: Skip updating PTE entry if no change (bnc#1012382).\n- KVM: irqfd: fix race between EPOLLHUP and irq_bypass_register_consumer (bnc#1012382).\n- KVM: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).\n- MIPS: Correct the 64-bit DSP accumulator register size (bnc#1012382).\n- MIPS: Fix off-by-one in pci_resource_to_user() (bnc#1012382).\n- MIPS: ath79: fix register address in ath79_ddr_wb_flush() (bnc#1012382).\n- MIPS: lib: Provide MIPS64r6 __multi3() for GCC lower than < 7 (bnc#1012382).\n- NET: stmmac: align DMA stuff to largest cache line length (bnc#1012382).\n- PCI: Prevent sysfs disable of device while driver is attached (bnc#1012382).\n- PCI: Skip MPS logic for Virtual Functions (VFs) (bnc#1012382).\n- PCI: hotplug: Do not leak pci_slot on registration failure (bnc#1012382).\n- PCI: pciehp: Fix use-after-free on unplug (bnc#1012382).\n- PCI: pciehp: Request control of native hotplug only if supported (bnc#1012382).\n- PM / sleep: wakeup: Fix build error caused by missing SRCU support (bnc#1012382).\n- RDMA/i40iw: Avoid panic when objects are being created and destroyed (bsc#969476 bsc#969477).\n- RDMA/i40iw: Avoid panic when reading back the IRQ affinity hint (bsc#969476 bsc#969477).\n- RDMA/i40iw: Avoid reference leaks when processing the AEQ (bsc#969476 bsc#969477).\n- RDMA/i40w: Hold read semaphore while looking after VMA (bsc#1024376).\n- RDMA/mad: Convert BUG_ONs to error flows (bnc#1012382).\n- RDMA/mlx5: Use proper spec flow label type (bsc#1015342 bsc#1015343).\n- Revert 'MIPS: BCM47XX: Enable 74K Core ExternalSync for PCIe erratum' (bnc#1012382).\n- Revert 'UBIFS: Fix potential integer overflow in allocation' (bnc#1012382).\n- Revert 'f2fs: handle dirty segments inside refresh_sit_entry' (bsc#1106281).\n- Revert 'mm: page_alloc: skip over regions of invalid pfns where possible' (bnc#1107078).\n- Revert 'block-cancel-workqueue-entries-on-blk_mq_freeze_queue' (bsc#1103717).\n- Smack: Mark inode instant in smack_task_to_inode (bnc#1012382).\n- USB: musb: fix external abort on suspend (bsc#1085536).\n- USB: option: add support for DW5821e (bnc#1012382).\n- USB: serial: metro-usb: stop I/O after failed open (bsc#1085539).\n- USB: serial: sierra: fix potential deadlock at close (bnc#1012382).\n- Workaround kABI breakage by __must_check drop of strscpy() (bsc#1107319).\n- afs: Fix directory permissions check (bsc#1106283).\n- arc: fix build errors in arc/include/asm/delay.h (bnc#1012382).\n- arc: fix type warnings in arc/mm/cache.c (bnc#1012382).\n- arm64: make secondary_start_kernel() notrace (bnc#1012382).\n- arm64: mm: check for upper PAGE_SHIFT bits in pfn_valid() (bnc#1012382).\n- ath: Add regulatory mapping for APL13_WORLD (bnc#1012382).\n- ath: Add regulatory mapping for APL2_FCCA (bnc#1012382).\n- ath: Add regulatory mapping for Bahamas (bnc#1012382).\n- ath: Add regulatory mapping for Bermuda (bnc#1012382).\n- ath: Add regulatory mapping for ETSI8_WORLD (bnc#1012382).\n- ath: Add regulatory mapping for FCC3_ETSIC (bnc#1012382).\n- ath: Add regulatory mapping for Serbia (bnc#1012382).\n- ath: Add regulatory mapping for Tanzania (bnc#1012382).\n- ath: Add regulatory mapping for Uganda (bnc#1012382).\n- atl1c: reserve min skb headroom (bnc#1012382).\n- atm: Preserve value of skb->truesize when accounting to vcc (bsc#1089066).\n- audit: allow not equal op for audit by executable (bnc#1012382).\n- backlight: as3711_bl: Fix Device Tree node leaks (bsc#1106929).\n- backlight: lm3630a: Bump REG_MAX value to 0x50 instead of 0x1F (bsc#1106929).\n- bcache: avoid unncessary cache prefetch bch_btree_node_get() (bsc#1064232).\n- bcache: calculate the number of incremental GC nodes according to the total of btree nodes (bsc#1064232).\n- bcache: display rate debug parameters to 0 when writeback is not running (bsc#1064232).\n- bcache: do not check return value of debugfs_create_dir() (bsc#1064232).\n- bcache: finish incremental GC (bsc#1064232).\n- bcache: fix I/O significant decline while backend devices registering (bsc#1064232).\n- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064232).\n- bcache: free heap cache_set->flush_btree in bch_journal_free (bsc#1064232).\n- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section (bsc#1064232).\n- bcache: release dc->writeback_lock properly in bch_writeback_thread() (bsc#1064232).\n- bcache: set max writeback rate when I/O request is idle (bsc#1064232).\n- bcache: simplify the calculation of the total amount of flash dirty data (bsc#1064232).\n- be2net: remove unused old custom busy-poll fields (bsc#1021121 ).\n- blkdev: __blkdev_direct_IO_simple: fix leak in error case (bsc#1083663).\n- block: bio_iov_iter_get_pages: fix size of last iovec (bsc#1083663).\n- block: bio_iov_iter_get_pages: pin more pages for multi-segment IOs (bsc#1083663).\n- block: do not use interruptible wait anywhere (bnc#1012382).\n- bnx2x: Fix invalid memory access in rss hash config path (bnc#1012382).\n- bnx2x: Fix receiving tx-timeout in error or recovery state (bnc#1012382).\n- bnxt_en: Always set output parameters in bnxt_get_max_rings() (bsc#963575).\n- bnxt_en: Fix for system hang if request_irq fails (bnc#1012382).\n- bnxt_en: Fix inconsistent BNXT_FLAG_AGG_RINGS logic (bsc#1020412 ).\n- bpf: fix references to free_bpf_prog_info() in comments (bnc#1012382).\n- brcmfmac: Add support for bcm43364 wireless chipset (bnc#1012382).\n- brcmfmac: stop watchdog before detach and free everything (bnc#1012382).\n- bridge: Propagate vlan add failure to user (bnc#1012382).\n- btrfs: Do not remove block group still has pinned down bytes (bsc#1086457).\n- btrfs: add barriers to btrfs_sync_log before log_commit_wait wakeups (bnc#1012382).\n- btrfs: do not leak ret from do_chunk_alloc (bnc#1012382).\n- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bnc#1012382).\n- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf.\n- btrfs: round down size diff when shrinking/growing device (bsc#1097105).\n- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bnc#1012382).\n- can: mpc5xxx_can: check of_iomap return before use (bnc#1012382).\n- can: xilinx_can: fix RX loop if RXNEMP is asserted without RXOK (bnc#1012382).\n- can: xilinx_can: fix RX overflow interrupt not being enabled (bnc#1012382).\n- can: xilinx_can: fix device dropping off bus on RX overrun (bnc#1012382).\n- can: xilinx_can: fix incorrect clear of non-processed interrupts (bnc#1012382).\n- can: xilinx_can: fix recovery from error states not being propagated (bnc#1012382).\n- can: xilinx_can: keep only 1-2 frames in TX FIFO to fix TX accounting (bnc#1012382).\n- cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status (bnc#1012382).\n- ceph: fix incorrect use of strncpy (bsc#1107319).\n- ceph: return errors from posix_acl_equiv_mode() correctly (bsc#1107320).\n- cifs: Fix stack out-of-bounds in smb{2,3}_create_lease_buf() (bsc#1012382).\n- cifs: add missing debug entries for kconfig options (bnc#1012382).\n- cifs: check kmalloc before use (bsc#1012382).\n- cifs: store the leaseKey in the fid on SMB2_open (bsc#1012382).\n- clk: tegra: Fix PLL_U post divider and initial rate on Tegra30 (bnc#1012382).\n- crypto: ablkcipher - fix crash flushing dcache in error path (bnc#1012382).\n- crypto: authenc - do not leak pointers to authenc keys (bnc#1012382).\n- crypto: authencesn - do not leak pointers to authenc keys (bnc#1012382).\n- crypto: blkcipher - fix crash flushing dcache in error path (bnc#1012382).\n- crypto: padlock-aes - Fix Nano workaround data corruption (bnc#1012382).\n- crypto: vmac - require a block cipher with 128-bit block size (bnc#1012382).\n- crypto: vmac - separate tfm and request context (bnc#1012382).\n- crypto: vmx - Fix sleep-in-atomic bugs (bsc#1048317).\n- cxgb4: when disabling dcb set txq dcb priority to 0 (bnc#1012382).\n- cxl: Fix wrong comparison in cxl_adapter_context_get() (bsc#1055014).\n- dccp: fix undefined behavior with 'cwnd' shift in ccid2_cwnd_restart() (bnc#1012382).\n- disable loading f2fs module on PAGE_SIZE > 4KB (bnc#1012382).\n- dm cache metadata: save in-core policy_hint_size to on-disk superblock (bnc#1012382).\n- dma-iommu: Fix compilation when !CONFIG_IOMMU_DMA (bnc#1012382).\n- dmaengine: k3dma: Off by one in k3_of_dma_simple_xlate() (bnc#1012382).\n- dmaengine: pxa_dma: remove duplicate const qualifier (bnc#1012382).\n- driver core: Partially revert 'driver core: correct device's shutdown order' (bnc#1012382).\n- drivers: net: lmc: fix case value for target abort error (bnc#1012382).\n- drm/armada: fix colorkey mode property (bnc#1012382).\n- drm/atmel-hlcdc: check stride values in the first plane (bsc#1106929).\n- drm/atomic: Handling the case when setting old crtc for plane (bnc#1012382).\n- drm/bridge: adv7511: Reset registers on hotplug (bnc#1012382).\n- drm/cirrus: Use drm_framebuffer_put to avoid kernel oops in clean-up (bsc#1101822).\n- drm/drivers: add support for using the arch wc mapping API.\n- drm/exynos/dsi: mask frame-done interrupt (bsc#1106929).\n- drm/exynos: decon5433: Fix WINCONx reset value (bnc#1012382).\n- drm/exynos: decon5433: Fix per-plane global alpha for XRGB modes (bnc#1012382).\n- drm/exynos: gsc: Fix support for NV16/61, YUV420/YVU420 and YUV422 modes (bnc#1012382).\n- drm/gma500: fix psb_intel_lvds_mode_valid()'s return type (bnc#1012382).\n- drm/i915/userptr: reject zero user_size (bsc#1090888).\n- drm/i915: Correctly handle limited range YCbCr data on VLV/CHV (bsc#1087092).\n- drm/imx: fix typo in ipu_plane_formats (bsc#1106929).\n- drm/imx: imx-ldb: check if channel is enabled before printing warning (bnc#1012382).\n- drm/imx: imx-ldb: disable LDB on driver bind (bnc#1012382).\n- drm/msm/hdmi: Use bitwise operators when building register values (bsc#1106929).\n- drm/nouveau/gem: off by one bugs in nouveau_gem_pushbuf_reloc_apply() (bnc#1012382).\n- drm/panel: type promotion bug in s6e8aa0_read_mtp_id() (bsc#1105769).\n- drm/radeon: fix mode_valid's return type (bnc#1012382).\n- drm: Add DP PSR2 sink enable bit (bnc#1012382).\n- drm: Reject getfb for multi-plane framebuffers (bsc#1106929).\n- enic: do not call enic_change_mtu in enic_probe\n- enic: handle mtu change for vf properly (bnc#1012382).\n- enic: initialize enic->rfs_h.lock in enic_probe (bnc#1012382).\n- esp6: fix memleak on error path in esp6_input\n- ext4: check for NUL characters in extended attribute's name (bnc#1012382).\n- ext4: check for allocation block validity with block group locked (bsc#1104495).\n- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).\n- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).\n- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).\n- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).\n- ext4: fix inline data updates with checksums enabled (bsc#1104494).\n- ext4: fix spectre gadget in ext4_mb_regular_allocator() (bnc#1012382).\n- ext4: reset error code in ext4_find_entry in fallback (bnc#1012382).\n- ext4: sysfs: print ext4_super_block fields as little-endian (bsc#1106229).\n- f2fs: fix to do not trigger writeback during recovery (bnc#1012382).\n- fat: fix memory allocation failure handling of match_strdup() (bnc#1012382).\n- fb: fix lost console when the user unplugs a USB adapter (bnc#1012382).\n- fbdev: omapfb: off by one in omapfb_register_client() (bsc#1106929).\n- fix __legitimize_mnt()/mntput() race (bnc#1012382).\n- fix mntput/mntput race (bnc#1012382).\n- fork: unconditionally clear stack on fork (bnc#1012382).\n- fs/9p/xattr.c: catch the error of p9_client_clunk when setting xattr failed (bnc#1012382).\n- fs/dax.c: fix inefficiency in dax_writeback_mapping_range() (bsc#1106185).\n- fs/quota: Fix spectre gadget in do_quotactl (bnc#1012382).\n- fs: aio: fix the increment of aio-nr and counting against aio-max-nr (bsc#1068075, bsc#1078921).\n- fuse: Add missed unlock_page() to fuse_readpages_fill() (bnc#1012382).\n- fuse: Do not access pipe->buffers without pipe_lock() (bnc#1012382).\n- fuse: Fix oops at process_init_reply() (bnc#1012382).\n- fuse: fix double request_end() (bnc#1012382).\n- fuse: fix unlocked access to processing queue (bnc#1012382).\n- fuse: umount should wait for all requests (bnc#1012382).\n- genirq/proc: Return proper error code when irq_set_affinity() fails (bnc#1105392).\n- getxattr: use correct xattr length (bnc#1012382).\n- hfsplus: Do not clear SGID when inheriting ACLs (bsc#1030552).\n- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bnc#1012382).\n- hwrng: exynos - Disable runtime PM on driver unbind.\n- i2c: davinci: Avoid zero value of CLKH (bnc#1012382).\n- i2c: imx: Fix race condition in dma read (bnc#1012382).\n- i2c: imx: Fix reinit_completion() use (bnc#1012382).\n- i2c: ismt: fix wrong device address when unmap the data buffer (bnc#1012382).\n- i40e: use cpumask_copy instead of direct assignment (bsc#1053685).\n- i40iw: Fix memory leak in error path of create QP (bsc#969476 bsc#969477).\n- i40iw: Use correct address in dst_neigh_lookup for IPv6 (bsc#969476 bsc#969477).\n- ibmvnic: Include missing return code checks in reset function (bnc#1107966).\n- ieee802154: at86rf230: switch from BUG_ON() to WARN_ON() on problem (bnc#1012382).\n- ieee802154: at86rf230: use __func__ macro for debug messages (bnc#1012382).\n- ieee802154: fakelb: switch from BUG_ON() to WARN_ON() on problem (bnc#1012382).\n- igb: Fix not adding filter elements to the list (bsc#1024361 bsc#1024365).\n- iio: ad9523: Fix displayed phase (bnc#1012382).\n- iio: ad9523: Fix return value for ad952x_store() (bnc#1012382).\n- inet: frag: enforce memory limits earlier (bnc#1012382 bsc#970506).\n- iommu/amd: make sure TLB to be flushed before IOVA freed (bsc#1106105).\n- iommu/vt-d: Add definitions for PFSID (bnc#1012382).\n- iommu/vt-d: Fix dev iotlb pfsid use (bnc#1012382).\n- iommu/vt-d: Ratelimit each dmar fault printing (bsc#1106105).\n- ioremap: Update pgtable free interfaces with addr (bnc#1012382).\n- ip: hash fragments consistently (bnc#1012382).\n- ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull (bnc#1012382).\n- ipconfig: Correctly initialise ic_nameservers (bnc#1012382).\n- ipv4+ipv6: Make INET*_ESP select CRYPTO_ECHAINIV (bnc#1012382).\n- ipv4: Return EINVAL when ping_group_range sysctl does not map to user ns (bnc#1012382).\n- ipv4: remove BUG_ON() from fib_compute_spec_dst (bnc#1012382).\n- ipv6: fix useless rol32 call on hash (bnc#1012382).\n- ipv6: mcast: fix unsolicited report interval after receiving querys (bnc#1012382).\n- ipvlan: use ETH_MAX_MTU as max mtu (bsc#1033962).\n- iscsi target: fix session creation failure handling (bnc#1012382).\n- isdn: Disable IIOCDBGVAR (bnc#1012382).\n- iw_cxgb4: remove duplicate memcpy() in c4iw_create_listen() (bsc#969476 bsc#969477).\n- iwlwifi: pcie: fix race in Rx buffer allocator (bnc#1012382).\n- ixgbe: Be more careful when modifying MAC filters (bnc#1012382).\n- jfs: Do not clear SGID when inheriting ACLs (bsc#1030552).\n- jump_label: Add RELEASE barrier after text changes (bsc#1105271).\n- jump_label: Fix concurrent static_key_enable/disable() (bsc#1105271).\n- jump_label: Move CPU hotplug locking (bsc#1105271).\n- jump_label: Provide hotplug context variants (bsc#1105271).\n- jump_label: Reduce the size of struct static_key (bsc#1105271).\n- jump_label: Reorder hotplug lock and jump_label_lock (bsc#1105271).\n- jump_label: Split out code under the hotplug lock (bsc#1105271).\n- jump_label: remove bug.h, atomic.h dependencies for HAVE_JUMP_LABEL (bsc#1105271).\n- kABI: protect enum tcp_ca_event (kabi).\n- kABI: reexport tcp_send_ack (kabi).\n- kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)\n- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).\n- kasan: do not emit builtin calls when sanitization is off (bnc#1012382).\n- kasan: fix shadow_size calculation error in kasan_module_alloc (bnc#1012382).\n- kbuild: verify that $DEPMOD is installed (bnc#1012382).\n- kernel: improve spectre mitigation (bnc#1106934, LTC#171029).\n- kprobes/x86: Fix %p uses in error messages (bnc#1012382).\n- kprobes: Make list and blacklist root user read only (bnc#1012382).\n- kthread, tracing: Do not expose half-written comm when creating kthreads (bsc#1104897).\n- kvm: x86: vmx: fix vpid leak (bnc#1012382).\n- l2tp: use sk_dst_check() to avoid race on sk->sk_dst_cache (bnc#1012382).\n- lib/rhashtable: consider param->min_size when setting initial table size (bnc#1012382).\n- libata: Fix command retry decision (bnc#1012382).\n- libceph: check authorizer reply/challenge length before reading (bsc#1096748).\n- libceph: factor out __ceph_x_decrypt() (bsc#1096748).\n- libceph: factor out __prepare_write_connect() (bsc#1096748).\n- libceph: factor out encrypt_authorizer() (bsc#1096748).\n- libceph: store ceph_auth_handshake pointer in ceph_connection (bsc#1096748).\n- libceph: weaken sizeof check in ceph_x_verify_authorizer_reply() (bsc#1096748).\n- llc: use refcount_inc_not_zero() for llc_sap_find() (bnc#1012382).\n- locking/lockdep: Do not record IRQ state within lockdep code (bnc#1012382).\n- locks: pass inode pointer to locks_free_lock_context (bsc@1099832).\n- locks: prink more detail when there are leaked locks (bsc#1099832).\n- locks: restore a warn for leaked locks on close (bsc#1099832).\n- m68k: fix 'bad page state' oops on ColdFire boot (bnc#1012382).\n- mac80211: add stations tied to AP_VLANs during hw reconfig (bnc#1012382).\n- md/raid10: fix that replacement cannot complete recovery after reassemble (bnc#1012382).\n- md: fix NULL dereference of mddev->pers in remove_and_add_spares() (bnc#1012382).\n- media: omap3isp: fix unbalanced dma_iommu_mapping (bnc#1012382).\n- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bnc#1012382).\n- media: rtl28xxu: be sure that it won't go past the array size (bsc#1050431).\n- media: s5p-jpeg: fix number of components macro (bsc#1050431).\n- media: saa7164: Fix driver name in debug output (bnc#1012382).\n- media: si470x: fix __be16 annotations (bnc#1012382).\n- media: siano: get rid of __le32/__le16 cast warnings (bnc#1012382).\n- media: staging: omap4iss: Include asm/cacheflush.h after generic includes (bnc#1012382).\n- media: videobuf2-core: do not call memop 'finish' when queueing (bnc#1012382).\n- memory: tegra: Apply interrupts mask per SoC (bnc#1012382).\n- memory: tegra: Do not handle spurious interrupts (bnc#1012382).\n- mfd: cros_ec: Fail early if we cannot identify the EC (bnc#1012382).\n- microblaze: Fix simpleImage format generation (bnc#1012382).\n- mm/hugetlb: filter out hugetlb pages if HUGEPAGE migration is not supported (bnc#1106697).\n- mm/memory.c: check return value of ioremap_prot (bnc#1012382).\n- mm/slub.c: add __printf verification to slab_err() (bnc#1012382).\n- mm/tlb: Remove tlb_remove_table() non-concurrent condition (bnc#1012382).\n- mm: Add vm_insert_pfn_prot() (bnc#1012382).\n- mm: fix cache mode tracking in vm_insert_mixed() (bnc#1012382).\n- mm: memcg: fix use after free in mem_cgroup_iter() (bnc#1012382).\n- mm: vmalloc: avoid racy handling of debugobjects in vunmap (bnc#1012382).\n- mm: x86: move _PAGE_SWP_SOFT_DIRTY from bit 7 to bit 1 (bnc#1012382).\n- mtd: rawnand: fsl_ifc: fix FSL NAND driver to read all ONFI parameter pages (bnc#1012382).\n- mtd: ubi: wl: Fix error return code in ubi_wl_init().\n- mwifiex: correct histogram data with appropriate index (bnc#1012382).\n- mwifiex: handle race during mwifiex_usb_disconnect (bnc#1012382).\n- net/9p/client.c: version pointer uninitialized (bnc#1012382).\n- net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree() (bnc#1012382).\n- net/ethernet/freescale/fman: fix cross-build error (bnc#1012382).\n- net/ipv4: Set oif in fib_compute_spec_dst (bnc#1012382).\n- net/mlx4_core: Save the qpn from the input modifier in RST2INIT wrapper (bnc#1012382).\n- net/mlx5: Add missing SET_DRIVER_VERSION command translation (bsc#1015342 bsc#1015343).\n- net/mlx5: E-Switch, Include VF RDMA stats in vport statistics (bsc#966170 bsc#966172).\n- net/mlx5: Eswitch, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1015342 bsc#1015343).\n- net/mlx5: Fix wrong size allocation for QoS ETC TC regitster (bsc#966170 bsc#966172).\n- net/mlx5: Vport, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#966170 bsc#966172).\n- net/mlx5e: Do not allow aRFS for encapsulated packets (bsc#1015342 bsc#1015343).\n- net/mlx5e: Err if asked to offload TC match on frag being first (bsc#1015342 bsc#1015343).\n- net/mlx5e: Fix quota counting in aRFS expire flow (bsc#1015342 bsc#1015343).\n- net/mlx5e: Refine ets validation function (bsc#966170 bsc#966172).\n- net: 6lowpan: fix reserved space for single frames (bnc#1012382).\n- net: Do not copy pfmemalloc flag in __copy_skb_header() (bnc#1012382).\n- net: add skb_condense() helper (bsc#1089066).\n- net: adjust skb->truesize in ___pskb_trim() (bsc#1089066).\n- net: adjust skb->truesize in pskb_expand_head() (bsc#1089066).\n- net: axienet: Fix double deregister of mdio (bnc#1012382).\n- net: caif: Add a missing rcu_read_unlock() in caif_flow_cb (bnc#1012382).\n- net: davinci_emac: match the mdio device against its compatible if possible (bnc#1012382).\n- net: dsa: Do not suspend/resume closed slave_dev (bnc#1012382).\n- net: ena: Fix use of uninitialized DMA address bits field (bsc#1027968).\n- net: fix amd-xgbe flow-control issue (bnc#1012382).\n- net: hamradio: use eth_broadcast_addr (bnc#1012382).\n- net: lan78xx: Fix misplaced tasklet_schedule() call (bnc#1012382).\n- net: lan78xx: fix rx handling before first packet is send (bnc#1012382).\n- net: mac802154: tx: expand tailroom if necessary (bnc#1012382).\n- net: phy: fix flag masking in __set_phy_supported (bnc#1012382).\n- net: prevent ISA drivers from building on PPC32 (bnc#1012382).\n- net: propagate dev_get_valid_name return code (bnc#1012382).\n- net: qca_spi: Avoid packet drop during initial sync (bnc#1012382).\n- net: qca_spi: Fix log level if probe fails (bnc#1012382).\n- net: qca_spi: Make sure the QCA7000 reset is triggered (bnc#1012382).\n- net: socket: fix potential spectre v1 gadget in socketcall (bnc#1012382).\n- net: usb: rtl8150: demote allmulti message to dev_dbg() (bnc#1012382).\n- net: vmxnet3: use new api ethtool_{get|set}_link_ksettings (bsc#1091860 bsc#1098253).\n- net_sched: Fix missing res info when create new tc_index filter (bnc#1012382).\n- net_sched: fix NULL pointer dereference when delete tcindex filter (bnc#1012382).\n- netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state (bnc#1012382).\n- netfilter: ipset: List timing out entries with 'timeout 1' instead of zero (bnc#1012382).\n- netfilter: ipv6: nf_defrag: reduce struct net memory waste (bnc#1012382).\n- netfilter: ipvs: do not create conn for ABORT packet in sctp_conn_schedule (bsc#1102797).\n- netfilter: ipvs: fix the issue that sctp_conn_schedule drops non-INIT packet (bsc#1102797).\n- netfilter: x_tables: set module owner for icmp(6) matches (bnc#1012382).\n- netlink: Do not shift on 64 for ngroups (bnc#1012382).\n- netlink: Do not shift with UB on nlk->ngroups (bnc#1012382).\n- netlink: Do not subscribe to non-existent groups (bnc#1012382).\n- netlink: Fix spectre v1 gadget in netlink_create() (bnc#1012382).\n- netlink: do not enter direct reclaim from netlink_trim() (bsc#1042286).\n- nfsd: fix potential use-after-free in nfsd4_decode_getdeviceinfo (bnc#1012382).\n- nl80211: Add a missing break in parse_station_flags (bnc#1012382).\n- nohz: Fix local_timer_softirq_pending() (bnc#1012382).\n- nvme-fc: release io queues to allow fast fail (bsc#1102486).\n- nvme: if_ready checks to fail io to deleting controller (bsc#1102486).\n- nvme: kABI-compliant version of nvmf_fail_nonready_command() (bsc#1102486).\n- nvmet-fc: fix target sgl list on large transfers (bsc#1102486).\n- osf_getdomainname(): use copy_to_user() (bnc#1012382).\n- ovl: Do d_type check only if work dir creation was successful (bnc#1012382).\n- ovl: Ensure upper filesystem supports d_type (bnc#1012382).\n- ovl: warn instead of error if d_type is not supported (bnc#1012382).\n- packet: refine ring v3 block size test to hold one frame (bnc#1012382).\n- packet: reset network header if packet shorter than ll reserved space (bnc#1012382).\n- parisc: Define mb() and add memory barriers to assembler unlock sequences (bnc#1012382).\n- parisc: Enable CONFIG_MLONGCALLS by default (bnc#1012382).\n- parisc: Remove ordered stores from syscall.S (bnc#1012382).\n- parisc: Remove unnecessary barriers from spinlock.h (bnc#1012382).\n- perf auxtrace: Fix queue resize (bnc#1012382).\n- perf llvm-utils: Remove bashism from kernel include fetch script (bnc#1012382).\n- perf report powerpc: Fix crash if callchain is empty (bnc#1012382).\n- perf test session topology: Fix test on s390 (bnc#1012382).\n- perf/x86/intel/uncore: Correct fixed counter index check for NHM (bnc#1012382).\n- perf/x86/intel/uncore: Correct fixed counter index check in generic code (bnc#1012382).\n- perf: fix invalid bit in diagnostic entry (bnc#1012382).\n- pinctrl: at91-pio4: add missing of_node_put (bnc#1012382).\n- pinctrl: freescale: off by one in imx1_pinconf_group_dbg_show() (bnc#1012382).\n- pnfs/blocklayout: off by one in bl_map_stripe() (bnc#1012382).\n- powerpc/32: Add a missing include header (bnc#1012382).\n- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032).\n- powerpc/64s: Fix compiler store ordering to SLB shadow area (bnc#1012382).\n- powerpc/8xx: fix invalid register expression in head_8xx.S (bnc#1012382).\n- powerpc/chrp/time: Make some functions static, add missing header include (bnc#1012382).\n- powerpc/embedded6xx/hlwd-pic: Prevent interrupts from being handled by Starlet (bnc#1012382).\n- powerpc/fadump: handle crash memory ranges array index overflow (bsc#1103269).\n- powerpc/fadump: merge adjacent memory ranges to reduce PT_LOAD segements (bsc#1103269).\n- powerpc/lib: Fix the feature fixup tests to actually work (bsc#1066223).\n- powerpc/powermac: Add missing prototype for note_bootable_part() (bnc#1012382).\n- powerpc/powermac: Mark variable x as unused (bnc#1012382).\n- powerpc/pseries: Fix endianness while restoring of r3 in MCE handler (bnc#1012382).\n- powerpc/topology: Get topology for shared processors at boot (bsc#1104683).\n- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157).\n- powerpc: Avoid code patching freed init sections (bnc#1107735).\n- powerpc: make feature-fixup tests fortify-safe (bsc#1066223).\n- provide special timeout module parameters for EC2 (bsc#1065364).\n- ptp: fix missing break in switch (bnc#1012382).\n- pwm: tiehrpwm: Fix disabling of output of PWMs (bnc#1012382).\n- qed: Add sanity check for SIMD fastpath handler (bnc#1012382).\n- qed: Correct Multicast API to reflect existence of 256 approximate buckets (bsc#1019695 bsc#1019699 bsc#1022604).\n- qed: Do not advertise DCBX_LLD_MANAGED capability (bsc#1019695 bsc#1019699 bsc#1022604).\n- qed: Fix possible memory leak in Rx error path handling (bsc#1019695 bsc#1019699 bsc#1022604 ).\n- qed: Fix possible race for the link state value (bnc#1012382).\n- qed: Fix setting of incorrect eswitch mode (bsc#1019695 bsc#1019699 bsc#1022604).\n- qed: Fix use of incorrect size in memcpy call (bsc#1019695 bsc#1019699 bsc#1022604).\n- qede: Adverstise software timestamp caps when PHC is not available (bsc#1019695 bsc#1019699 bsc#1022604).\n- qlge: Fix netdev features configuration (bsc#1098822).\n- qlogic: check kstrtoul() for errors (bnc#1012382).\n- random: mix rdrand with entropy sent in from userspace (bnc#1012382).\n- readahead: stricter check for bdi io_pages (VM Functionality).\n- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bnc#1012382).\n- reiserfs: fix broken xattr handling (heap corruption, bad retval) (bnc#1012382).\n- ring_buffer: tracing: Inherit the tracing setting to next ring buffer (bnc#1012382).\n- root dentries need RCU-delayed freeing (bnc#1012382).\n- rsi: Fix 'invalid vdd' warning in mmc (bnc#1012382).\n- rtc: ensure rtc_set_alarm fails when alarms are not supported (bnc#1012382).\n- rtnetlink: add rtnl_link_state check in rtnl_configure_link (bnc#1012382).\n- s390/cpum_sf: Add data entry sizes to sampling trailer entry (bnc#1012382).\n- s390/kvm: fix deadlock when killed by oom (bnc#1012382).\n- s390/lib: use expoline for all bcr instructions (bnc#1106934, LTC#171029).\n- s390/pci: fix out of bounds access during irq setup (bnc#1012382).\n- s390/qdio: reset old sbal_state flags (bnc#1012382).\n- s390/qeth: do not clobber buffer on async TX completion (bnc#1104485, LTC#170349).\n- s390/qeth: fix race when setting MAC address (bnc#1104485, LTC#170726).\n- s390: add explicit <linux/stringify.h> for jump label (bsc#1105271).\n- s390: detect etoken facility (bnc#1106934, LTC#171029).\n- s390: fix br_r1_trampoline for machines without exrl (bnc#1012382 bnc#1106934 LTC#171029).\n- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).\n- scripts/tar-up.sh: Do not package gitlog-excludes file Also fix the evaluation of gitlog-excludes file, too\n- scsi: 3w-xxxx: fix a missing-check bug (bnc#1012382).\n- scsi: core: Avoid that SCSI device removal through sysfs triggers a deadlock (bnc#1012382).\n- scsi: fcoe: drop frames in ELS LOGO error path (bnc#1012382).\n- scsi: hpsa: limit transfer length to 1MB, not 512kB (bsc#1102346).\n- scsi: libiscsi: fix possible NULL pointer dereference in case of TMF (bnc#1012382).\n- scsi: megaraid: silence a static checker bug (bnc#1012382).\n- scsi: megaraid_sas: Increase timeout by 1 sec for non-RAID fastpath IOs (bnc#1012382).\n- scsi: qla2xxx: Fix ISP recovery on unload (bnc#1012382).\n- scsi: qla2xxx: Return error when TMF returns (bnc#1012382).\n- scsi: scsi_dh: replace too broad 'TP9' string with the exact models (bnc#1012382).\n- scsi: sr: Avoid that opening a CD-ROM hangs with runtime power management enabled (bnc#1012382).\n- scsi: sysfs: Introduce sysfs_{un,}break_active_protection() (bnc#1012382).\n- scsi: ufs: fix exception event handling (bnc#1012382).\n- scsi: vmw_pvscsi: Return DID_RESET for status SAM_STAT_COMMAND_TERMINATED (bnc#1012382).\n- scsi: xen-scsifront: add error handling for xenbus_printf (bnc#1012382).\n- scsi_debug: call resp_XXX function after setting host_scribble (bsc#1069138).\n- scsi_debug: reset injection flags for every_nth > 0 (bsc#1069138).\n- selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC (bnc#1012382).\n- selftest/seccomp: Fix the seccomp(2) signature (bnc#1012382).\n- selftests/ftrace: Add snapshot and tracing_on test case (bnc#1012382).\n- selftests/x86/sigreturn/64: Fix spurious failures on AMD CPUs (bnc#1012382).\n- selftests: pstore: return Kselftest Skip code for skipped tests (bnc#1012382).\n- selftests: static_keys: return Kselftest Skip code for skipped tests (bnc#1012382).\n- selftests: sync: add config fragment for testing sync framework (bnc#1012382).\n- selftests: user: return Kselftest Skip code for skipped tests (bnc#1012382).\n- selftests: zram: return Kselftest Skip code for skipped tests (bnc#1012382).\n- serial: 8250_dw: always set baud rate in dw8250_set_termios (bnc#1012382).\n- sfc: stop the TX queue before pushing new buffers (bsc#1017967 ).\n- skbuff: Unconditionally copy pfmemalloc in __skb_clone() (bnc#1012382).\n- slab: __GFP_ZERO is incompatible with a constructor (bnc#1107060).\n- smb3: Do not send SMB3 SET_INFO if nothing changed (bnc#1012382).\n- smb3: do not request leases in symlink creation and query (bnc#1012382).\n- spi: davinci: fix a NULL pointer dereference (bnc#1012382).\n- squashfs: be more careful about metadata corruption (bnc#1012382).\n- squashfs: more metadata hardening (bnc#1012382).\n- squashfs: more metadata hardenings (bnc#1012382).\n- staging: android: ion: check for kref overflow (bnc#1012382).\n- string: drop __must_check from strscpy() and restore strscpy() usages in cgroup (bsc#1107319).\n- sys: do not hold uts_sem while accessing userspace memory (bnc#1106995).\n- target_core_rbd: use RCU in free_device (bsc#1105524).\n- tcp: Fix missing range_truesize enlargement in the backport (bnc#1012382).\n- tcp: add max_quickacks param to tcp_incr_quickack and tcp_enter_quickack_mode (bnc#1012382).\n- tcp: add one more quick ack after after ECN events (bnc#1012382).\n- tcp: do not aggressively quick ack after ECN events (bnc#1012382).\n- tcp: do not cancel delay-AcK on DCTCP special ACK (bnc#1012382).\n- tcp: do not delay ACK in DCTCP upon CE status change (bnc#1012382).\n- tcp: do not force quickack when receiving out-of-order packets (bnc#1012382).\n- tcp: fix dctcp delayed ACK schedule (bnc#1012382).\n- tcp: helpers to send special DCTCP ack (bnc#1012382).\n- tcp: identify cryptic messages as TCP seq # bugs (bnc#1012382).\n- tcp: refactor tcp_ecn_check_ce to remove sk type cast (bnc#1012382).\n- tcp: remove DELAYED ACK events in DCTCP (bnc#1012382).\n- tg3: Add higher cpu clock for 5762 (bnc#1012382).\n- thermal: exynos: fix setting rising_threshold for Exynos5433 (bnc#1012382).\n- timekeeping: Eliminate the stale declaration of ktime_get_raw_and_real_ts64() (bsc#969470).\n- tools/power turbostat: Read extended processor family from CPUID (bnc#1012382).\n- tools/power turbostat: fix -S on UP systems (bnc#1012382).\n- tools: usb: ffs-test: Fix build on big endian systems (bnc#1012382).\n- tpm: fix race condition in tpm_common_write() (bnc#1012382).\n- tracing/blktrace: Fix to allow setting same value (bnc#1012382).\n- tracing/kprobes: Fix trace_probe flags on enable_trace_kprobe() failure (bnc#1012382).\n- tracing: Do not call start/stop() functions when tracing_on does not change (bnc#1012382).\n- tracing: Fix double free of event_trigger_data (bnc#1012382).\n- tracing: Fix possible double free in event_enable_trigger_func() (bnc#1012382).\n- tracing: Quiet gcc warning about maybe unused link variable (bnc#1012382).\n- tracing: Use __printf markup to silence compiler (bnc#1012382).\n- tty: Fix data race in tty_insert_flip_string_fixed_flag (bnc#1012382).\n- turn off -Wattribute-alias (bnc#1012382).\n- ubi: Be more paranoid while seaching for the most recent Fastmap (bnc#1012382).\n- ubi: Fix Fastmap's update_vol() (bnc#1012382).\n- ubi: Fix races around ubi_refill_pools() (bnc#1012382).\n- ubi: Introduce vol_ignored() (bnc#1012382).\n- ubi: Rework Fastmap attach base code (bnc#1012382).\n- ubi: fastmap: Erase outdated anchor PEBs during attach (bnc#1012382).\n- ubifs: Check data node size before truncate (bsc#1106276).\n- ubifs: Fix memory leak in lprobs self-check (bsc#1106278).\n- ubifs: Fix synced_i_size calculation for xattr inodes (bsc#1106275).\n- ubifs: xattr: Do not operate on deleted inodes (bsc#1106271).\n- udl-kms: change down_interruptible to down (bnc#1012382).\n- udl-kms: fix crash due to uninitialized memory (bnc#1012382).\n- udl-kms: handle allocation failure (bnc#1012382).\n- udlfb: set optimal write delay (bnc#1012382).\n- uprobes: Use synchronize_rcu() not synchronize_sched() (bnc#1012382).\n- usb/phy: fix PPC64 build errors in phy-fsl-usb.c (bnc#1012382).\n- usb: audio-v2: Correct the comment for struct uac_clock_selector_descriptor (bsc#1099810).\n- usb: cdc_acm: Add quirk for Castles VEGA3000 (bnc#1012382).\n- usb: dwc2: debugfs: Do not touch RX FIFO during register dump (bsc#1100132).\n- usb: dwc2: fix isoc split in transfer with no data (bnc#1012382).\n- usb: gadget: composite: fix delayed_status race condition when set_interface (bnc#1012382).\n- usb: gadget: dwc2: fix memory leak in gadget_init() (bnc#1012382).\n- usb: gadget: f_fs: Only return delayed status when len is 0 (bnc#1012382).\n- usb: gadget: f_uac2: fix endianness of 'struct cntrl_*_lay3' (bnc#1012382).\n- usb: gadget: r8a66597: Fix a possible sleep-in-atomic-context bugs in r8a66597_queue() (bnc#1012382).\n- usb: gadget: r8a66597: Fix two possible sleep-in-atomic-context bugs in init_controller() (bnc#1012382).\n- usb: hub: Do not wait for connect state at resume for powered-off ports (bnc#1012382).\n- usb: renesas_usbhs: gadget: fix spin_lock_init() for &uep->lock (bsc#1085536).\n- usb: xhci: increase CRS timeout value (bnc#1012382).\n- usbip: usbip_detach: Fix memory, udev context and udev leak (bnc#1012382).\n- userns: move user access out of the mutex (bnc#1012382).\n- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).\n- virtio_balloon: fix another race between migration and ballooning (bnc#1012382).\n- vmw_balloon: VMCI_DOORBELL_SET does not check status (bnc#1012382).\n- vmw_balloon: do not use 2MB without batching (bnc#1012382).\n- vmw_balloon: fix VMCI use when balloon built into kernel (bnc#1012382).\n- vmw_balloon: fix inflation of 64-bit GFNs (bnc#1012382).\n- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1091860 bsc#1098253).\n- vmxnet3: add receive data ring support (bsc#1091860 bsc#1098253).\n- vmxnet3: add support for get_coalesce, set_coalesce ethtool operations (bsc#1091860 bsc#1098253).\n- vmxnet3: allow variable length transmit data ring buffer (bsc#1091860 bsc#1098253).\n- vmxnet3: avoid assumption about invalid dma_pa in vmxnet3_set_mc() (bsc#1091860 bsc#1098253).\n- vmxnet3: avoid format strint overflow warning (bsc#1091860 bsc#1098253).\n- vmxnet3: avoid xmit reset due to a race in vmxnet3 (bsc#1091860 bsc#1098253).\n- vmxnet3: fix incorrect dereference when rxvlan is disabled (bsc#1091860 bsc#1098253).\n- vmxnet3: fix non static symbol warning (bsc#1091860 bsc#1098253).\n- vmxnet3: fix tx data ring copy for variable size (bsc#1091860 bsc#1098253).\n- vmxnet3: increase default rx ring sizes (bsc#1091860 bsc#1098253).\n- vmxnet3: introduce command to register memory region (bsc#1091860 bsc#1098253).\n- vmxnet3: introduce generalized command interface to configure the device (bsc#1091860 bsc#1098253).\n- vmxnet3: prepare for version 3 changes (bsc#1091860 bsc#1098253).\n- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1091860 bsc#1098253).\n- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1091860 bsc#1098253).\n- vmxnet3: set the DMA mask before the first DMA map operation (bsc#1091860 bsc#1098253).\n- vmxnet3: update to version 3 (bsc#1091860 bsc#1098253).\n- vmxnet3: use DMA memory barriers where required (bsc#1091860 bsc#1098253).\n- vmxnet3: use correct flag to indicate LRO feature (bsc#1091860 bsc#1098253).\n- vsock: split dwork to avoid reinitializations (bnc#1012382).\n- vti6: Fix dev->max_mtu setting (bsc#1033962).\n- vti6: fix PMTU caching and reporting on xmit (bnc#1012382).\n- wlcore: sdio: check for valid platform device data before suspend (bnc#1012382).\n- x86/MCE: Remove min interval polling limitation (bnc#1012382).\n- x86/amd: do not set X86_BUG_SYSRET_SS_ATTRS when running under Xen (bnc#1012382).\n- x86/asm/entry/32: Simplify pushes of zeroed pt_regs->REGs (bnc#1012382).\n- x86/bugs: Move the l1tf function and define pr_fmt properly (bnc#1012382).\n- x86/bugs: Respect nospec command line option (bsc#1068032).\n- x86/cpu/AMD: Fix erratum 1076 (CPB bit) (bnc#1012382).\n- x86/cpu: Make alternative_msr_write work for 32-bit code (bnc#1012382).\n- x86/cpu: Re-apply forced caps every time CPU caps are re-read (bnc#1012382).\n- x86/cpufeatures: Add CPUID_7_EDX CPUID leaf (bnc#1012382).\n- x86/cpufeatures: Clean up Spectre v2 related CPUID flags (bnc#1012382).\n- x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface (bnc#1012382).\n- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).\n- x86/init: fix build with CONFIG_SWAP=n (bnc#1012382).\n- x86/irqflags: Mark native_restore_fl extern inline (bnc#1012382).\n- x86/irqflags: Provide a declaration for native_save_fl.\n- x86/mm/kmmio: Make the tracer robust against L1TF (bnc#1012382).\n- x86/mm/pat: Fix L1TF stable backport for CPA (bnc#1012382).\n- x86/mm/pat: Fix L1TF stable backport for CPA, 2nd call (bnc#1012382).\n- x86/mm/pat: Make set_memory_np() L1TF safe (bnc#1012382).\n- x86/mm: Add TLB purge to free pmd/pte page interfaces (bnc#1012382).\n- x86/mm: Disable ioremap free page handling on x86-PAE (bnc#1012382).\n- x86/mm: Give each mm TLB flush generation a unique ID (bnc#1012382).\n- x86/paravirt: Fix spectre-v2 mitigations for paravirt guests (bnc#1012382).\n- x86/paravirt: Make native_save_fl() extern inline (bnc#1012382).\n- x86/process: Correct and optimize TIF_BLOCKSTEP switch (bnc#1012382).\n- x86/process: Optimize TIF checks in __switch_to_xtra() (bnc#1012382).\n- x86/process: Optimize TIF_NOTSC switch (bnc#1012382).\n- x86/process: Re-export start_thread() (bnc#1012382).\n- x86/spectre: Add missing family 6 check to microcode check (bnc#1012382).\n- x86/spectre_v2: Do not check microcode versions when running under hypervisors (bnc#1012382).\n- x86/speculation/l1tf: Exempt zeroed PTEs from inversion (bnc#1012382).\n- x86/speculation/l1tf: Extend 64bit swap file size limit (bnc#1012382).\n- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).\n- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1012382).\n- x86/speculation/l1tf: Fix up CPU feature flags (bnc#1012382).\n- x86/speculation/l1tf: Fix up pte->pfn conversion for PAE (bnc#1012382).\n- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).\n- x86/speculation/l1tf: Invert all not present mappings (bnc#1012382).\n- x86/speculation/l1tf: Make pmd/pud_mknotpresent() invert (bnc#1012382).\n- x86/speculation/l1tf: Protect PAE swap entries against L1TF (bnc#1012382).\n- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).\n- x86/speculation/l1tf: Unbreak !__HAVE_ARCH_PFN_MODIFY_ALLOWED architectures (bnc#1012382).\n- x86/speculation: Add <asm/msr-index.h> dependency (bnc#1012382).\n- x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support (bnc#1012382).\n- x86/speculation: Clean up various Spectre related details (bnc#1012382).\n- x86/speculation: Correct Speculation Control microcode blacklist again (bnc#1012382).\n- x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP (bnc#1012382).\n- x86/speculation: Update Speculation Control microcode blacklist (bnc#1012382).\n- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).\n- x86/speculation: Use IBRS if available before calling into firmware (bnc#1012382).\n- x86/speculation: Use Indirect Branch Prediction Barrier in context switch (bnc#1012382).\n- x86/xen: Add call of speculative_store_bypass_ht_init() to PV paths (bnc#1012382).\n- xen-netfront: wait xenbus state change when load module manually (bnc#1012382).\n- xen/blkback: do not keep persistent grants too long (bsc#1085042).\n- xen/blkback: move persistent grants flags to bool (bsc#1085042).\n- xen/blkfront: cleanup stale persistent grants (bsc#1085042).\n- xen/blkfront: reorder tests in xlblk_init() (bsc#1085042).\n- xen/netfront: do not cache skb_shinfo() (bnc#1012382).\n- xen: set cpu capabilities from xen_start_kernel() (bnc#1012382).\n- xfrm: fix missing dst_release() after policy blocking lbcast and multicast (bnc#1012382).\n- xfrm: free skb if nlsk pointer is NULL (bnc#1012382).\n- xfrm_user: prevent leaking 2 bytes of kernel memory (bnc#1012382).\n- xfs: Remove dead code from inode recover function (bsc#1105396).\n- xfs: repair malformed inode items during log recovery (bsc#1105396).\n- xhci: Fix perceived dead host due to runtime suspend race with event handler (bnc#1012382).\n- zswap: re-check zswap_is_full() after do zswap_shrink() (bnc#1012382).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-Live-Patching-12-SP3-2018-1941", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2775-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:2775-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20182775-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:2775-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html", }, { category: "self", summary: "SUSE Bug 1012382", url: "https://bugzilla.suse.com/1012382", }, { category: "self", summary: "SUSE Bug 1015342", url: "https://bugzilla.suse.com/1015342", }, { category: "self", summary: "SUSE Bug 1015343", url: "https://bugzilla.suse.com/1015343", }, { category: "self", summary: "SUSE Bug 1017967", url: "https://bugzilla.suse.com/1017967", }, { category: "self", summary: "SUSE Bug 1019695", url: "https://bugzilla.suse.com/1019695", }, { category: "self", summary: "SUSE Bug 1019699", url: "https://bugzilla.suse.com/1019699", }, { category: "self", summary: "SUSE Bug 1020412", url: "https://bugzilla.suse.com/1020412", }, { category: "self", summary: "SUSE Bug 1021121", url: "https://bugzilla.suse.com/1021121", }, { category: "self", summary: "SUSE Bug 1022604", url: "https://bugzilla.suse.com/1022604", }, { category: "self", summary: "SUSE Bug 1024361", url: "https://bugzilla.suse.com/1024361", }, { category: "self", summary: "SUSE Bug 1024365", url: "https://bugzilla.suse.com/1024365", }, { category: "self", summary: "SUSE Bug 1024376", url: "https://bugzilla.suse.com/1024376", }, { category: "self", summary: "SUSE Bug 1027968", url: "https://bugzilla.suse.com/1027968", }, { category: "self", summary: "SUSE Bug 1030552", url: "https://bugzilla.suse.com/1030552", }, { category: "self", summary: "SUSE Bug 1031492", url: "https://bugzilla.suse.com/1031492", }, { category: "self", summary: "SUSE Bug 1033962", url: "https://bugzilla.suse.com/1033962", }, { category: "self", summary: "SUSE Bug 1042286", url: "https://bugzilla.suse.com/1042286", }, { category: "self", summary: "SUSE Bug 1048317", url: "https://bugzilla.suse.com/1048317", }, { category: "self", summary: "SUSE Bug 1050431", url: "https://bugzilla.suse.com/1050431", }, { category: "self", summary: "SUSE Bug 1053685", url: "https://bugzilla.suse.com/1053685", }, { category: "self", summary: "SUSE Bug 1055014", url: "https://bugzilla.suse.com/1055014", }, { category: "self", summary: "SUSE Bug 1056596", url: "https://bugzilla.suse.com/1056596", }, { category: "self", summary: "SUSE Bug 1062604", url: "https://bugzilla.suse.com/1062604", }, { category: "self", summary: "SUSE Bug 1063646", url: "https://bugzilla.suse.com/1063646", }, { category: "self", summary: "SUSE Bug 1064232", url: "https://bugzilla.suse.com/1064232", }, { category: "self", summary: "SUSE Bug 1065364", url: "https://bugzilla.suse.com/1065364", }, { category: "self", summary: "SUSE Bug 1066223", url: "https://bugzilla.suse.com/1066223", }, { category: "self", summary: "SUSE Bug 1068032", url: "https://bugzilla.suse.com/1068032", }, { category: "self", summary: "SUSE Bug 1068075", url: "https://bugzilla.suse.com/1068075", }, { category: "self", summary: "SUSE Bug 1069138", url: "https://bugzilla.suse.com/1069138", }, { category: "self", summary: "SUSE Bug 1078921", url: "https://bugzilla.suse.com/1078921", }, { category: "self", summary: "SUSE Bug 1080157", url: "https://bugzilla.suse.com/1080157", }, { category: "self", summary: "SUSE Bug 1083663", url: "https://bugzilla.suse.com/1083663", }, { category: "self", summary: "SUSE Bug 1085042", url: "https://bugzilla.suse.com/1085042", }, { category: "self", summary: "SUSE Bug 1085536", url: "https://bugzilla.suse.com/1085536", }, { category: "self", summary: "SUSE Bug 1085539", url: "https://bugzilla.suse.com/1085539", }, { category: "self", summary: "SUSE Bug 1086457", url: "https://bugzilla.suse.com/1086457", }, { category: "self", summary: "SUSE Bug 1087092", url: "https://bugzilla.suse.com/1087092", }, { category: "self", summary: "SUSE Bug 1089066", url: "https://bugzilla.suse.com/1089066", }, { category: "self", summary: "SUSE Bug 1090888", url: "https://bugzilla.suse.com/1090888", }, { category: "self", summary: "SUSE Bug 1091171", url: "https://bugzilla.suse.com/1091171", }, { category: "self", summary: "SUSE Bug 1091860", url: "https://bugzilla.suse.com/1091860", }, { category: "self", summary: "SUSE Bug 1096254", url: "https://bugzilla.suse.com/1096254", }, { category: "self", summary: "SUSE Bug 1096748", url: "https://bugzilla.suse.com/1096748", }, { category: "self", summary: "SUSE Bug 1097105", url: "https://bugzilla.suse.com/1097105", }, { category: "self", summary: "SUSE Bug 1098253", url: "https://bugzilla.suse.com/1098253", }, { category: "self", summary: "SUSE Bug 1098822", url: "https://bugzilla.suse.com/1098822", }, { category: "self", summary: "SUSE Bug 1099597", url: "https://bugzilla.suse.com/1099597", }, { category: "self", summary: "SUSE Bug 1099810", url: "https://bugzilla.suse.com/1099810", }, { category: "self", summary: "SUSE Bug 1099811", url: "https://bugzilla.suse.com/1099811", }, { category: "self", summary: "SUSE Bug 1099813", url: "https://bugzilla.suse.com/1099813", }, { category: "self", summary: "SUSE Bug 1099832", url: "https://bugzilla.suse.com/1099832", }, { category: "self", summary: "SUSE Bug 1099844", url: "https://bugzilla.suse.com/1099844", }, { category: "self", summary: "SUSE Bug 1099845", url: "https://bugzilla.suse.com/1099845", }, { category: "self", summary: "SUSE Bug 1099846", url: "https://bugzilla.suse.com/1099846", }, { category: "self", summary: "SUSE Bug 1099849", url: "https://bugzilla.suse.com/1099849", }, { category: "self", summary: "SUSE Bug 1099863", url: "https://bugzilla.suse.com/1099863", }, { category: "self", summary: "SUSE Bug 1099864", url: "https://bugzilla.suse.com/1099864", }, { category: "self", summary: "SUSE Bug 1099922", url: "https://bugzilla.suse.com/1099922", }, { category: "self", summary: "SUSE Bug 1099999", url: "https://bugzilla.suse.com/1099999", }, { category: "self", summary: "SUSE Bug 1100000", url: "https://bugzilla.suse.com/1100000", }, { category: "self", summary: "SUSE Bug 1100001", url: "https://bugzilla.suse.com/1100001", }, { category: "self", summary: "SUSE Bug 1100132", url: "https://bugzilla.suse.com/1100132", }, { category: "self", summary: "SUSE Bug 1101822", url: "https://bugzilla.suse.com/1101822", }, { category: "self", summary: "SUSE Bug 1101841", url: "https://bugzilla.suse.com/1101841", }, { category: "self", summary: "SUSE Bug 1102346", url: "https://bugzilla.suse.com/1102346", }, { category: "self", summary: "SUSE Bug 1102486", url: "https://bugzilla.suse.com/1102486", }, { category: "self", summary: "SUSE Bug 1102517", url: "https://bugzilla.suse.com/1102517", }, { category: "self", summary: "SUSE Bug 1102715", url: "https://bugzilla.suse.com/1102715", }, { category: "self", summary: "SUSE Bug 1102797", url: "https://bugzilla.suse.com/1102797", }, { category: "self", summary: "SUSE Bug 1103269", url: "https://bugzilla.suse.com/1103269", }, { category: "self", summary: "SUSE Bug 1103445", url: "https://bugzilla.suse.com/1103445", }, { category: "self", summary: "SUSE Bug 1103717", url: "https://bugzilla.suse.com/1103717", }, { category: "self", summary: "SUSE Bug 1104319", url: "https://bugzilla.suse.com/1104319", }, { category: "self", summary: "SUSE Bug 1104485", url: "https://bugzilla.suse.com/1104485", }, { category: "self", summary: "SUSE Bug 1104494", url: "https://bugzilla.suse.com/1104494", }, { category: "self", summary: "SUSE Bug 1104495", url: "https://bugzilla.suse.com/1104495", }, { category: "self", summary: "SUSE Bug 1104683", url: "https://bugzilla.suse.com/1104683", }, { category: "self", summary: "SUSE Bug 1104897", url: "https://bugzilla.suse.com/1104897", }, { category: "self", summary: "SUSE Bug 1105271", url: "https://bugzilla.suse.com/1105271", }, { category: "self", summary: "SUSE Bug 1105292", url: "https://bugzilla.suse.com/1105292", }, { category: "self", summary: "SUSE Bug 1105322", url: "https://bugzilla.suse.com/1105322", }, { category: "self", summary: "SUSE Bug 1105323", url: "https://bugzilla.suse.com/1105323", }, { category: "self", summary: "SUSE Bug 1105392", url: "https://bugzilla.suse.com/1105392", }, { category: "self", summary: "SUSE Bug 1105396", url: "https://bugzilla.suse.com/1105396", }, { category: "self", summary: "SUSE Bug 1105524", url: "https://bugzilla.suse.com/1105524", }, { category: "self", summary: "SUSE Bug 1105536", url: "https://bugzilla.suse.com/1105536", }, { category: "self", summary: "SUSE Bug 1105769", url: "https://bugzilla.suse.com/1105769", }, { category: "self", summary: "SUSE Bug 1106016", url: "https://bugzilla.suse.com/1106016", }, { category: "self", summary: "SUSE Bug 1106105", url: "https://bugzilla.suse.com/1106105", }, { category: "self", summary: "SUSE Bug 1106185", url: "https://bugzilla.suse.com/1106185", }, { category: "self", summary: "SUSE Bug 1106229", url: "https://bugzilla.suse.com/1106229", }, { category: "self", summary: "SUSE Bug 1106271", url: "https://bugzilla.suse.com/1106271", }, { category: "self", summary: "SUSE Bug 1106275", url: "https://bugzilla.suse.com/1106275", }, { category: "self", summary: "SUSE Bug 1106276", url: "https://bugzilla.suse.com/1106276", }, { category: "self", summary: "SUSE Bug 1106278", url: "https://bugzilla.suse.com/1106278", }, { category: "self", summary: "SUSE Bug 1106281", url: "https://bugzilla.suse.com/1106281", }, { category: "self", summary: "SUSE Bug 1106283", url: "https://bugzilla.suse.com/1106283", }, { category: "self", summary: "SUSE Bug 1106369", url: "https://bugzilla.suse.com/1106369", }, { category: "self", summary: "SUSE Bug 1106509", url: "https://bugzilla.suse.com/1106509", }, { category: "self", summary: "SUSE Bug 1106511", url: "https://bugzilla.suse.com/1106511", }, { category: "self", summary: "SUSE Bug 1106697", url: "https://bugzilla.suse.com/1106697", }, { category: "self", summary: "SUSE Bug 1106929", url: "https://bugzilla.suse.com/1106929", }, { category: "self", summary: "SUSE Bug 1106934", url: "https://bugzilla.suse.com/1106934", }, { category: "self", summary: "SUSE Bug 1106995", url: "https://bugzilla.suse.com/1106995", }, { category: "self", summary: "SUSE Bug 1107060", url: "https://bugzilla.suse.com/1107060", }, { category: "self", summary: "SUSE Bug 1107078", url: "https://bugzilla.suse.com/1107078", }, { category: "self", summary: "SUSE Bug 1107319", url: "https://bugzilla.suse.com/1107319", }, { category: "self", summary: "SUSE Bug 1107320", url: "https://bugzilla.suse.com/1107320", }, { category: "self", summary: "SUSE Bug 1107689", url: "https://bugzilla.suse.com/1107689", }, { category: "self", summary: "SUSE Bug 1107735", url: "https://bugzilla.suse.com/1107735", }, { category: "self", summary: "SUSE Bug 1107966", url: "https://bugzilla.suse.com/1107966", }, { category: "self", summary: "SUSE Bug 963575", url: "https://bugzilla.suse.com/963575", }, { category: "self", summary: "SUSE Bug 966170", url: "https://bugzilla.suse.com/966170", }, { category: "self", summary: "SUSE Bug 966172", url: "https://bugzilla.suse.com/966172", }, { category: "self", summary: "SUSE Bug 969470", url: "https://bugzilla.suse.com/969470", }, { category: "self", summary: "SUSE Bug 969476", url: "https://bugzilla.suse.com/969476", }, { category: "self", summary: "SUSE Bug 969477", url: "https://bugzilla.suse.com/969477", }, { category: "self", summary: "SUSE Bug 970506", url: "https://bugzilla.suse.com/970506", }, { category: "self", summary: "SUSE CVE CVE-2018-10876 page", url: "https://www.suse.com/security/cve/CVE-2018-10876/", }, { category: "self", summary: "SUSE CVE CVE-2018-10877 page", url: "https://www.suse.com/security/cve/CVE-2018-10877/", }, { category: "self", summary: "SUSE CVE CVE-2018-10878 page", url: "https://www.suse.com/security/cve/CVE-2018-10878/", }, { category: "self", summary: "SUSE CVE CVE-2018-10879 page", url: "https://www.suse.com/security/cve/CVE-2018-10879/", }, { category: "self", summary: "SUSE CVE CVE-2018-10880 page", url: "https://www.suse.com/security/cve/CVE-2018-10880/", }, { category: "self", summary: "SUSE CVE CVE-2018-10881 page", url: "https://www.suse.com/security/cve/CVE-2018-10881/", }, { category: "self", summary: "SUSE CVE CVE-2018-10882 page", url: "https://www.suse.com/security/cve/CVE-2018-10882/", }, { category: "self", summary: "SUSE CVE CVE-2018-10883 page", url: "https://www.suse.com/security/cve/CVE-2018-10883/", }, { category: "self", summary: "SUSE CVE CVE-2018-10902 page", url: "https://www.suse.com/security/cve/CVE-2018-10902/", }, { category: "self", summary: "SUSE CVE CVE-2018-10938 page", url: "https://www.suse.com/security/cve/CVE-2018-10938/", }, { category: "self", summary: "SUSE CVE CVE-2018-1128 page", url: "https://www.suse.com/security/cve/CVE-2018-1128/", }, { category: "self", summary: "SUSE CVE CVE-2018-1129 page", url: "https://www.suse.com/security/cve/CVE-2018-1129/", }, { category: "self", summary: "SUSE CVE CVE-2018-12896 page", url: "https://www.suse.com/security/cve/CVE-2018-12896/", }, { category: "self", summary: "SUSE CVE CVE-2018-13093 page", url: "https://www.suse.com/security/cve/CVE-2018-13093/", }, { category: "self", summary: "SUSE CVE CVE-2018-13094 page", url: "https://www.suse.com/security/cve/CVE-2018-13094/", }, { category: "self", summary: "SUSE CVE CVE-2018-13095 page", url: "https://www.suse.com/security/cve/CVE-2018-13095/", }, { category: "self", summary: "SUSE CVE CVE-2018-15572 page", url: "https://www.suse.com/security/cve/CVE-2018-15572/", }, { category: "self", summary: "SUSE CVE CVE-2018-16658 page", url: "https://www.suse.com/security/cve/CVE-2018-16658/", }, { category: "self", summary: "SUSE CVE CVE-2018-6554 page", url: "https://www.suse.com/security/cve/CVE-2018-6554/", }, { category: "self", summary: "SUSE CVE CVE-2018-6555 page", url: "https://www.suse.com/security/cve/CVE-2018-6555/", }, { category: "self", summary: "SUSE CVE CVE-2018-9363 page", url: "https://www.suse.com/security/cve/CVE-2018-9363/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2018-09-20T16:27:21Z", generator: { date: "2018-09-20T16:27:21Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:2775-1", initial_release_date: "2018-09-20T16:27:21Z", revision_history: [ { date: "2018-09-20T16:27:21Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", product: { name: "kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", product_id: "kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", product: { name: "kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", product_id: "kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 12 SP3", product: { name: "SUSE Linux Enterprise Live Patching 12 SP3", product_id: "SUSE Linux Enterprise Live Patching 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-live-patching:12:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", product_id: "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", }, product_reference: "kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", product_id: "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", }, product_reference: "kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP3", }, ], }, vulnerabilities: [ { cve: "CVE-2018-10876", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10876", }, ], notes: [ { category: "general", text: "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10876", url: "https://www.suse.com/security/cve/CVE-2018-10876", }, { category: "external", summary: "SUSE Bug 1099811 for CVE-2018-10876", url: "https://bugzilla.suse.com/1099811", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:21Z", details: "low", }, ], title: "CVE-2018-10876", }, { cve: "CVE-2018-10877", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10877", }, ], notes: [ { category: "general", text: "Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10877", url: "https://www.suse.com/security/cve/CVE-2018-10877", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10877", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099846 for CVE-2018-10877", url: "https://bugzilla.suse.com/1099846", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:21Z", details: "low", }, ], title: "CVE-2018-10877", }, { cve: "CVE-2018-10878", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10878", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10878", url: "https://www.suse.com/security/cve/CVE-2018-10878", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10878", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099813 for CVE-2018-10878", url: "https://bugzilla.suse.com/1099813", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:21Z", details: "moderate", }, ], title: "CVE-2018-10878", }, { cve: "CVE-2018-10879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10879", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10879", url: "https://www.suse.com/security/cve/CVE-2018-10879", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10879", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099844 for CVE-2018-10879", url: "https://bugzilla.suse.com/1099844", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:21Z", details: "moderate", }, ], title: "CVE-2018-10879", }, { cve: "CVE-2018-10880", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10880", }, ], notes: [ { category: "general", text: "Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10880", url: "https://www.suse.com/security/cve/CVE-2018-10880", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10880", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099845 for CVE-2018-10880", url: "https://bugzilla.suse.com/1099845", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:21Z", details: "moderate", }, ], title: "CVE-2018-10880", }, { cve: "CVE-2018-10881", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10881", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10881", url: "https://www.suse.com/security/cve/CVE-2018-10881", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10881", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099864 for CVE-2018-10881", url: "https://bugzilla.suse.com/1099864", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:21Z", details: "moderate", }, ], title: "CVE-2018-10881", }, { cve: "CVE-2018-10882", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10882", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10882", url: "https://www.suse.com/security/cve/CVE-2018-10882", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10882", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099849 for CVE-2018-10882", url: "https://bugzilla.suse.com/1099849", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:21Z", details: "moderate", }, ], title: "CVE-2018-10882", }, { cve: "CVE-2018-10883", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10883", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10883", url: "https://www.suse.com/security/cve/CVE-2018-10883", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10883", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099863 for CVE-2018-10883", url: "https://bugzilla.suse.com/1099863", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:21Z", details: "moderate", }, ], title: "CVE-2018-10883", }, { cve: "CVE-2018-10902", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10902", }, ], notes: [ { category: "general", text: "It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10902", url: "https://www.suse.com/security/cve/CVE-2018-10902", }, { category: "external", summary: "SUSE Bug 1105322 for CVE-2018-10902", url: "https://bugzilla.suse.com/1105322", }, { category: "external", summary: "SUSE Bug 1105323 for CVE-2018-10902", url: "https://bugzilla.suse.com/1105323", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:21Z", details: "moderate", }, ], title: "CVE-2018-10902", }, { cve: "CVE-2018-10938", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10938", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10938", url: "https://www.suse.com/security/cve/CVE-2018-10938", }, { category: "external", summary: "SUSE Bug 1106016 for CVE-2018-10938", url: "https://bugzilla.suse.com/1106016", }, { category: "external", summary: "SUSE Bug 1106191 for CVE-2018-10938", url: "https://bugzilla.suse.com/1106191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:21Z", details: "important", }, ], title: "CVE-2018-10938", }, { cve: "CVE-2018-1128", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1128", }, ], notes: [ { category: "general", text: "It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1128", url: "https://www.suse.com/security/cve/CVE-2018-1128", }, { category: "external", summary: "SUSE Bug 1096748 for CVE-2018-1128", url: "https://bugzilla.suse.com/1096748", }, { category: "external", summary: "SUSE Bug 1114710 for CVE-2018-1128", url: "https://bugzilla.suse.com/1114710", }, { category: "external", summary: "SUSE Bug 1177843 for CVE-2018-1128", url: "https://bugzilla.suse.com/1177843", }, { category: "external", summary: "SUSE Bug 1177859 for CVE-2018-1128", url: "https://bugzilla.suse.com/1177859", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:21Z", details: "important", }, ], title: "CVE-2018-1128", }, { cve: "CVE-2018-1129", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1129", }, ], notes: [ { category: "general", text: "A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1129", url: "https://www.suse.com/security/cve/CVE-2018-1129", }, { category: "external", summary: "SUSE Bug 1096748 for CVE-2018-1129", url: "https://bugzilla.suse.com/1096748", }, { category: "external", summary: "SUSE Bug 1114710 for CVE-2018-1129", url: "https://bugzilla.suse.com/1114710", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:21Z", details: "important", }, ], title: "CVE-2018-1129", }, { cve: "CVE-2018-12896", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12896", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12896", url: "https://www.suse.com/security/cve/CVE-2018-12896", }, { category: "external", summary: "SUSE Bug 1099922 for CVE-2018-12896", url: "https://bugzilla.suse.com/1099922", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:21Z", details: "low", }, ], title: "CVE-2018-12896", }, { cve: "CVE-2018-13093", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-13093", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/xfs/xfs_icache.c in the Linux kernel through 4.17.3. There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-13093", url: "https://www.suse.com/security/cve/CVE-2018-13093", }, { category: "external", summary: "SUSE Bug 1100001 for CVE-2018-13093", url: "https://bugzilla.suse.com/1100001", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:21Z", details: "moderate", }, ], title: "CVE-2018-13093", }, { cve: "CVE-2018-13094", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-13094", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/xfs/libxfs/xfs_attr_leaf.c in the Linux kernel through 4.17.3. An OOPS may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-13094", url: "https://www.suse.com/security/cve/CVE-2018-13094", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-13094", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1100000 for CVE-2018-13094", url: "https://bugzilla.suse.com/1100000", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:21Z", details: "moderate", }, ], title: "CVE-2018-13094", }, { cve: "CVE-2018-13095", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-13095", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.17.3. A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-13095", url: "https://www.suse.com/security/cve/CVE-2018-13095", }, { category: "external", summary: "SUSE Bug 1099999 for CVE-2018-13095", url: "https://bugzilla.suse.com/1099999", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:21Z", details: "moderate", }, ], title: "CVE-2018-13095", }, { cve: "CVE-2018-15572", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-15572", }, ], notes: [ { category: "general", text: "The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-15572", url: "https://www.suse.com/security/cve/CVE-2018-15572", }, { category: "external", summary: "SUSE Bug 1102517 for CVE-2018-15572", url: "https://bugzilla.suse.com/1102517", }, { category: "external", summary: "SUSE Bug 1105296 for CVE-2018-15572", url: "https://bugzilla.suse.com/1105296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:21Z", details: "important", }, ], title: "CVE-2018-15572", }, { cve: "CVE-2018-16658", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16658", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16658", url: "https://www.suse.com/security/cve/CVE-2018-16658", }, { category: "external", summary: "SUSE Bug 1092903 for CVE-2018-16658", url: "https://bugzilla.suse.com/1092903", }, { category: "external", summary: "SUSE Bug 1107689 for CVE-2018-16658", url: "https://bugzilla.suse.com/1107689", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-16658", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:21Z", details: "low", }, ], title: "CVE-2018-16658", }, { cve: "CVE-2018-6554", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6554", }, ], notes: [ { category: "general", text: "Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6554", url: "https://www.suse.com/security/cve/CVE-2018-6554", }, { category: "external", summary: "SUSE Bug 1106509 for CVE-2018-6554", url: "https://bugzilla.suse.com/1106509", }, { category: "external", summary: "SUSE Bug 1106511 for CVE-2018-6554", url: "https://bugzilla.suse.com/1106511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:21Z", details: "low", }, ], title: "CVE-2018-6554", }, { cve: "CVE-2018-6555", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6555", }, ], notes: [ { category: "general", text: "The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6555", url: "https://www.suse.com/security/cve/CVE-2018-6555", }, { category: "external", summary: "SUSE Bug 1106509 for CVE-2018-6555", url: "https://bugzilla.suse.com/1106509", }, { category: "external", summary: "SUSE Bug 1106511 for CVE-2018-6555", url: "https://bugzilla.suse.com/1106511", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2018-6555", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:21Z", details: "moderate", }, ], title: "CVE-2018-6555", }, { cve: "CVE-2018-9363", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-9363", }, ], notes: [ { category: "general", text: "In the hidp_process_report in bluetooth, there is an integer overflow. This could lead to an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-65853588 References: Upstream kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-9363", url: "https://www.suse.com/security/cve/CVE-2018-9363", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-9363", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1105292 for CVE-2018-9363", url: "https://bugzilla.suse.com/1105292", }, { category: "external", summary: "SUSE Bug 1105293 for CVE-2018-9363", url: "https://bugzilla.suse.com/1105293", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-20T16:27:21Z", details: "important", }, ], title: "CVE-2018-9363", }, ], }
suse-su-2018:2858-1
Vulnerability from csaf_suse
Published
2018-09-25 13:02
Modified
2018-09-25 13:02
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 azure kernel was updated to 4.4.155 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-13093: Prevent NULL pointer dereference and panic in lookup_slow()
on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image.
This occured because of a lack of proper validation that cached inodes are free
during allocation (bnc#1100001)
- CVE-2018-13095: Prevent denial of service (memory corruption and BUG) that
could have occurred for a corrupted xfs image upon encountering an inode that
is in extent format, but has more extents than fit in the inode fork
(bnc#1099999)
- CVE-2018-13094: Prevent OOPS that may have occured for a corrupted xfs image
after xfs_da_shrink_inode() is called with a NULL bp (bnc#1100000)
- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was
caused by the way the overrun accounting works. Depending on interval and
expiry time values, the overrun can be larger than INT_MAX, but the accounting
is int based. This basically made the accounting values, which are visible to
user space via timer_getoverrun(2) and siginfo::si_overrun, random. This
allowed a local user to cause a denial of service (signed integer overflow) via
crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922)
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that
could have been used by local attackers to read kernel memory (bnc#1107689)
- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local
attackers to use a incorrect bounds check in the CDROM driver
CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)
- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a
denial of service (ias_object use-after-free and system crash) or possibly have
unspecified other impact via an AF_IRDA socket (bnc#1106511)
- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed
local users to cause a denial of service (memory consumption) by repeatedly
binding an AF_IRDA socket (bnc#1106509)
- CVE-2018-1129: A flaw was found in the way signature calculation was handled
by cephx authentication protocol. An attacker having access to ceph cluster
network who is able to alter the message payload was able to bypass signature
checks done by cephx protocol (bnc#1096748)
- CVE-2018-1128: It was found that cephx authentication protocol did not verify
ceph clients correctly and was vulnerable to replay attack. Any attacker having
access to ceph cluster network who is able to sniff packets on network can use
this vulnerability to authenticate with ceph service and perform actions
allowed by ceph service (bnc#1096748)
- CVE-2018-10938: A crafted network packet sent remotely by an attacker forced
the kernel to enter an infinite loop in the cipso_v4_optptr() function leading
to a denial-of-service (bnc#1106016)
- CVE-2018-15572: The spectre_v2_select_mitigation function did not always fill
RSB upon a context switch, which made it easier for attackers to conduct
userspace-userspace spectreRSB attacks (bnc#1102517)
- CVE-2018-10902: Protect against concurrent access to prevent double realloc
(double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A
malicious local attacker could have used this for privilege escalation
(bnc#1105322).
- CVE-2018-9363: Prevent buffer overflow in hidp_process_report (bsc#1105292)
- CVE-2018-10883: A local user could have caused an out-of-bounds write in
jbd2_journal_dirty_metadata(), a denial of service, and a system crash by
mounting and operating on a crafted ext4 filesystem image (bsc#1099863)
- CVE-2018-10879: A local user could have caused a use-after-free in
ext4_xattr_set_entry function and a denial of service or unspecified other
impact by renaming a file in a crafted ext4 filesystem image (bsc#1099844)
- CVE-2018-10878: A local user could have caused an out-of-bounds write and a
denial of service or unspecified other impact by mounting and operating a
crafted ext4 filesystem image (bsc#1099813)
- CVE-2018-10876: A use-after-free was possible in ext4_ext_remove_space()
function when mounting and operating a crafted ext4 image (bsc#1099811)
- CVE-2018-10877: Prevent out-of-bound access in the ext4_ext_drop_refs()
function when operating on a crafted ext4 filesystem image (bsc#1099846)
- CVE-2018-10881: A local user could have caused an out-of-bound access in
ext4_get_group_info function, a denial of service, and a system crash by
mounting and operating on a crafted ext4 filesystem image (bsc#1099864)
- CVE-2018-10882: A local user could have caused an out-of-bound write, a
denial of service, and a system crash by unmounting a crafted ext4 filesystem
image (bsc#1099849)
- CVE-2018-10880: Prevent stack-out-of-bounds write in the ext4 filesystem code
when mounting and writing to a crafted ext4 image in ext4_update_inline_data().
An attacker could have used this to cause a system crash and a denial of
service (bsc#1099845)
The following non-security bugs were fixed:
- 9p/net: Fix zero-copy path in the 9p virtio transport (bnc#1012382).
- 9p/virtio: fix off-by-one error in sg list bounds check (bnc#1012382).
- 9p: fix multiple NULL-pointer-dereferences (bnc#1012382).
- ACPI / LPSS: Add missing prv_offset setting for byt/cht PWM devices (bnc#1012382).
- ACPI / PCI: Bail early in acpi_pci_add_bus() if there is no ACPI handle (bnc#1012382).
- ACPI / PM: save NVS memory for ASUS 1025C laptop (bnc#1012382).
- ACPI: save NVS memory for Lenovo G50-45 (bnc#1012382).
- ALSA: cs5535audio: Fix invalid endian conversion (bnc#1012382).
- ALSA: emu10k1: Rate-limit error messages about page errors (bnc#1012382).
- ALSA: emu10k1: add error handling for snd_ctl_add (bnc#1012382).
- ALSA: fm801: add error handling for snd_ctl_add (bnc#1012382).
- ALSA: hda - Sleep for 10ms after entering D3 on Conexant codecs (bnc#1012382).
- ALSA: hda - Turn CX8200 into D3 as well upon reboot (bnc#1012382).
- ALSA: hda/ca0132: fix build failure when a local macro is defined (bnc#1012382).
- ALSA: hda: Correct Asrock B85M-ITX power_save blacklist entry (bnc#1012382).
- ALSA: memalloc: Do not exceed over the requested size (bnc#1012382).
- ALSA: rawmidi: Change resized buffers atomically (bnc#1012382).
- ALSA: snd-aoa: add of_node_put() in error path (bsc#1099810).
- ALSA: usb-audio: Apply rate limit to warning messages in URB complete callback (bnc#1012382).
- ALSA: virmidi: Fix too long output trigger loop (bnc#1012382).
- ALSA: vx222: Fix invalid endian conversions (bnc#1012382).
- ALSA: vxpocket: Fix invalid endian conversions (bnc#1012382).
- ARC: Enable machine_desc->init_per_cpu for !CONFIG_SMP (bnc#1012382).
- ARC: Explicitly add -mmedium-calls to CFLAGS (bnc#1012382).
- ARC: Fix CONFIG_SWAP (bnc#1012382).
- ARC: mm: allow mprotect to make stack mappings executable (bnc#1012382).
- ARM: 8780/1: ftrace: Only set kernel memory back to read-only after boot (bnc#1012382).
- ARM: dts: Cygnus: Fix I2C controller interrupt type (bnc#1012382).
- ARM: dts: am3517.dtsi: Disable reference to OMAP3 OTG controller (bnc#1012382).
- ARM: dts: am437x: make edt-ft5x06 a wakeup source (bnc#1012382).
- ARM: dts: da850: Fix interrups property for gpio (bnc#1012382).
- ARM: dts: imx6sx: fix irq for pcie bridge (bnc#1012382).
- ARM: fix put_user() for gcc-8 (bnc#1012382).
- ARM: imx_v4_v5_defconfig: Select ULPI support (bnc#1012382).
- ARM: imx_v6_v7_defconfig: Select ULPI support (bnc#1012382).
- ARM: pxa: irq: fix handling of ICMR registers in suspend/resume (bnc#1012382).
- ARM: tegra: Fix Tegra30 Cardhu PCA954x reset (bnc#1012382).
- ASoC: Intel: cht_bsw_max98090: remove useless code, align with ChromeOS driver.
- ASoC: Intel: cht_bsw_max98090_ti: Fix jack initialization (bnc#1012382).
- ASoC: dpcm: do not merge format from invalid codec dai (bnc#1012382).
- ASoC: dpcm: fix BE dai not hw_free and shutdown (bnc#1012382).
- ASoC: pxa: Fix module autoload for platform drivers (bnc#1012382).
- ASoC: sirf: Fix potential NULL pointer dereference (bnc#1012382).
- Add reference to bsc#1091171 (bnc#1012382; bsc#1091171).
- Bluetooth: avoid killing an already killed socket (bnc#1012382).
- Bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bnc#1012382).
- Bluetooth: btusb: Remove Yoga 920 from the btusb_needs_reset_resume_table (bsc#1087092).
- Bluetooth: btusb: Use DMI matching for QCA reset_resume quirking (bsc#1087092).
- Bluetooth: hci_qca: Fix 'Sleep inside atomic section' warning (bnc#1012382).
- Documentation/spec_ctrl: Do some minor cleanups (bnc#1012382).
- HID: hid-plantronics: Re-resend Update to map button for PTT products (bnc#1012382).
- HID: i2c-hid: check if device is there before really probing (bnc#1012382).
- HID: wacom: Correct touch maximum XY of 2nd-gen Intuos (bnc#1012382).
- IB/core: Make testing MR flags for writability a static inline function (bnc#1012382).
- IB/core: Remove duplicate declaration of gid_cache_wq (bsc#1056596).
- IB/iser: Do not reduce max_sectors (bsc#1063646).
- IB/mlx4: Fix an error handling path in 'mlx4_ib_rereg_user_mr()'.
- IB/mlx4: Mark user MR as writable if actual virtual memory is writable (bnc#1012382).
- IB/mlx5: Fetch soft WQE's on fatal error state (bsc#1015342 bsc#1015343).
- IB/mlx5: Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1015342 bsc#1015343).
- IB/ocrdma: fix out of bounds access to local buffer (bnc#1012382).
- Input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bnc#1012382).
- Input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bnc#1012382).
- Input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bnc#1012382).
- KVM/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel (bnc#1012382).
- KVM: MMU: always terminate page walks at level 1 (bsc#1062604).
- KVM: MMU: simplify last_pte_bitmap (bsc#1062604).
- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- KVM: arm/arm64: Skip updating PMD entry if no change (bnc#1012382).
- KVM: arm/arm64: Skip updating PTE entry if no change (bnc#1012382).
- KVM: irqfd: fix race between EPOLLHUP and irq_bypass_register_consumer (bnc#1012382).
- KVM: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).
- MIPS: Correct the 64-bit DSP accumulator register size (bnc#1012382).
- MIPS: Fix off-by-one in pci_resource_to_user() (bnc#1012382).
- MIPS: ath79: fix register address in ath79_ddr_wb_flush() (bnc#1012382).
- MIPS: lib: Provide MIPS64r6 __multi3() for GCC < 7 (bnc#1012382).
- NET: stmmac: align DMA stuff to largest cache line length (bnc#1012382).
- PCI: Prevent sysfs disable of device while driver is attached (bnc#1012382).
- PCI: Skip MPS logic for Virtual Functions (VFs) (bnc#1012382).
- PCI: hotplug: Do not leak pci_slot on registration failure (bnc#1012382).
- PCI: pciehp: Fix use-after-free on unplug (bnc#1012382).
- PCI: pciehp: Request control of native hotplug only if supported (bnc#1012382).
- PM / sleep: wakeup: Fix build error caused by missing SRCU support (bnc#1012382).
- RDMA/i40iw: Avoid panic when objects are being created and destroyed (bsc#969476 bsc#969477).
- RDMA/i40iw: Avoid panic when reading back the IRQ affinity hint (bsc#969476 bsc#969477).
- RDMA/i40iw: Avoid reference leaks when processing the AEQ (bsc#969476 bsc#969477).
- RDMA/i40w: Hold read semaphore while looking after VMA (bsc#1024376).
- RDMA/mad: Convert BUG_ONs to error flows (bnc#1012382).
- RDMA/mlx5: Use proper spec flow label type (bsc#1015342 bsc#1015343).
- Revert 'MIPS: BCM47XX: Enable 74K Core ExternalSync for PCIe erratum' (bnc#1012382).
- Revert 'UBIFS: Fix potential integer overflow in allocation' (bnc#1012382).
- Revert 'f2fs: handle dirty segments inside refresh_sit_entry' (bsc#1106281).
- Revert 'mm: page_alloc: skip over regions of invalid pfns where possible' (bnc#1107078).
- Revert 'net: Do not copy pfmemalloc flag in __copy_skb_header()' (kabi).
- Revert 'netfilter: ipv6: nf_defrag: reduce struct net memory waste' (kabi).
- Revert 'skbuff: Unconditionally copy pfmemalloc in __skb_clone()' (kabi).
- Revert 'vsock: split dwork to avoid reinitializations' (kabi).
- Revert 'x86/mm: Give each mm TLB flush generation a unique ID' (kabi).
- Revert 'x86/speculation/l1tf: Fix up CPU feature flags' (kabi).
- Revert 'x86/speculation: Use Indirect Branch Prediction Barrier in context switch' (kabi).
- Smack: Mark inode instant in smack_task_to_inode (bnc#1012382).
- USB: musb: fix external abort on suspend (bsc#1085536).
- USB: option: add support for DW5821e (bnc#1012382).
- USB: serial: metro-usb: stop I/O after failed open (bsc#1085539).
- USB: serial: sierra: fix potential deadlock at close (bnc#1012382).
- Workaround kABI breakage by __must_check drop of strscpy() (bsc#1107319).
- afs: Fix directory permissions check (bsc#1106283).
- arc: fix build errors in arc/include/asm/delay.h (bnc#1012382).
- arc: fix type warnings in arc/mm/cache.c (bnc#1012382).
- arm64: make secondary_start_kernel() notrace (bnc#1012382).
- arm64: mm: check for upper PAGE_SHIFT bits in pfn_valid() (bnc#1012382).
- ath: Add regulatory mapping for APL13_WORLD (bnc#1012382).
- ath: Add regulatory mapping for APL2_FCCA (bnc#1012382).
- ath: Add regulatory mapping for Bahamas (bnc#1012382).
- ath: Add regulatory mapping for Bermuda (bnc#1012382).
- ath: Add regulatory mapping for ETSI8_WORLD (bnc#1012382).
- ath: Add regulatory mapping for FCC3_ETSIC (bnc#1012382).
- ath: Add regulatory mapping for Serbia (bnc#1012382).
- ath: Add regulatory mapping for Tanzania (bnc#1012382).
- ath: Add regulatory mapping for Uganda (bnc#1012382).
- atl1c: reserve min skb headroom (bnc#1012382).
- atm: Preserve value of skb->truesize when accounting to vcc (bsc#1089066).
- audit: allow not equal op for audit by executable (bnc#1012382).
- backlight: as3711_bl: Fix Device Tree node leaks (bsc#1106929).
- backlight: lm3630a: Bump REG_MAX value to 0x50 instead of 0x1F (bsc#1106929).
- bcache: avoid unncessary cache prefetch bch_btree_node_get() (bsc#1064232).
- bcache: calculate the number of incremental GC nodes according to the total of btree nodes (bsc#1064232).
- bcache: display rate debug parameters to 0 when writeback is not running (bsc#1064232).
- bcache: do not check return value of debugfs_create_dir() (bsc#1064232).
- bcache: finish incremental GC (bsc#1064232).
- bcache: fix I/O significant decline while backend devices registering (bsc#1064232).
- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064232).
- bcache: free heap cache_set->flush_btree in bch_journal_free (bsc#1064232).
- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section (bsc#1064232).
- bcache: release dc->writeback_lock properly in bch_writeback_thread() (bsc#1064232).
- bcache: set max writeback rate when I/O request is idle (bsc#1064232).
- bcache: simplify the calculation of the total amount of flash dirty data (bsc#1064232).
- be2net: remove unused old custom busy-poll fields (bsc#1021121 ).
- blkdev: __blkdev_direct_IO_simple: fix leak in error case (bsc#1083663).
- block: bio_iov_iter_get_pages: fix size of last iovec (bsc#1083663).
- block: bio_iov_iter_get_pages: pin more pages for multi-segment IOs (bsc#1083663).
- block: do not use interruptible wait anywhere (bnc#1012382).
- bnx2x: Fix invalid memory access in rss hash config path (bnc#1012382).
- bnx2x: Fix receiving tx-timeout in error or recovery state (bnc#1012382).
- bnxt_en: Always set output parameters in bnxt_get_max_rings() (bsc#963575).
- bnxt_en: Fix for system hang if request_irq fails (bnc#1012382).
- bnxt_en: Fix inconsistent BNXT_FLAG_AGG_RINGS logic (bsc#1020412 ).
- bpf: fix references to free_bpf_prog_info() in comments (bnc#1012382).
- brcmfmac: Add support for bcm43364 wireless chipset (bnc#1012382).
- brcmfmac: stop watchdog before detach and free everything (bnc#1012382).
- bridge: Propagate vlan add failure to user (bnc#1012382).
- btrfs: Do not remove block group still has pinned down bytes (bsc#1086457).
- btrfs: add barriers to btrfs_sync_log before log_commit_wait wakeups (bnc#1012382).
- btrfs: do not leak ret from do_chunk_alloc (bnc#1012382).
- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bnc#1012382).
- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf.
- btrfs: round down size diff when shrinking/growing device (bsc#1097105).
- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bnc#1012382).
- can: mpc5xxx_can: check of_iomap return before use (bnc#1012382).
- can: xilinx_can: fix RX loop if RXNEMP is asserted without RXOK (bnc#1012382).
- can: xilinx_can: fix RX overflow interrupt not being enabled (bnc#1012382).
- can: xilinx_can: fix device dropping off bus on RX overrun (bnc#1012382).
- can: xilinx_can: fix incorrect clear of non-processed interrupts (bnc#1012382).
- can: xilinx_can: fix recovery from error states not being propagated (bnc#1012382).
- can: xilinx_can: keep only 1-2 frames in TX FIFO to fix TX accounting (bnc#1012382).
- cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status (bnc#1012382).
- ceph: fix incorrect use of strncpy (bsc#1107319).
- ceph: return errors from posix_acl_equiv_mode() correctly (bsc#1107320).
- cifs: Fix stack out-of-bounds in smb{2,3}_create_lease_buf() (bsc#1012382).
- cifs: add missing debug entries for kconfig options (bnc#1012382).
- cifs: check kmalloc before use (bsc#1012382).
- cifs: store the leaseKey in the fid on SMB2_open (bsc#1012382).
- clk: tegra: Fix PLL_U post divider and initial rate on Tegra30 (bnc#1012382).
- crypto: ablkcipher - fix crash flushing dcache in error path (bnc#1012382).
- crypto: authenc - do not leak pointers to authenc keys (bnc#1012382).
- crypto: authencesn - do not leak pointers to authenc keys (bnc#1012382).
- crypto: blkcipher - fix crash flushing dcache in error path (bnc#1012382).
- crypto: padlock-aes - Fix Nano workaround data corruption (bnc#1012382).
- crypto: vmac - require a block cipher with 128-bit block size (bnc#1012382).
- crypto: vmac - separate tfm and request context (bnc#1012382).
- crypto: vmx - Fix sleep-in-atomic bugs (bsc#1048317).
- cxgb4: when disabling dcb set txq dcb priority to 0 (bnc#1012382).
- cxl: Fix wrong comparison in cxl_adapter_context_get() (bsc#1055014).
- dccp: fix undefined behavior with 'cwnd' shift in ccid2_cwnd_restart() (bnc#1012382).
- disable loading f2fs module on PAGE_SIZE > 4KB (bnc#1012382).
- dm cache metadata: save in-core policy_hint_size to on-disk superblock (bnc#1012382).
- dma-iommu: Fix compilation when !CONFIG_IOMMU_DMA (bnc#1012382).
- dmaengine: k3dma: Off by one in k3_of_dma_simple_xlate() (bnc#1012382).
- dmaengine: pxa_dma: remove duplicate const qualifier (bnc#1012382).
- driver core: Partially revert 'driver core: correct device's shutdown order' (bnc#1012382).
- drivers: net: lmc: fix case value for target abort error (bnc#1012382).
- drm/armada: fix colorkey mode property (bnc#1012382).
- drm/atmel-hlcdc: check stride values in the first plane (bsc#1106929).
- drm/atomic: Handling the case when setting old crtc for plane (bnc#1012382).
- drm/bridge: adv7511: Reset registers on hotplug (bnc#1012382).
- drm/cirrus: Use drm_framebuffer_put to avoid kernel oops in clean-up (bsc#1101822).
- drm/drivers: add support for using the arch wc mapping API.
- drm/exynos/dsi: mask frame-done interrupt (bsc#1106929).
- drm/exynos: decon5433: Fix WINCONx reset value (bnc#1012382).
- drm/exynos: decon5433: Fix per-plane global alpha for XRGB modes (bnc#1012382).
- drm/exynos: gsc: Fix support for NV16/61, YUV420/YVU420 and YUV422 modes (bnc#1012382).
- drm/gma500: fix psb_intel_lvds_mode_valid()'s return type (bnc#1012382).
- drm/i915/userptr: reject zero user_size (bsc#1090888).
- drm/i915: Correctly handle limited range YCbCr data on VLV/CHV (bsc#1087092).
- drm/imx: fix typo in ipu_plane_formats (bsc#1106929).
- drm/imx: imx-ldb: check if channel is enabled before printing warning (bnc#1012382).
- drm/imx: imx-ldb: disable LDB on driver bind (bnc#1012382).
- drm/msm/hdmi: Use bitwise operators when building register values (bsc#1106929).
- drm/nouveau/gem: off by one bugs in nouveau_gem_pushbuf_reloc_apply() (bnc#1012382).
- drm/panel: type promotion bug in s6e8aa0_read_mtp_id() (bsc#1105769).
- drm/radeon: fix mode_valid's return type (bnc#1012382).
- drm: Add DP PSR2 sink enable bit (bnc#1012382).
- drm: Reject getfb for multi-plane framebuffers (bsc#1106929).
- enic: do not call enic_change_mtu in enic_probe.
- enic: handle mtu change for vf properly (bnc#1012382).
- enic: initialize enic->rfs_h.lock in enic_probe (bnc#1012382).
- ext4: check for NUL characters in extended attribute's name (bnc#1012382).
- ext4: check for allocation block validity with block group locked (bsc#1104495).
- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).
- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).
- ext4: fix inline data updates with checksums enabled (bsc#1104494).
- ext4: fix spectre gadget in ext4_mb_regular_allocator() (bnc#1012382).
- ext4: reset error code in ext4_find_entry in fallback (bnc#1012382).
- ext4: sysfs: print ext4_super_block fields as little-endian (bsc#1106229).
- f2fs: fix to do not trigger writeback during recovery (bnc#1012382).
- fat: fix memory allocation failure handling of match_strdup() (bnc#1012382).
- fb: fix lost console when the user unplugs a USB adapter (bnc#1012382).
- fbdev: omapfb: off by one in omapfb_register_client() (bsc#1106929).
- fix __legitimize_mnt()/mntput() race (bnc#1012382).
- fix mntput/mntput race (bnc#1012382).
- fork: unconditionally clear stack on fork (bnc#1012382).
- fs/9p/xattr.c: catch the error of p9_client_clunk when setting xattr failed (bnc#1012382).
- fs/dax.c: fix inefficiency in dax_writeback_mapping_range() (bsc#1106185).
- fs/quota: Fix spectre gadget in do_quotactl (bnc#1012382).
- fs: aio: fix the increment of aio-nr and counting against aio-max-nr (bsc#1068075, bsc#1078921).
- fuse: Add missed unlock_page() to fuse_readpages_fill() (bnc#1012382).
- fuse: Do not access pipe->buffers without pipe_lock() (bnc#1012382).
- fuse: Fix oops at process_init_reply() (bnc#1012382).
- fuse: fix double request_end() (bnc#1012382).
- fuse: fix unlocked access to processing queue (bnc#1012382).
- fuse: umount should wait for all requests (bnc#1012382).
- genirq/proc: Return proper error code when irq_set_affinity() fails (bnc#1105392).
- getxattr: use correct xattr length (bnc#1012382).
- hfsplus: Do not clear SGID when inheriting ACLs (bsc#1030552).
- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bnc#1012382).
- hwrng: exynos - Disable runtime PM on driver unbind.
- i2c: davinci: Avoid zero value of CLKH (bnc#1012382).
- i2c: imx: Fix race condition in dma read (bnc#1012382).
- i2c: imx: Fix reinit_completion() use (bnc#1012382).
- i2c: ismt: fix wrong device address when unmap the data buffer (bnc#1012382).
- i40e: use cpumask_copy instead of direct assignment (bsc#1053685).
- i40iw: Fix memory leak in error path of create QP (bsc#969476 bsc#969477).
- i40iw: Use correct address in dst_neigh_lookup for IPv6 (bsc#969476 bsc#969477).
- ibmvnic: Include missing return code checks in reset function (bnc#1107966).
- ieee802154: at86rf230: switch from BUG_ON() to WARN_ON() on problem (bnc#1012382).
- ieee802154: at86rf230: use __func__ macro for debug messages (bnc#1012382).
- ieee802154: fakelb: switch from BUG_ON() to WARN_ON() on problem (bnc#1012382).
- igb: Fix not adding filter elements to the list (bsc#1024361 bsc#1024365).
- iio: ad9523: Fix displayed phase (bnc#1012382).
- iio: ad9523: Fix return value for ad952x_store() (bnc#1012382).
- inet: frag: enforce memory limits earlier (bnc#1012382 bsc#970506).
- iommu/amd: make sure TLB to be flushed before IOVA freed (bsc#1106105).
- iommu/vt-d: Add definitions for PFSID (bnc#1012382).
- iommu/vt-d: Fix dev iotlb pfsid use (bnc#1012382).
- iommu/vt-d: Ratelimit each dmar fault printing (bsc#1106105).
- ioremap: Update pgtable free interfaces with addr (bnc#1012382).
- ip: hash fragments consistently (bnc#1012382).
- ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull (bnc#1012382).
- ipconfig: Correctly initialise ic_nameservers (bnc#1012382).
- ipv4+ipv6: Make INET*_ESP select CRYPTO_ECHAINIV (bnc#1012382).
- ipv4: Return EINVAL when ping_group_range sysctl does not map to user ns (bnc#1012382).
- ipv4: remove BUG_ON() from fib_compute_spec_dst (bnc#1012382).
- ipv6: fix useless rol32 call on hash (bnc#1012382).
- ipv6: mcast: fix unsolicited report interval after receiving querys (bnc#1012382).
- ipvlan: use ETH_MAX_MTU as max mtu (bsc#1033962).
- iscsi target: fix session creation failure handling (bnc#1012382).
- isdn: Disable IIOCDBGVAR (bnc#1012382).
- iw_cxgb4: remove duplicate memcpy() in c4iw_create_listen() (bsc#969476 bsc#969477).
- iwlwifi: pcie: fix race in Rx buffer allocator (bnc#1012382).
- ixgbe: Be more careful when modifying MAC filters (bnc#1012382).
- jfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- jump_label: Add RELEASE barrier after text changes (bsc#1105271).
- jump_label: Fix concurrent static_key_enable/disable() (bsc#1105271).
- jump_label: Move CPU hotplug locking (bsc#1105271).
- jump_label: Provide hotplug context variants (bsc#1105271).
- jump_label: Reduce the size of struct static_key (bsc#1105271).
- jump_label: Reorder hotplug lock and jump_label_lock (bsc#1105271).
- jump_label: Split out code under the hotplug lock (bsc#1105271).
- jump_label: remove bug.h, atomic.h dependencies for HAVE_JUMP_LABEL (bsc#1105271).
- kABI: protect enum tcp_ca_event (kabi).
- kABI: reexport tcp_send_ack (kabi).
- kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- kasan: do not emit builtin calls when sanitization is off (bnc#1012382).
- kasan: fix shadow_size calculation error in kasan_module_alloc (bnc#1012382).
- kbuild: verify that $DEPMOD is installed (bnc#1012382).
- kernel: improve spectre mitigation (bnc#1106934, LTC#171029).
- kprobes/x86: Fix %p uses in error messages (bnc#1012382).
- kprobes: Make list and blacklist root user read only (bnc#1012382).
- kthread, tracing: Do not expose half-written comm when creating kthreads (bsc#1104897).
- kvm: x86: vmx: fix vpid leak (bnc#1012382).
- l2tp: use sk_dst_check() to avoid race on sk->sk_dst_cache (bnc#1012382).
- lib/rhashtable: consider param->min_size when setting initial table size (bnc#1012382).
- libata: Fix command retry decision (bnc#1012382).
- libceph: check authorizer reply/challenge length before reading (bsc#1096748).
- libceph: factor out __ceph_x_decrypt() (bsc#1096748).
- libceph: factor out __prepare_write_connect() (bsc#1096748).
- libceph: factor out encrypt_authorizer() (bsc#1096748).
- libceph: store ceph_auth_handshake pointer in ceph_connection (bsc#1096748).
- libceph: weaken sizeof check in ceph_x_verify_authorizer_reply() (bsc#1096748).
- llc: use refcount_inc_not_zero() for llc_sap_find() (bnc#1012382).
- locking/lockdep: Do not record IRQ state within lockdep code (bnc#1012382).
- locks: pass inode pointer to locks_free_lock_context (bsc@1099832).
- locks: prink more detail when there are leaked locks (bsc#1099832).
- locks: restore a warn for leaked locks on close (bsc#1099832).
- m68k: fix 'bad page state' oops on ColdFire boot (bnc#1012382).
- mac80211: add stations tied to AP_VLANs during hw reconfig (bnc#1012382).
- md/raid10: fix that replacement cannot complete recovery after reassemble (bnc#1012382).
- md: fix NULL dereference of mddev->pers in remove_and_add_spares() (bnc#1012382).
- media: omap3isp: fix unbalanced dma_iommu_mapping (bnc#1012382).
- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bnc#1012382).
- media: rtl28xxu: be sure that it won't go past the array size (bsc#1050431).
- media: s5p-jpeg: fix number of components macro (bsc#1050431).
- media: saa7164: Fix driver name in debug output (bnc#1012382).
- media: si470x: fix __be16 annotations (bnc#1012382).
- media: siano: get rid of __le32/__le16 cast warnings (bnc#1012382).
- media: staging: omap4iss: Include asm/cacheflush.h after generic includes (bnc#1012382).
- media: videobuf2-core: do not call memop 'finish' when queueing (bnc#1012382).
- memory: tegra: Apply interrupts mask per SoC (bnc#1012382).
- memory: tegra: Do not handle spurious interrupts (bnc#1012382).
- mfd: cros_ec: Fail early if we cannot identify the EC (bnc#1012382).
- microblaze: Fix simpleImage format generation (bnc#1012382).
- mm/hugetlb: filter out hugetlb pages if HUGEPAGE migration is not supported (bnc#1106697).
- mm/memory.c: check return value of ioremap_prot (bnc#1012382).
- mm/slub.c: add __printf verification to slab_err() (bnc#1012382).
- mm/tlb: Remove tlb_remove_table() non-concurrent condition (bnc#1012382).
- mm: Add vm_insert_pfn_prot() (bnc#1012382).
- mm: fix cache mode tracking in vm_insert_mixed() (bnc#1012382).
- mm: memcg: fix use after free in mem_cgroup_iter() (bnc#1012382).
- mm: vmalloc: avoid racy handling of debugobjects in vunmap (bnc#1012382).
- mm: x86: move _PAGE_SWP_SOFT_DIRTY from bit 7 to bit 1 (bnc#1012382).
- mtd: rawnand: fsl_ifc: fix FSL NAND driver to read all ONFI parameter pages (bnc#1012382).
- mtd: ubi: wl: Fix error return code in ubi_wl_init().
- mwifiex: correct histogram data with appropriate index (bnc#1012382).
- mwifiex: handle race during mwifiex_usb_disconnect (bnc#1012382).
- net/9p/client.c: version pointer uninitialized (bnc#1012382).
- net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree() (bnc#1012382).
- net/ethernet/freescale/fman: fix cross-build error (bnc#1012382).
- net/ipv4: Set oif in fib_compute_spec_dst (bnc#1012382).
- net/mlx4_core: Save the qpn from the input modifier in RST2INIT wrapper (bnc#1012382).
- net/mlx5: Add missing SET_DRIVER_VERSION command translation (bsc#1015342 bsc#1015343).
- net/mlx5: E-Switch, Include VF RDMA stats in vport statistics (bsc#966170 bsc#966172).
- net/mlx5: Eswitch, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1015342 bsc#1015343).
- net/mlx5: Fix wrong size allocation for QoS ETC TC regitster (bsc#966170 bsc#966172).
- net/mlx5: Vport, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#966170 bsc#966172).
- net/mlx5e: Do not allow aRFS for encapsulated packets (bsc#1015342 bsc#1015343).
- net/mlx5e: Err if asked to offload TC match on frag being first (bsc#1015342 bsc#1015343).
- net/mlx5e: Fix quota counting in aRFS expire flow (bsc#1015342 bsc#1015343).
- net/mlx5e: Refine ets validation function (bsc#966170 bsc#966172).
- net: 6lowpan: fix reserved space for single frames (bnc#1012382).
- net: Do not copy pfmemalloc flag in __copy_skb_header() (bnc#1012382).
- net: add skb_condense() helper (bsc#1089066).
- net: adjust skb->truesize in ___pskb_trim() (bsc#1089066).
- net: adjust skb->truesize in pskb_expand_head() (bsc#1089066).
- net: axienet: Fix double deregister of mdio (bnc#1012382).
- net: caif: Add a missing rcu_read_unlock() in caif_flow_cb (bnc#1012382).
- net: davinci_emac: match the mdio device against its compatible if possible (bnc#1012382).
- net: dsa: Do not suspend/resume closed slave_dev (bnc#1012382).
- net: ena: Fix use of uninitialized DMA address bits field (bsc#1027968).
- net: fix amd-xgbe flow-control issue (bnc#1012382).
- net: hamradio: use eth_broadcast_addr (bnc#1012382).
- net: lan78xx: Fix misplaced tasklet_schedule() call (bnc#1012382).
- net: lan78xx: fix rx handling before first packet is send (bnc#1012382).
- net: mac802154: tx: expand tailroom if necessary (bnc#1012382).
- net: phy: fix flag masking in __set_phy_supported (bnc#1012382).
- net: prevent ISA drivers from building on PPC32 (bnc#1012382).
- net: propagate dev_get_valid_name return code (bnc#1012382).
- net: qca_spi: Avoid packet drop during initial sync (bnc#1012382).
- net: qca_spi: Fix log level if probe fails (bnc#1012382).
- net: qca_spi: Make sure the QCA7000 reset is triggered (bnc#1012382).
- net: socket: fix potential spectre v1 gadget in socketcall (bnc#1012382).
- net: usb: rtl8150: demote allmulti message to dev_dbg() (bnc#1012382).
- net: vmxnet3: use new api ethtool_{get|set}_link_ksettings (bsc#1091860 bsc#1098253).
- net_sched: Fix missing res info when create new tc_index filter (bnc#1012382).
- net_sched: fix NULL pointer dereference when delete tcindex filter (bnc#1012382).
- netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state (bnc#1012382).
- netfilter: ipset: List timing out entries with 'timeout 1' instead of zero (bnc#1012382).
- netfilter: ipv6: nf_defrag: reduce struct net memory waste (bnc#1012382).
- netfilter: ipvs: do not create conn for ABORT packet in sctp_conn_schedule (bsc#1102797).
- netfilter: ipvs: fix the issue that sctp_conn_schedule drops non-INIT packet (bsc#1102797).
- netfilter: x_tables: set module owner for icmp(6) matches (bnc#1012382).
- netlink: Do not shift on 64 for ngroups (bnc#1012382).
- netlink: Do not shift with UB on nlk->ngroups (bnc#1012382).
- netlink: Do not subscribe to non-existent groups (bnc#1012382).
- netlink: Fix spectre v1 gadget in netlink_create() (bnc#1012382).
- netlink: do not enter direct reclaim from netlink_trim() (bsc#1042286).
- nfsd: fix potential use-after-free in nfsd4_decode_getdeviceinfo (bnc#1012382).
- nl80211: Add a missing break in parse_station_flags (bnc#1012382).
- nohz: Fix local_timer_softirq_pending() (bnc#1012382).
- nvme-fc: release io queues to allow fast fail (bsc#1102486).
- nvme: if_ready checks to fail io to deleting controller (bsc#1102486).
- nvme: kABI-compliant version of nvmf_fail_nonready_command() (bsc#1102486).
- nvmet-fc: fix target sgl list on large transfers (bsc#1102486).
- osf_getdomainname(): use copy_to_user() (bnc#1012382).
- ovl: Do d_type check only if work dir creation was successful (bnc#1012382).
- ovl: Ensure upper filesystem supports d_type (bnc#1012382).
- ovl: warn instead of error if d_type is not supported (bnc#1012382).
- packet: refine ring v3 block size test to hold one frame (bnc#1012382).
- packet: reset network header if packet shorter than ll reserved space (bnc#1012382).
- parisc: Define mb() and add memory barriers to assembler unlock sequences (bnc#1012382).
- parisc: Enable CONFIG_MLONGCALLS by default (bnc#1012382).
- parisc: Remove ordered stores from syscall.S (bnc#1012382).
- parisc: Remove unnecessary barriers from spinlock.h (bnc#1012382).
- perf auxtrace: Fix queue resize (bnc#1012382).
- perf llvm-utils: Remove bashism from kernel include fetch script (bnc#1012382).
- perf report powerpc: Fix crash if callchain is empty (bnc#1012382).
- perf test session topology: Fix test on s390 (bnc#1012382).
- perf/x86/intel/uncore: Correct fixed counter index check for NHM (bnc#1012382).
- perf/x86/intel/uncore: Correct fixed counter index check in generic code (bnc#1012382).
- perf: fix invalid bit in diagnostic entry (bnc#1012382).
- pinctrl: at91-pio4: add missing of_node_put (bnc#1012382).
- pinctrl: freescale: off by one in imx1_pinconf_group_dbg_show() (bnc#1012382).
- pnfs/blocklayout: off by one in bl_map_stripe() (bnc#1012382).
- powerpc/32: Add a missing include header (bnc#1012382).
- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032).
- powerpc/64s: Fix compiler store ordering to SLB shadow area (bnc#1012382).
- powerpc/8xx: fix invalid register expression in head_8xx.S (bnc#1012382).
- powerpc/chrp/time: Make some functions static, add missing header include (bnc#1012382).
- powerpc/embedded6xx/hlwd-pic: Prevent interrupts from being handled by Starlet (bnc#1012382).
- powerpc/fadump: handle crash memory ranges array index overflow (bsc#1103269).
- powerpc/fadump: merge adjacent memory ranges to reduce PT_LOAD segements (bsc#1103269).
- powerpc/lib: Fix the feature fixup tests to actually work (bsc#1066223).
- powerpc/powermac: Add missing prototype for note_bootable_part() (bnc#1012382).
- powerpc/powermac: Mark variable x as unused (bnc#1012382).
- powerpc/pseries: Fix endianness while restoring of r3 in MCE handler (bnc#1012382).
- powerpc/topology: Get topology for shared processors at boot (bsc#1104683).
- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157).
- powerpc: Avoid code patching freed init sections (bnc#1107735).
- powerpc: make feature-fixup tests fortify-safe (bsc#1066223).
- provide special timeout module parameters for EC2 (bsc#1065364).
- ptp: fix missing break in switch (bnc#1012382).
- pwm: tiehrpwm: Fix disabling of output of PWMs (bnc#1012382).
- qed: Add sanity check for SIMD fastpath handler (bnc#1012382).
- qed: Correct Multicast API to reflect existence of 256 approximate buckets (bsc#1019695 bsc#1019699 bsc#1022604).
- qed: Do not advertise DCBX_LLD_MANAGED capability (bsc#1019695 bsc#1019699 bsc#1022604).
- qed: Fix possible memory leak in Rx error path handling (bsc#1019695 bsc#1019699 bsc#1022604 ).
- qed: Fix possible race for the link state value (bnc#1012382).
- qed: Fix setting of incorrect eswitch mode (bsc#1019695 bsc#1019699 bsc#1022604).
- qed: Fix use of incorrect size in memcpy call (bsc#1019695 bsc#1019699 bsc#1022604).
- qede: Adverstise software timestamp caps when PHC is not available (bsc#1019695 bsc#1019699 bsc#1022604).
- qlge: Fix netdev features configuration (bsc#1098822).
- qlogic: check kstrtoul() for errors (bnc#1012382).
- random: mix rdrand with entropy sent in from userspace (bnc#1012382).
- readahead: stricter check for bdi io_pages (VM Functionality).
- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bnc#1012382).
- reiserfs: fix broken xattr handling (heap corruption, bad retval) (bnc#1012382).
- ring_buffer: tracing: Inherit the tracing setting to next ring buffer (bnc#1012382).
- root dentries need RCU-delayed freeing (bnc#1012382).
- rsi: Fix 'invalid vdd' warning in mmc (bnc#1012382).
- rtc: ensure rtc_set_alarm fails when alarms are not supported (bnc#1012382).
- rtnetlink: add rtnl_link_state check in rtnl_configure_link (bnc#1012382).
- s390/cpum_sf: Add data entry sizes to sampling trailer entry (bnc#1012382).
- s390/kvm: fix deadlock when killed by oom (bnc#1012382).
- s390/lib: use expoline for all bcr instructions (bnc#1106934, LTC#171029).
- s390/pci: fix out of bounds access during irq setup (bnc#1012382).
- s390/qdio: reset old sbal_state flags (bnc#1012382).
- s390/qeth: do not clobber buffer on async TX completion (bnc#1104485, LTC#170349).
- s390/qeth: fix race when setting MAC address (bnc#1104485, LTC#170726).
- s390: add explicit <linux/stringify.h> for jump label (bsc#1105271).
- s390: detect etoken facility (bnc#1106934, LTC#171029).
- s390: fix br_r1_trampoline for machines without exrl (bnc#1012382 bnc#1106934 LTC#171029).
- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).
- scsi: 3w-9xxx: fix a missing-check bug (bnc#1012382).
- scsi: 3w-xxxx: fix a missing-check bug (bnc#1012382).
- scsi: core: Avoid that SCSI device removal through sysfs triggers a deadlock (bnc#1012382).
- scsi: fcoe: drop frames in ELS LOGO error path (bnc#1012382).
- scsi: hpsa: limit transfer length to 1MB, not 512kB (bsc#1102346).
- scsi: libiscsi: fix possible NULL pointer dereference in case of TMF (bnc#1012382).
- scsi: megaraid: silence a static checker bug (bnc#1012382).
- scsi: megaraid_sas: Increase timeout by 1 sec for non-RAID fastpath IOs (bnc#1012382).
- scsi: qla2xxx: Fix ISP recovery on unload (bnc#1012382).
- scsi: qla2xxx: Return error when TMF returns (bnc#1012382).
- scsi: scsi_dh: replace too broad 'TP9' string with the exact models (bnc#1012382).
- scsi: sr: Avoid that opening a CD-ROM hangs with runtime power management enabled (bnc#1012382).
- scsi: sysfs: Introduce sysfs_{un,}break_active_protection() (bnc#1012382).
- scsi: ufs: fix exception event handling (bnc#1012382).
- scsi: vmw_pvscsi: Return DID_RESET for status SAM_STAT_COMMAND_TERMINATED (bnc#1012382).
- scsi: xen-scsifront: add error handling for xenbus_printf (bnc#1012382).
- scsi_debug: call resp_XXX function after setting host_scribble (bsc#1069138).
- scsi_debug: reset injection flags for every_nth > 0 (bsc#1069138).
- selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC (bnc#1012382).
- selftest/seccomp: Fix the seccomp(2) signature (bnc#1012382).
- selftests/ftrace: Add snapshot and tracing_on test case (bnc#1012382).
- selftests/x86/sigreturn/64: Fix spurious failures on AMD CPUs (bnc#1012382).
- selftests: pstore: return Kselftest Skip code for skipped tests (bnc#1012382).
- selftests: static_keys: return Kselftest Skip code for skipped tests (bnc#1012382).
- selftests: sync: add config fragment for testing sync framework (bnc#1012382).
- selftests: user: return Kselftest Skip code for skipped tests (bnc#1012382).
- selftests: zram: return Kselftest Skip code for skipped tests (bnc#1012382).
- serial: 8250_dw: always set baud rate in dw8250_set_termios (bnc#1012382).
- sfc: stop the TX queue before pushing new buffers (bsc#1017967 ).
- skbuff: Unconditionally copy pfmemalloc in __skb_clone() (bnc#1012382).
- slab: __GFP_ZERO is incompatible with a constructor (bnc#1107060).
- smb3: Do not send SMB3 SET_INFO if nothing changed (bnc#1012382).
- smb3: do not request leases in symlink creation and query (bnc#1012382).
- spi: davinci: fix a NULL pointer dereference (bnc#1012382).
- squashfs: be more careful about metadata corruption (bnc#1012382).
- squashfs: more metadata hardening (bnc#1012382).
- squashfs: more metadata hardenings (bnc#1012382).
- staging: android: ion: check for kref overflow (bnc#1012382).
- string: drop __must_check from strscpy() and restore strscpy() usages in cgroup (bsc#1107319).
- sys: do not hold uts_sem while accessing userspace memory (bnc#1106995).
- target_core_rbd: use RCU in free_device (bsc#1105524).
- tcp: Fix missing range_truesize enlargement in the backport (bnc#1012382).
- tcp: add max_quickacks param to tcp_incr_quickack and tcp_enter_quickack_mode (bnc#1012382).
- tcp: add one more quick ack after after ECN events (bnc#1012382).
- tcp: do not aggressively quick ack after ECN events (bnc#1012382).
- tcp: do not cancel delay-AcK on DCTCP special ACK (bnc#1012382).
- tcp: do not delay ACK in DCTCP upon CE status change (bnc#1012382).
- tcp: do not force quickack when receiving out-of-order packets (bnc#1012382).
- tcp: fix dctcp delayed ACK schedule (bnc#1012382).
- tcp: helpers to send special DCTCP ack (bnc#1012382).
- tcp: identify cryptic messages as TCP seq # bugs (bnc#1012382).
- tcp: refactor tcp_ecn_check_ce to remove sk type cast (bnc#1012382).
- tcp: remove DELAYED ACK events in DCTCP (bnc#1012382).
- tg3: Add higher cpu clock for 5762 (bnc#1012382).
- thermal: exynos: fix setting rising_threshold for Exynos5433 (bnc#1012382).
- timekeeping: Eliminate the stale declaration of ktime_get_raw_and_real_ts64() (bsc#969470).
- tools/power turbostat: Read extended processor family from CPUID (bnc#1012382).
- tools/power turbostat: fix -S on UP systems (bnc#1012382).
- tools: usb: ffs-test: Fix build on big endian systems (bnc#1012382).
- tpm: fix race condition in tpm_common_write() (bnc#1012382).
- tracing/blktrace: Fix to allow setting same value (bnc#1012382).
- tracing/kprobes: Fix trace_probe flags on enable_trace_kprobe() failure (bnc#1012382).
- tracing: Do not call start/stop() functions when tracing_on does not change (bnc#1012382).
- tracing: Fix double free of event_trigger_data (bnc#1012382).
- tracing: Fix possible double free in event_enable_trigger_func() (bnc#1012382).
- tracing: Quiet gcc warning about maybe unused link variable (bnc#1012382).
- tracing: Use __printf markup to silence compiler (bnc#1012382).
- tty: Fix data race in tty_insert_flip_string_fixed_flag (bnc#1012382).
- turn off -Wattribute-alias (bnc#1012382).
- ubi: Be more paranoid while seaching for the most recent Fastmap (bnc#1012382).
- ubi: Fix Fastmap's update_vol() (bnc#1012382).
- ubi: Fix races around ubi_refill_pools() (bnc#1012382).
- ubi: Introduce vol_ignored() (bnc#1012382).
- ubi: Rework Fastmap attach base code (bnc#1012382).
- ubi: fastmap: Erase outdated anchor PEBs during attach (bnc#1012382).
- ubifs: Check data node size before truncate (bsc#1106276).
- ubifs: Fix memory leak in lprobs self-check (bsc#1106278).
- ubifs: Fix synced_i_size calculation for xattr inodes (bsc#1106275).
- ubifs: xattr: Do not operate on deleted inodes (bsc#1106271).
- udl-kms: change down_interruptible to down (bnc#1012382).
- udl-kms: fix crash due to uninitialized memory (bnc#1012382).
- udl-kms: handle allocation failure (bnc#1012382).
- udlfb: set optimal write delay (bnc#1012382).
- uprobes: Use synchronize_rcu() not synchronize_sched() (bnc#1012382).
- usb/phy: fix PPC64 build errors in phy-fsl-usb.c (bnc#1012382).
- usb: audio-v2: Correct the comment for struct uac_clock_selector_descriptor (bsc#1099810).
- usb: cdc_acm: Add quirk for Castles VEGA3000 (bnc#1012382).
- usb: dwc2: debugfs: Do not touch RX FIFO during register dump (bsc#1100132).
- usb: dwc2: fix isoc split in transfer with no data (bnc#1012382).
- usb: gadget: composite: fix delayed_status race condition when set_interface (bnc#1012382).
- usb: gadget: dwc2: fix memory leak in gadget_init() (bnc#1012382).
- usb: gadget: f_fs: Only return delayed status when len is 0 (bnc#1012382).
- usb: gadget: f_uac2: fix endianness of 'struct cntrl_*_lay3' (bnc#1012382).
- usb: gadget: r8a66597: Fix a possible sleep-in-atomic-context bugs in r8a66597_queue() (bnc#1012382).
- usb: gadget: r8a66597: Fix two possible sleep-in-atomic-context bugs in init_controller() (bnc#1012382).
- usb: hub: Do not wait for connect state at resume for powered-off ports (bnc#1012382).
- usb: renesas_usbhs: gadget: fix spin_lock_init() for &uep->lock (bsc#1085536).
- usb: xhci: increase CRS timeout value (bnc#1012382).
- usbip: usbip_detach: Fix memory, udev context and udev leak (bnc#1012382).
- userns: move user access out of the mutex (bnc#1012382).
- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).
- virtio_balloon: fix another race between migration and ballooning (bnc#1012382).
- virtio_console: fix uninitialized variable use.
- vmw_balloon: VMCI_DOORBELL_SET does not check status (bnc#1012382).
- vmw_balloon: do not use 2MB without batching (bnc#1012382).
- vmw_balloon: fix VMCI use when balloon built into kernel (bnc#1012382).
- vmw_balloon: fix inflation of 64-bit GFNs (bnc#1012382).
- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1091860 bsc#1098253).
- vmxnet3: add receive data ring support (bsc#1091860 bsc#1098253).
- vmxnet3: add support for get_coalesce, set_coalesce ethtool operations (bsc#1091860 bsc#1098253).
- vmxnet3: allow variable length transmit data ring buffer (bsc#1091860 bsc#1098253).
- vmxnet3: avoid assumption about invalid dma_pa in vmxnet3_set_mc() (bsc#1091860 bsc#1098253).
- vmxnet3: avoid format strint overflow warning (bsc#1091860 bsc#1098253).
- vmxnet3: avoid xmit reset due to a race in vmxnet3 (bsc#1091860 bsc#1098253).
- vmxnet3: fix incorrect dereference when rxvlan is disabled (bsc#1091860 bsc#1098253).
- vmxnet3: fix non static symbol warning (bsc#1091860 bsc#1098253).
- vmxnet3: fix tx data ring copy for variable size (bsc#1091860 bsc#1098253).
- vmxnet3: increase default rx ring sizes (bsc#1091860 bsc#1098253).
- vmxnet3: introduce command to register memory region (bsc#1091860 bsc#1098253).
- vmxnet3: introduce generalized command interface to configure the device (bsc#1091860 bsc#1098253).
- vmxnet3: prepare for version 3 changes (bsc#1091860 bsc#1098253).
- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1091860 bsc#1098253).
- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1091860 bsc#1098253).
- vmxnet3: set the DMA mask before the first DMA map operation (bsc#1091860 bsc#1098253).
- vmxnet3: update to version 3 (bsc#1091860 bsc#1098253).
- vmxnet3: use DMA memory barriers where required (bsc#1091860 bsc#1098253).
- vmxnet3: use correct flag to indicate LRO feature (bsc#1091860 bsc#1098253).
- vsock: split dwork to avoid reinitializations (bnc#1012382).
- vti6: Fix dev->max_mtu setting (bsc#1033962).
- vti6: fix PMTU caching and reporting on xmit (bnc#1012382).
- wlcore: sdio: check for valid platform device data before suspend (bnc#1012382).
- x86/MCE: Remove min interval polling limitation (bnc#1012382).
- x86/amd: do not set X86_BUG_SYSRET_SS_ATTRS when running under Xen (bnc#1012382).
- x86/asm/entry/32: Simplify pushes of zeroed pt_regs->REGs (bnc#1012382).
- x86/bugs: Move the l1tf function and define pr_fmt properly (bnc#1012382).
- x86/bugs: Respect nospec command line option (bsc#1068032).
- x86/cpu/AMD: Fix erratum 1076 (CPB bit) (bnc#1012382).
- x86/cpu: Make alternative_msr_write work for 32-bit code (bnc#1012382).
- x86/cpu: Re-apply forced caps every time CPU caps are re-read (bnc#1012382).
- x86/cpufeature: preserve numbers (kabi).
- x86/cpufeatures: Add CPUID_7_EDX CPUID leaf (bnc#1012382).
- x86/cpufeatures: Clean up Spectre v2 related CPUID flags (bnc#1012382).
- x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface (bnc#1012382).
- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).
- x86/init: fix build with CONFIG_SWAP=n (bnc#1012382).
- x86/irqflags: Mark native_restore_fl extern inline (bnc#1012382).
- x86/irqflags: Provide a declaration for native_save_fl.
- x86/mm/kmmio: Make the tracer robust against L1TF (bnc#1012382).
- x86/mm/pat: Fix L1TF stable backport for CPA (bnc#1012382).
- x86/mm/pat: Fix L1TF stable backport for CPA, 2nd call (bnc#1012382).
- x86/mm/pat: Make set_memory_np() L1TF safe (bnc#1012382).
- x86/mm: Add TLB purge to free pmd/pte page interfaces (bnc#1012382).
- x86/mm: Disable ioremap free page handling on x86-PAE (bnc#1012382).
- x86/mm: Give each mm TLB flush generation a unique ID (bnc#1012382).
- x86/paravirt: Fix spectre-v2 mitigations for paravirt guests (bnc#1012382).
- x86/paravirt: Make native_save_fl() extern inline (bnc#1012382).
- x86/process: Correct and optimize TIF_BLOCKSTEP switch (bnc#1012382).
- x86/process: Optimize TIF checks in __switch_to_xtra() (bnc#1012382).
- x86/process: Optimize TIF_NOTSC switch (bnc#1012382).
- x86/process: Re-export start_thread() (bnc#1012382).
- x86/spectre: Add missing family 6 check to microcode check (bnc#1012382).
- x86/spectre_v2: Do not check microcode versions when running under hypervisors (bnc#1012382).
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion (bnc#1012382).
- x86/speculation/l1tf: Extend 64bit swap file size limit (bnc#1012382).
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1012382).
- x86/speculation/l1tf: Fix up CPU feature flags (bnc#1012382).
- x86/speculation/l1tf: Fix up pte->pfn conversion for PAE (bnc#1012382).
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- x86/speculation/l1tf: Invert all not present mappings (bnc#1012382).
- x86/speculation/l1tf: Make pmd/pud_mknotpresent() invert (bnc#1012382).
- x86/speculation/l1tf: Protect PAE swap entries against L1TF (bnc#1012382).
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).
- x86/speculation/l1tf: Unbreak !__HAVE_ARCH_PFN_MODIFY_ALLOWED architectures (bnc#1012382).
- x86/speculation: Add <asm/msr-index.h> dependency (bnc#1012382).
- x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support (bnc#1012382).
- x86/speculation: Clean up various Spectre related details (bnc#1012382).
- x86/speculation: Correct Speculation Control microcode blacklist again (bnc#1012382).
- x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP (bnc#1012382).
- x86/speculation: Update Speculation Control microcode blacklist (bnc#1012382).
- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).
- x86/speculation: Use IBRS if available before calling into firmware (bnc#1012382).
- x86/speculation: Use Indirect Branch Prediction Barrier in context switch (bnc#1012382).
- x86/xen: Add call of speculative_store_bypass_ht_init() to PV paths (bnc#1012382).
- xen-netfront: wait xenbus state change when load module manually (bnc#1012382).
- xen/blkback: do not keep persistent grants too long (bsc#1085042).
- xen/blkback: move persistent grants flags to bool (bsc#1085042).
- xen/blkfront: cleanup stale persistent grants (bsc#1085042).
- xen/blkfront: reorder tests in xlblk_init() (bsc#1085042).
- xen/netfront: do not cache skb_shinfo() (bnc#1012382).
- xen: avoid crash in disable_hotplug_cpu (bsc#1106594).
- xen: set cpu capabilities from xen_start_kernel() (bnc#1012382).
- xfrm: fix missing dst_release() after policy blocking lbcast and multicast (bnc#1012382).
- xfrm: free skb if nlsk pointer is NULL (bnc#1012382).
- xfrm_user: prevent leaking 2 bytes of kernel memory (bnc#1012382).
- xfs: Remove dead code from inode recover function (bsc#1105396).
- xfs: repair malformed inode items during log recovery (bsc#1105396).
- xhci: Fix perceived dead host due to runtime suspend race with event handler (bnc#1012382).
- zswap: re-check zswap_is_full() after do zswap_shrink() (bnc#1012382).
Patchnames
SUSE-SLE-SDK-12-SP3-2018-2004,SUSE-SLE-SERVER-12-SP3-2018-2004
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 12 SP3 azure kernel was updated to 4.4.155 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-13093: Prevent NULL pointer dereference and panic in lookup_slow()\n on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image.\n This occured because of a lack of proper validation that cached inodes are free\n during allocation (bnc#1100001)\n- CVE-2018-13095: Prevent denial of service (memory corruption and BUG) that\n could have occurred for a corrupted xfs image upon encountering an inode that\n is in extent format, but has more extents than fit in the inode fork\n (bnc#1099999)\n- CVE-2018-13094: Prevent OOPS that may have occured for a corrupted xfs image\n after xfs_da_shrink_inode() is called with a NULL bp (bnc#1100000)\n- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was\n caused by the way the overrun accounting works. Depending on interval and\n expiry time values, the overrun can be larger than INT_MAX, but the accounting\n is int based. This basically made the accounting values, which are visible to\n user space via timer_getoverrun(2) and siginfo::si_overrun, random. This\n allowed a local user to cause a denial of service (signed integer overflow) via\n crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922)\n- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that\n could have been used by local attackers to read kernel memory (bnc#1107689)\n- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local\n attackers to use a incorrect bounds check in the CDROM driver\n CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)\n- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a\n denial of service (ias_object use-after-free and system crash) or possibly have\n unspecified other impact via an AF_IRDA socket (bnc#1106511)\n- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed\n local users to cause a denial of service (memory consumption) by repeatedly\n binding an AF_IRDA socket (bnc#1106509)\n- CVE-2018-1129: A flaw was found in the way signature calculation was handled\n by cephx authentication protocol. An attacker having access to ceph cluster\n network who is able to alter the message payload was able to bypass signature\n checks done by cephx protocol (bnc#1096748)\n- CVE-2018-1128: It was found that cephx authentication protocol did not verify\n ceph clients correctly and was vulnerable to replay attack. Any attacker having\n access to ceph cluster network who is able to sniff packets on network can use\n this vulnerability to authenticate with ceph service and perform actions\n allowed by ceph service (bnc#1096748)\n- CVE-2018-10938: A crafted network packet sent remotely by an attacker forced\n the kernel to enter an infinite loop in the cipso_v4_optptr() function leading\n to a denial-of-service (bnc#1106016)\n- CVE-2018-15572: The spectre_v2_select_mitigation function did not always fill\n RSB upon a context switch, which made it easier for attackers to conduct\n userspace-userspace spectreRSB attacks (bnc#1102517)\n- CVE-2018-10902: Protect against concurrent access to prevent double realloc\n (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A\n malicious local attacker could have used this for privilege escalation\n (bnc#1105322).\n- CVE-2018-9363: Prevent buffer overflow in hidp_process_report (bsc#1105292)\n- CVE-2018-10883: A local user could have caused an out-of-bounds write in\n jbd2_journal_dirty_metadata(), a denial of service, and a system crash by\n mounting and operating on a crafted ext4 filesystem image (bsc#1099863)\n- CVE-2018-10879: A local user could have caused a use-after-free in\n ext4_xattr_set_entry function and a denial of service or unspecified other\n impact by renaming a file in a crafted ext4 filesystem image (bsc#1099844)\n- CVE-2018-10878: A local user could have caused an out-of-bounds write and a\n denial of service or unspecified other impact by mounting and operating a\n crafted ext4 filesystem image (bsc#1099813)\n- CVE-2018-10876: A use-after-free was possible in ext4_ext_remove_space()\n function when mounting and operating a crafted ext4 image (bsc#1099811)\n- CVE-2018-10877: Prevent out-of-bound access in the ext4_ext_drop_refs()\n function when operating on a crafted ext4 filesystem image (bsc#1099846)\n- CVE-2018-10881: A local user could have caused an out-of-bound access in\n ext4_get_group_info function, a denial of service, and a system crash by\n mounting and operating on a crafted ext4 filesystem image (bsc#1099864)\n- CVE-2018-10882: A local user could have caused an out-of-bound write, a\n denial of service, and a system crash by unmounting a crafted ext4 filesystem\n image (bsc#1099849)\n- CVE-2018-10880: Prevent stack-out-of-bounds write in the ext4 filesystem code\n when mounting and writing to a crafted ext4 image in ext4_update_inline_data().\n An attacker could have used this to cause a system crash and a denial of\n service (bsc#1099845)\n\nThe following non-security bugs were fixed:\n\n- 9p/net: Fix zero-copy path in the 9p virtio transport (bnc#1012382).\n- 9p/virtio: fix off-by-one error in sg list bounds check (bnc#1012382).\n- 9p: fix multiple NULL-pointer-dereferences (bnc#1012382).\n- ACPI / LPSS: Add missing prv_offset setting for byt/cht PWM devices (bnc#1012382).\n- ACPI / PCI: Bail early in acpi_pci_add_bus() if there is no ACPI handle (bnc#1012382).\n- ACPI / PM: save NVS memory for ASUS 1025C laptop (bnc#1012382).\n- ACPI: save NVS memory for Lenovo G50-45 (bnc#1012382).\n- ALSA: cs5535audio: Fix invalid endian conversion (bnc#1012382).\n- ALSA: emu10k1: Rate-limit error messages about page errors (bnc#1012382).\n- ALSA: emu10k1: add error handling for snd_ctl_add (bnc#1012382).\n- ALSA: fm801: add error handling for snd_ctl_add (bnc#1012382).\n- ALSA: hda - Sleep for 10ms after entering D3 on Conexant codecs (bnc#1012382).\n- ALSA: hda - Turn CX8200 into D3 as well upon reboot (bnc#1012382).\n- ALSA: hda/ca0132: fix build failure when a local macro is defined (bnc#1012382).\n- ALSA: hda: Correct Asrock B85M-ITX power_save blacklist entry (bnc#1012382).\n- ALSA: memalloc: Do not exceed over the requested size (bnc#1012382).\n- ALSA: rawmidi: Change resized buffers atomically (bnc#1012382).\n- ALSA: snd-aoa: add of_node_put() in error path (bsc#1099810).\n- ALSA: usb-audio: Apply rate limit to warning messages in URB complete callback (bnc#1012382).\n- ALSA: virmidi: Fix too long output trigger loop (bnc#1012382).\n- ALSA: vx222: Fix invalid endian conversions (bnc#1012382).\n- ALSA: vxpocket: Fix invalid endian conversions (bnc#1012382).\n- ARC: Enable machine_desc->init_per_cpu for !CONFIG_SMP (bnc#1012382).\n- ARC: Explicitly add -mmedium-calls to CFLAGS (bnc#1012382).\n- ARC: Fix CONFIG_SWAP (bnc#1012382).\n- ARC: mm: allow mprotect to make stack mappings executable (bnc#1012382).\n- ARM: 8780/1: ftrace: Only set kernel memory back to read-only after boot (bnc#1012382).\n- ARM: dts: Cygnus: Fix I2C controller interrupt type (bnc#1012382).\n- ARM: dts: am3517.dtsi: Disable reference to OMAP3 OTG controller (bnc#1012382).\n- ARM: dts: am437x: make edt-ft5x06 a wakeup source (bnc#1012382).\n- ARM: dts: da850: Fix interrups property for gpio (bnc#1012382).\n- ARM: dts: imx6sx: fix irq for pcie bridge (bnc#1012382).\n- ARM: fix put_user() for gcc-8 (bnc#1012382).\n- ARM: imx_v4_v5_defconfig: Select ULPI support (bnc#1012382).\n- ARM: imx_v6_v7_defconfig: Select ULPI support (bnc#1012382).\n- ARM: pxa: irq: fix handling of ICMR registers in suspend/resume (bnc#1012382).\n- ARM: tegra: Fix Tegra30 Cardhu PCA954x reset (bnc#1012382).\n- ASoC: Intel: cht_bsw_max98090: remove useless code, align with ChromeOS driver.\n- ASoC: Intel: cht_bsw_max98090_ti: Fix jack initialization (bnc#1012382).\n- ASoC: dpcm: do not merge format from invalid codec dai (bnc#1012382).\n- ASoC: dpcm: fix BE dai not hw_free and shutdown (bnc#1012382).\n- ASoC: pxa: Fix module autoload for platform drivers (bnc#1012382).\n- ASoC: sirf: Fix potential NULL pointer dereference (bnc#1012382).\n- Add reference to bsc#1091171 (bnc#1012382; bsc#1091171).\n- Bluetooth: avoid killing an already killed socket (bnc#1012382).\n- Bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bnc#1012382).\n- Bluetooth: btusb: Remove Yoga 920 from the btusb_needs_reset_resume_table (bsc#1087092).\n- Bluetooth: btusb: Use DMI matching for QCA reset_resume quirking (bsc#1087092).\n- Bluetooth: hci_qca: Fix 'Sleep inside atomic section' warning (bnc#1012382).\n- Documentation/spec_ctrl: Do some minor cleanups (bnc#1012382).\n- HID: hid-plantronics: Re-resend Update to map button for PTT products (bnc#1012382).\n- HID: i2c-hid: check if device is there before really probing (bnc#1012382).\n- HID: wacom: Correct touch maximum XY of 2nd-gen Intuos (bnc#1012382).\n- IB/core: Make testing MR flags for writability a static inline function (bnc#1012382).\n- IB/core: Remove duplicate declaration of gid_cache_wq (bsc#1056596).\n- IB/iser: Do not reduce max_sectors (bsc#1063646).\n- IB/mlx4: Fix an error handling path in 'mlx4_ib_rereg_user_mr()'.\n- IB/mlx4: Mark user MR as writable if actual virtual memory is writable (bnc#1012382).\n- IB/mlx5: Fetch soft WQE's on fatal error state (bsc#1015342 bsc#1015343).\n- IB/mlx5: Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1015342 bsc#1015343).\n- IB/ocrdma: fix out of bounds access to local buffer (bnc#1012382).\n- Input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bnc#1012382).\n- Input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bnc#1012382).\n- Input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bnc#1012382).\n- KVM/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel (bnc#1012382).\n- KVM: MMU: always terminate page walks at level 1 (bsc#1062604).\n- KVM: MMU: simplify last_pte_bitmap (bsc#1062604).\n- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).\n- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).\n- KVM: arm/arm64: Skip updating PMD entry if no change (bnc#1012382).\n- KVM: arm/arm64: Skip updating PTE entry if no change (bnc#1012382).\n- KVM: irqfd: fix race between EPOLLHUP and irq_bypass_register_consumer (bnc#1012382).\n- KVM: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).\n- MIPS: Correct the 64-bit DSP accumulator register size (bnc#1012382).\n- MIPS: Fix off-by-one in pci_resource_to_user() (bnc#1012382).\n- MIPS: ath79: fix register address in ath79_ddr_wb_flush() (bnc#1012382).\n- MIPS: lib: Provide MIPS64r6 __multi3() for GCC < 7 (bnc#1012382).\n- NET: stmmac: align DMA stuff to largest cache line length (bnc#1012382).\n- PCI: Prevent sysfs disable of device while driver is attached (bnc#1012382).\n- PCI: Skip MPS logic for Virtual Functions (VFs) (bnc#1012382).\n- PCI: hotplug: Do not leak pci_slot on registration failure (bnc#1012382).\n- PCI: pciehp: Fix use-after-free on unplug (bnc#1012382).\n- PCI: pciehp: Request control of native hotplug only if supported (bnc#1012382).\n- PM / sleep: wakeup: Fix build error caused by missing SRCU support (bnc#1012382).\n- RDMA/i40iw: Avoid panic when objects are being created and destroyed (bsc#969476 bsc#969477).\n- RDMA/i40iw: Avoid panic when reading back the IRQ affinity hint (bsc#969476 bsc#969477).\n- RDMA/i40iw: Avoid reference leaks when processing the AEQ (bsc#969476 bsc#969477).\n- RDMA/i40w: Hold read semaphore while looking after VMA (bsc#1024376).\n- RDMA/mad: Convert BUG_ONs to error flows (bnc#1012382).\n- RDMA/mlx5: Use proper spec flow label type (bsc#1015342 bsc#1015343).\n- Revert 'MIPS: BCM47XX: Enable 74K Core ExternalSync for PCIe erratum' (bnc#1012382).\n- Revert 'UBIFS: Fix potential integer overflow in allocation' (bnc#1012382).\n- Revert 'f2fs: handle dirty segments inside refresh_sit_entry' (bsc#1106281).\n- Revert 'mm: page_alloc: skip over regions of invalid pfns where possible' (bnc#1107078).\n- Revert 'net: Do not copy pfmemalloc flag in __copy_skb_header()' (kabi).\n- Revert 'netfilter: ipv6: nf_defrag: reduce struct net memory waste' (kabi).\n- Revert 'skbuff: Unconditionally copy pfmemalloc in __skb_clone()' (kabi).\n- Revert 'vsock: split dwork to avoid reinitializations' (kabi).\n- Revert 'x86/mm: Give each mm TLB flush generation a unique ID' (kabi).\n- Revert 'x86/speculation/l1tf: Fix up CPU feature flags' (kabi).\n- Revert 'x86/speculation: Use Indirect Branch Prediction Barrier in context switch' (kabi).\n- Smack: Mark inode instant in smack_task_to_inode (bnc#1012382).\n- USB: musb: fix external abort on suspend (bsc#1085536).\n- USB: option: add support for DW5821e (bnc#1012382).\n- USB: serial: metro-usb: stop I/O after failed open (bsc#1085539).\n- USB: serial: sierra: fix potential deadlock at close (bnc#1012382).\n- Workaround kABI breakage by __must_check drop of strscpy() (bsc#1107319).\n- afs: Fix directory permissions check (bsc#1106283).\n- arc: fix build errors in arc/include/asm/delay.h (bnc#1012382).\n- arc: fix type warnings in arc/mm/cache.c (bnc#1012382).\n- arm64: make secondary_start_kernel() notrace (bnc#1012382).\n- arm64: mm: check for upper PAGE_SHIFT bits in pfn_valid() (bnc#1012382).\n- ath: Add regulatory mapping for APL13_WORLD (bnc#1012382).\n- ath: Add regulatory mapping for APL2_FCCA (bnc#1012382).\n- ath: Add regulatory mapping for Bahamas (bnc#1012382).\n- ath: Add regulatory mapping for Bermuda (bnc#1012382).\n- ath: Add regulatory mapping for ETSI8_WORLD (bnc#1012382).\n- ath: Add regulatory mapping for FCC3_ETSIC (bnc#1012382).\n- ath: Add regulatory mapping for Serbia (bnc#1012382).\n- ath: Add regulatory mapping for Tanzania (bnc#1012382).\n- ath: Add regulatory mapping for Uganda (bnc#1012382).\n- atl1c: reserve min skb headroom (bnc#1012382).\n- atm: Preserve value of skb->truesize when accounting to vcc (bsc#1089066).\n- audit: allow not equal op for audit by executable (bnc#1012382).\n- backlight: as3711_bl: Fix Device Tree node leaks (bsc#1106929).\n- backlight: lm3630a: Bump REG_MAX value to 0x50 instead of 0x1F (bsc#1106929).\n- bcache: avoid unncessary cache prefetch bch_btree_node_get() (bsc#1064232).\n- bcache: calculate the number of incremental GC nodes according to the total of btree nodes (bsc#1064232).\n- bcache: display rate debug parameters to 0 when writeback is not running (bsc#1064232).\n- bcache: do not check return value of debugfs_create_dir() (bsc#1064232).\n- bcache: finish incremental GC (bsc#1064232).\n- bcache: fix I/O significant decline while backend devices registering (bsc#1064232).\n- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064232).\n- bcache: free heap cache_set->flush_btree in bch_journal_free (bsc#1064232).\n- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section (bsc#1064232).\n- bcache: release dc->writeback_lock properly in bch_writeback_thread() (bsc#1064232).\n- bcache: set max writeback rate when I/O request is idle (bsc#1064232).\n- bcache: simplify the calculation of the total amount of flash dirty data (bsc#1064232).\n- be2net: remove unused old custom busy-poll fields (bsc#1021121 ).\n- blkdev: __blkdev_direct_IO_simple: fix leak in error case (bsc#1083663).\n- block: bio_iov_iter_get_pages: fix size of last iovec (bsc#1083663).\n- block: bio_iov_iter_get_pages: pin more pages for multi-segment IOs (bsc#1083663).\n- block: do not use interruptible wait anywhere (bnc#1012382).\n- bnx2x: Fix invalid memory access in rss hash config path (bnc#1012382).\n- bnx2x: Fix receiving tx-timeout in error or recovery state (bnc#1012382).\n- bnxt_en: Always set output parameters in bnxt_get_max_rings() (bsc#963575).\n- bnxt_en: Fix for system hang if request_irq fails (bnc#1012382).\n- bnxt_en: Fix inconsistent BNXT_FLAG_AGG_RINGS logic (bsc#1020412 ).\n- bpf: fix references to free_bpf_prog_info() in comments (bnc#1012382).\n- brcmfmac: Add support for bcm43364 wireless chipset (bnc#1012382).\n- brcmfmac: stop watchdog before detach and free everything (bnc#1012382).\n- bridge: Propagate vlan add failure to user (bnc#1012382).\n- btrfs: Do not remove block group still has pinned down bytes (bsc#1086457).\n- btrfs: add barriers to btrfs_sync_log before log_commit_wait wakeups (bnc#1012382).\n- btrfs: do not leak ret from do_chunk_alloc (bnc#1012382).\n- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bnc#1012382).\n- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf.\n- btrfs: round down size diff when shrinking/growing device (bsc#1097105).\n- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bnc#1012382).\n- can: mpc5xxx_can: check of_iomap return before use (bnc#1012382).\n- can: xilinx_can: fix RX loop if RXNEMP is asserted without RXOK (bnc#1012382).\n- can: xilinx_can: fix RX overflow interrupt not being enabled (bnc#1012382).\n- can: xilinx_can: fix device dropping off bus on RX overrun (bnc#1012382).\n- can: xilinx_can: fix incorrect clear of non-processed interrupts (bnc#1012382).\n- can: xilinx_can: fix recovery from error states not being propagated (bnc#1012382).\n- can: xilinx_can: keep only 1-2 frames in TX FIFO to fix TX accounting (bnc#1012382).\n- cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status (bnc#1012382).\n- ceph: fix incorrect use of strncpy (bsc#1107319).\n- ceph: return errors from posix_acl_equiv_mode() correctly (bsc#1107320).\n- cifs: Fix stack out-of-bounds in smb{2,3}_create_lease_buf() (bsc#1012382).\n- cifs: add missing debug entries for kconfig options (bnc#1012382).\n- cifs: check kmalloc before use (bsc#1012382).\n- cifs: store the leaseKey in the fid on SMB2_open (bsc#1012382).\n- clk: tegra: Fix PLL_U post divider and initial rate on Tegra30 (bnc#1012382).\n- crypto: ablkcipher - fix crash flushing dcache in error path (bnc#1012382).\n- crypto: authenc - do not leak pointers to authenc keys (bnc#1012382).\n- crypto: authencesn - do not leak pointers to authenc keys (bnc#1012382).\n- crypto: blkcipher - fix crash flushing dcache in error path (bnc#1012382).\n- crypto: padlock-aes - Fix Nano workaround data corruption (bnc#1012382).\n- crypto: vmac - require a block cipher with 128-bit block size (bnc#1012382).\n- crypto: vmac - separate tfm and request context (bnc#1012382).\n- crypto: vmx - Fix sleep-in-atomic bugs (bsc#1048317).\n- cxgb4: when disabling dcb set txq dcb priority to 0 (bnc#1012382).\n- cxl: Fix wrong comparison in cxl_adapter_context_get() (bsc#1055014).\n- dccp: fix undefined behavior with 'cwnd' shift in ccid2_cwnd_restart() (bnc#1012382).\n- disable loading f2fs module on PAGE_SIZE > 4KB (bnc#1012382).\n- dm cache metadata: save in-core policy_hint_size to on-disk superblock (bnc#1012382).\n- dma-iommu: Fix compilation when !CONFIG_IOMMU_DMA (bnc#1012382).\n- dmaengine: k3dma: Off by one in k3_of_dma_simple_xlate() (bnc#1012382).\n- dmaengine: pxa_dma: remove duplicate const qualifier (bnc#1012382).\n- driver core: Partially revert 'driver core: correct device's shutdown order' (bnc#1012382).\n- drivers: net: lmc: fix case value for target abort error (bnc#1012382).\n- drm/armada: fix colorkey mode property (bnc#1012382).\n- drm/atmel-hlcdc: check stride values in the first plane (bsc#1106929).\n- drm/atomic: Handling the case when setting old crtc for plane (bnc#1012382).\n- drm/bridge: adv7511: Reset registers on hotplug (bnc#1012382).\n- drm/cirrus: Use drm_framebuffer_put to avoid kernel oops in clean-up (bsc#1101822).\n- drm/drivers: add support for using the arch wc mapping API.\n- drm/exynos/dsi: mask frame-done interrupt (bsc#1106929).\n- drm/exynos: decon5433: Fix WINCONx reset value (bnc#1012382).\n- drm/exynos: decon5433: Fix per-plane global alpha for XRGB modes (bnc#1012382).\n- drm/exynos: gsc: Fix support for NV16/61, YUV420/YVU420 and YUV422 modes (bnc#1012382).\n- drm/gma500: fix psb_intel_lvds_mode_valid()'s return type (bnc#1012382).\n- drm/i915/userptr: reject zero user_size (bsc#1090888).\n- drm/i915: Correctly handle limited range YCbCr data on VLV/CHV (bsc#1087092).\n- drm/imx: fix typo in ipu_plane_formats (bsc#1106929).\n- drm/imx: imx-ldb: check if channel is enabled before printing warning (bnc#1012382).\n- drm/imx: imx-ldb: disable LDB on driver bind (bnc#1012382).\n- drm/msm/hdmi: Use bitwise operators when building register values (bsc#1106929).\n- drm/nouveau/gem: off by one bugs in nouveau_gem_pushbuf_reloc_apply() (bnc#1012382).\n- drm/panel: type promotion bug in s6e8aa0_read_mtp_id() (bsc#1105769).\n- drm/radeon: fix mode_valid's return type (bnc#1012382).\n- drm: Add DP PSR2 sink enable bit (bnc#1012382).\n- drm: Reject getfb for multi-plane framebuffers (bsc#1106929).\n- enic: do not call enic_change_mtu in enic_probe.\n- enic: handle mtu change for vf properly (bnc#1012382).\n- enic: initialize enic->rfs_h.lock in enic_probe (bnc#1012382).\n- ext4: check for NUL characters in extended attribute's name (bnc#1012382).\n- ext4: check for allocation block validity with block group locked (bsc#1104495).\n- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).\n- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).\n- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).\n- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).\n- ext4: fix inline data updates with checksums enabled (bsc#1104494).\n- ext4: fix spectre gadget in ext4_mb_regular_allocator() (bnc#1012382).\n- ext4: reset error code in ext4_find_entry in fallback (bnc#1012382).\n- ext4: sysfs: print ext4_super_block fields as little-endian (bsc#1106229).\n- f2fs: fix to do not trigger writeback during recovery (bnc#1012382).\n- fat: fix memory allocation failure handling of match_strdup() (bnc#1012382).\n- fb: fix lost console when the user unplugs a USB adapter (bnc#1012382).\n- fbdev: omapfb: off by one in omapfb_register_client() (bsc#1106929).\n- fix __legitimize_mnt()/mntput() race (bnc#1012382).\n- fix mntput/mntput race (bnc#1012382).\n- fork: unconditionally clear stack on fork (bnc#1012382).\n- fs/9p/xattr.c: catch the error of p9_client_clunk when setting xattr failed (bnc#1012382).\n- fs/dax.c: fix inefficiency in dax_writeback_mapping_range() (bsc#1106185).\n- fs/quota: Fix spectre gadget in do_quotactl (bnc#1012382).\n- fs: aio: fix the increment of aio-nr and counting against aio-max-nr (bsc#1068075, bsc#1078921).\n- fuse: Add missed unlock_page() to fuse_readpages_fill() (bnc#1012382).\n- fuse: Do not access pipe->buffers without pipe_lock() (bnc#1012382).\n- fuse: Fix oops at process_init_reply() (bnc#1012382).\n- fuse: fix double request_end() (bnc#1012382).\n- fuse: fix unlocked access to processing queue (bnc#1012382).\n- fuse: umount should wait for all requests (bnc#1012382).\n- genirq/proc: Return proper error code when irq_set_affinity() fails (bnc#1105392).\n- getxattr: use correct xattr length (bnc#1012382).\n- hfsplus: Do not clear SGID when inheriting ACLs (bsc#1030552).\n- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bnc#1012382).\n- hwrng: exynos - Disable runtime PM on driver unbind.\n- i2c: davinci: Avoid zero value of CLKH (bnc#1012382).\n- i2c: imx: Fix race condition in dma read (bnc#1012382).\n- i2c: imx: Fix reinit_completion() use (bnc#1012382).\n- i2c: ismt: fix wrong device address when unmap the data buffer (bnc#1012382).\n- i40e: use cpumask_copy instead of direct assignment (bsc#1053685).\n- i40iw: Fix memory leak in error path of create QP (bsc#969476 bsc#969477).\n- i40iw: Use correct address in dst_neigh_lookup for IPv6 (bsc#969476 bsc#969477).\n- ibmvnic: Include missing return code checks in reset function (bnc#1107966).\n- ieee802154: at86rf230: switch from BUG_ON() to WARN_ON() on problem (bnc#1012382).\n- ieee802154: at86rf230: use __func__ macro for debug messages (bnc#1012382).\n- ieee802154: fakelb: switch from BUG_ON() to WARN_ON() on problem (bnc#1012382).\n- igb: Fix not adding filter elements to the list (bsc#1024361 bsc#1024365).\n- iio: ad9523: Fix displayed phase (bnc#1012382).\n- iio: ad9523: Fix return value for ad952x_store() (bnc#1012382).\n- inet: frag: enforce memory limits earlier (bnc#1012382 bsc#970506).\n- iommu/amd: make sure TLB to be flushed before IOVA freed (bsc#1106105).\n- iommu/vt-d: Add definitions for PFSID (bnc#1012382).\n- iommu/vt-d: Fix dev iotlb pfsid use (bnc#1012382).\n- iommu/vt-d: Ratelimit each dmar fault printing (bsc#1106105).\n- ioremap: Update pgtable free interfaces with addr (bnc#1012382).\n- ip: hash fragments consistently (bnc#1012382).\n- ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull (bnc#1012382).\n- ipconfig: Correctly initialise ic_nameservers (bnc#1012382).\n- ipv4+ipv6: Make INET*_ESP select CRYPTO_ECHAINIV (bnc#1012382).\n- ipv4: Return EINVAL when ping_group_range sysctl does not map to user ns (bnc#1012382).\n- ipv4: remove BUG_ON() from fib_compute_spec_dst (bnc#1012382).\n- ipv6: fix useless rol32 call on hash (bnc#1012382).\n- ipv6: mcast: fix unsolicited report interval after receiving querys (bnc#1012382).\n- ipvlan: use ETH_MAX_MTU as max mtu (bsc#1033962).\n- iscsi target: fix session creation failure handling (bnc#1012382).\n- isdn: Disable IIOCDBGVAR (bnc#1012382).\n- iw_cxgb4: remove duplicate memcpy() in c4iw_create_listen() (bsc#969476 bsc#969477).\n- iwlwifi: pcie: fix race in Rx buffer allocator (bnc#1012382).\n- ixgbe: Be more careful when modifying MAC filters (bnc#1012382).\n- jfs: Do not clear SGID when inheriting ACLs (bsc#1030552).\n- jump_label: Add RELEASE barrier after text changes (bsc#1105271).\n- jump_label: Fix concurrent static_key_enable/disable() (bsc#1105271).\n- jump_label: Move CPU hotplug locking (bsc#1105271).\n- jump_label: Provide hotplug context variants (bsc#1105271).\n- jump_label: Reduce the size of struct static_key (bsc#1105271).\n- jump_label: Reorder hotplug lock and jump_label_lock (bsc#1105271).\n- jump_label: Split out code under the hotplug lock (bsc#1105271).\n- jump_label: remove bug.h, atomic.h dependencies for HAVE_JUMP_LABEL (bsc#1105271).\n- kABI: protect enum tcp_ca_event (kabi).\n- kABI: reexport tcp_send_ack (kabi).\n- kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)\n- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).\n- kasan: do not emit builtin calls when sanitization is off (bnc#1012382).\n- kasan: fix shadow_size calculation error in kasan_module_alloc (bnc#1012382).\n- kbuild: verify that $DEPMOD is installed (bnc#1012382).\n- kernel: improve spectre mitigation (bnc#1106934, LTC#171029).\n- kprobes/x86: Fix %p uses in error messages (bnc#1012382).\n- kprobes: Make list and blacklist root user read only (bnc#1012382).\n- kthread, tracing: Do not expose half-written comm when creating kthreads (bsc#1104897).\n- kvm: x86: vmx: fix vpid leak (bnc#1012382).\n- l2tp: use sk_dst_check() to avoid race on sk->sk_dst_cache (bnc#1012382).\n- lib/rhashtable: consider param->min_size when setting initial table size (bnc#1012382).\n- libata: Fix command retry decision (bnc#1012382).\n- libceph: check authorizer reply/challenge length before reading (bsc#1096748).\n- libceph: factor out __ceph_x_decrypt() (bsc#1096748).\n- libceph: factor out __prepare_write_connect() (bsc#1096748).\n- libceph: factor out encrypt_authorizer() (bsc#1096748).\n- libceph: store ceph_auth_handshake pointer in ceph_connection (bsc#1096748).\n- libceph: weaken sizeof check in ceph_x_verify_authorizer_reply() (bsc#1096748).\n- llc: use refcount_inc_not_zero() for llc_sap_find() (bnc#1012382).\n- locking/lockdep: Do not record IRQ state within lockdep code (bnc#1012382).\n- locks: pass inode pointer to locks_free_lock_context (bsc@1099832).\n- locks: prink more detail when there are leaked locks (bsc#1099832).\n- locks: restore a warn for leaked locks on close (bsc#1099832).\n- m68k: fix 'bad page state' oops on ColdFire boot (bnc#1012382).\n- mac80211: add stations tied to AP_VLANs during hw reconfig (bnc#1012382).\n- md/raid10: fix that replacement cannot complete recovery after reassemble (bnc#1012382).\n- md: fix NULL dereference of mddev->pers in remove_and_add_spares() (bnc#1012382).\n- media: omap3isp: fix unbalanced dma_iommu_mapping (bnc#1012382).\n- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bnc#1012382).\n- media: rtl28xxu: be sure that it won't go past the array size (bsc#1050431).\n- media: s5p-jpeg: fix number of components macro (bsc#1050431).\n- media: saa7164: Fix driver name in debug output (bnc#1012382).\n- media: si470x: fix __be16 annotations (bnc#1012382).\n- media: siano: get rid of __le32/__le16 cast warnings (bnc#1012382).\n- media: staging: omap4iss: Include asm/cacheflush.h after generic includes (bnc#1012382).\n- media: videobuf2-core: do not call memop 'finish' when queueing (bnc#1012382).\n- memory: tegra: Apply interrupts mask per SoC (bnc#1012382).\n- memory: tegra: Do not handle spurious interrupts (bnc#1012382).\n- mfd: cros_ec: Fail early if we cannot identify the EC (bnc#1012382).\n- microblaze: Fix simpleImage format generation (bnc#1012382).\n- mm/hugetlb: filter out hugetlb pages if HUGEPAGE migration is not supported (bnc#1106697).\n- mm/memory.c: check return value of ioremap_prot (bnc#1012382).\n- mm/slub.c: add __printf verification to slab_err() (bnc#1012382).\n- mm/tlb: Remove tlb_remove_table() non-concurrent condition (bnc#1012382).\n- mm: Add vm_insert_pfn_prot() (bnc#1012382).\n- mm: fix cache mode tracking in vm_insert_mixed() (bnc#1012382).\n- mm: memcg: fix use after free in mem_cgroup_iter() (bnc#1012382).\n- mm: vmalloc: avoid racy handling of debugobjects in vunmap (bnc#1012382).\n- mm: x86: move _PAGE_SWP_SOFT_DIRTY from bit 7 to bit 1 (bnc#1012382).\n- mtd: rawnand: fsl_ifc: fix FSL NAND driver to read all ONFI parameter pages (bnc#1012382).\n- mtd: ubi: wl: Fix error return code in ubi_wl_init().\n- mwifiex: correct histogram data with appropriate index (bnc#1012382).\n- mwifiex: handle race during mwifiex_usb_disconnect (bnc#1012382).\n- net/9p/client.c: version pointer uninitialized (bnc#1012382).\n- net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree() (bnc#1012382).\n- net/ethernet/freescale/fman: fix cross-build error (bnc#1012382).\n- net/ipv4: Set oif in fib_compute_spec_dst (bnc#1012382).\n- net/mlx4_core: Save the qpn from the input modifier in RST2INIT wrapper (bnc#1012382).\n- net/mlx5: Add missing SET_DRIVER_VERSION command translation (bsc#1015342 bsc#1015343).\n- net/mlx5: E-Switch, Include VF RDMA stats in vport statistics (bsc#966170 bsc#966172).\n- net/mlx5: Eswitch, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1015342 bsc#1015343).\n- net/mlx5: Fix wrong size allocation for QoS ETC TC regitster (bsc#966170 bsc#966172).\n- net/mlx5: Vport, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#966170 bsc#966172).\n- net/mlx5e: Do not allow aRFS for encapsulated packets (bsc#1015342 bsc#1015343).\n- net/mlx5e: Err if asked to offload TC match on frag being first (bsc#1015342 bsc#1015343).\n- net/mlx5e: Fix quota counting in aRFS expire flow (bsc#1015342 bsc#1015343).\n- net/mlx5e: Refine ets validation function (bsc#966170 bsc#966172).\n- net: 6lowpan: fix reserved space for single frames (bnc#1012382).\n- net: Do not copy pfmemalloc flag in __copy_skb_header() (bnc#1012382).\n- net: add skb_condense() helper (bsc#1089066).\n- net: adjust skb->truesize in ___pskb_trim() (bsc#1089066).\n- net: adjust skb->truesize in pskb_expand_head() (bsc#1089066).\n- net: axienet: Fix double deregister of mdio (bnc#1012382).\n- net: caif: Add a missing rcu_read_unlock() in caif_flow_cb (bnc#1012382).\n- net: davinci_emac: match the mdio device against its compatible if possible (bnc#1012382).\n- net: dsa: Do not suspend/resume closed slave_dev (bnc#1012382).\n- net: ena: Fix use of uninitialized DMA address bits field (bsc#1027968).\n- net: fix amd-xgbe flow-control issue (bnc#1012382).\n- net: hamradio: use eth_broadcast_addr (bnc#1012382).\n- net: lan78xx: Fix misplaced tasklet_schedule() call (bnc#1012382).\n- net: lan78xx: fix rx handling before first packet is send (bnc#1012382).\n- net: mac802154: tx: expand tailroom if necessary (bnc#1012382).\n- net: phy: fix flag masking in __set_phy_supported (bnc#1012382).\n- net: prevent ISA drivers from building on PPC32 (bnc#1012382).\n- net: propagate dev_get_valid_name return code (bnc#1012382).\n- net: qca_spi: Avoid packet drop during initial sync (bnc#1012382).\n- net: qca_spi: Fix log level if probe fails (bnc#1012382).\n- net: qca_spi: Make sure the QCA7000 reset is triggered (bnc#1012382).\n- net: socket: fix potential spectre v1 gadget in socketcall (bnc#1012382).\n- net: usb: rtl8150: demote allmulti message to dev_dbg() (bnc#1012382).\n- net: vmxnet3: use new api ethtool_{get|set}_link_ksettings (bsc#1091860 bsc#1098253).\n- net_sched: Fix missing res info when create new tc_index filter (bnc#1012382).\n- net_sched: fix NULL pointer dereference when delete tcindex filter (bnc#1012382).\n- netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state (bnc#1012382).\n- netfilter: ipset: List timing out entries with 'timeout 1' instead of zero (bnc#1012382).\n- netfilter: ipv6: nf_defrag: reduce struct net memory waste (bnc#1012382).\n- netfilter: ipvs: do not create conn for ABORT packet in sctp_conn_schedule (bsc#1102797).\n- netfilter: ipvs: fix the issue that sctp_conn_schedule drops non-INIT packet (bsc#1102797).\n- netfilter: x_tables: set module owner for icmp(6) matches (bnc#1012382).\n- netlink: Do not shift on 64 for ngroups (bnc#1012382).\n- netlink: Do not shift with UB on nlk->ngroups (bnc#1012382).\n- netlink: Do not subscribe to non-existent groups (bnc#1012382).\n- netlink: Fix spectre v1 gadget in netlink_create() (bnc#1012382).\n- netlink: do not enter direct reclaim from netlink_trim() (bsc#1042286).\n- nfsd: fix potential use-after-free in nfsd4_decode_getdeviceinfo (bnc#1012382).\n- nl80211: Add a missing break in parse_station_flags (bnc#1012382).\n- nohz: Fix local_timer_softirq_pending() (bnc#1012382).\n- nvme-fc: release io queues to allow fast fail (bsc#1102486).\n- nvme: if_ready checks to fail io to deleting controller (bsc#1102486).\n- nvme: kABI-compliant version of nvmf_fail_nonready_command() (bsc#1102486).\n- nvmet-fc: fix target sgl list on large transfers (bsc#1102486).\n- osf_getdomainname(): use copy_to_user() (bnc#1012382).\n- ovl: Do d_type check only if work dir creation was successful (bnc#1012382).\n- ovl: Ensure upper filesystem supports d_type (bnc#1012382).\n- ovl: warn instead of error if d_type is not supported (bnc#1012382).\n- packet: refine ring v3 block size test to hold one frame (bnc#1012382).\n- packet: reset network header if packet shorter than ll reserved space (bnc#1012382).\n- parisc: Define mb() and add memory barriers to assembler unlock sequences (bnc#1012382).\n- parisc: Enable CONFIG_MLONGCALLS by default (bnc#1012382).\n- parisc: Remove ordered stores from syscall.S (bnc#1012382).\n- parisc: Remove unnecessary barriers from spinlock.h (bnc#1012382).\n- perf auxtrace: Fix queue resize (bnc#1012382).\n- perf llvm-utils: Remove bashism from kernel include fetch script (bnc#1012382).\n- perf report powerpc: Fix crash if callchain is empty (bnc#1012382).\n- perf test session topology: Fix test on s390 (bnc#1012382).\n- perf/x86/intel/uncore: Correct fixed counter index check for NHM (bnc#1012382).\n- perf/x86/intel/uncore: Correct fixed counter index check in generic code (bnc#1012382).\n- perf: fix invalid bit in diagnostic entry (bnc#1012382).\n- pinctrl: at91-pio4: add missing of_node_put (bnc#1012382).\n- pinctrl: freescale: off by one in imx1_pinconf_group_dbg_show() (bnc#1012382).\n- pnfs/blocklayout: off by one in bl_map_stripe() (bnc#1012382).\n- powerpc/32: Add a missing include header (bnc#1012382).\n- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032).\n- powerpc/64s: Fix compiler store ordering to SLB shadow area (bnc#1012382).\n- powerpc/8xx: fix invalid register expression in head_8xx.S (bnc#1012382).\n- powerpc/chrp/time: Make some functions static, add missing header include (bnc#1012382).\n- powerpc/embedded6xx/hlwd-pic: Prevent interrupts from being handled by Starlet (bnc#1012382).\n- powerpc/fadump: handle crash memory ranges array index overflow (bsc#1103269).\n- powerpc/fadump: merge adjacent memory ranges to reduce PT_LOAD segements (bsc#1103269).\n- powerpc/lib: Fix the feature fixup tests to actually work (bsc#1066223).\n- powerpc/powermac: Add missing prototype for note_bootable_part() (bnc#1012382).\n- powerpc/powermac: Mark variable x as unused (bnc#1012382).\n- powerpc/pseries: Fix endianness while restoring of r3 in MCE handler (bnc#1012382).\n- powerpc/topology: Get topology for shared processors at boot (bsc#1104683).\n- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157).\n- powerpc: Avoid code patching freed init sections (bnc#1107735).\n- powerpc: make feature-fixup tests fortify-safe (bsc#1066223).\n- provide special timeout module parameters for EC2 (bsc#1065364).\n- ptp: fix missing break in switch (bnc#1012382).\n- pwm: tiehrpwm: Fix disabling of output of PWMs (bnc#1012382).\n- qed: Add sanity check for SIMD fastpath handler (bnc#1012382).\n- qed: Correct Multicast API to reflect existence of 256 approximate buckets (bsc#1019695 bsc#1019699 bsc#1022604).\n- qed: Do not advertise DCBX_LLD_MANAGED capability (bsc#1019695 bsc#1019699 bsc#1022604).\n- qed: Fix possible memory leak in Rx error path handling (bsc#1019695 bsc#1019699 bsc#1022604 ).\n- qed: Fix possible race for the link state value (bnc#1012382).\n- qed: Fix setting of incorrect eswitch mode (bsc#1019695 bsc#1019699 bsc#1022604).\n- qed: Fix use of incorrect size in memcpy call (bsc#1019695 bsc#1019699 bsc#1022604).\n- qede: Adverstise software timestamp caps when PHC is not available (bsc#1019695 bsc#1019699 bsc#1022604).\n- qlge: Fix netdev features configuration (bsc#1098822).\n- qlogic: check kstrtoul() for errors (bnc#1012382).\n- random: mix rdrand with entropy sent in from userspace (bnc#1012382).\n- readahead: stricter check for bdi io_pages (VM Functionality).\n- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bnc#1012382).\n- reiserfs: fix broken xattr handling (heap corruption, bad retval) (bnc#1012382).\n- ring_buffer: tracing: Inherit the tracing setting to next ring buffer (bnc#1012382).\n- root dentries need RCU-delayed freeing (bnc#1012382).\n- rsi: Fix 'invalid vdd' warning in mmc (bnc#1012382).\n- rtc: ensure rtc_set_alarm fails when alarms are not supported (bnc#1012382).\n- rtnetlink: add rtnl_link_state check in rtnl_configure_link (bnc#1012382).\n- s390/cpum_sf: Add data entry sizes to sampling trailer entry (bnc#1012382).\n- s390/kvm: fix deadlock when killed by oom (bnc#1012382).\n- s390/lib: use expoline for all bcr instructions (bnc#1106934, LTC#171029).\n- s390/pci: fix out of bounds access during irq setup (bnc#1012382).\n- s390/qdio: reset old sbal_state flags (bnc#1012382).\n- s390/qeth: do not clobber buffer on async TX completion (bnc#1104485, LTC#170349).\n- s390/qeth: fix race when setting MAC address (bnc#1104485, LTC#170726).\n- s390: add explicit <linux/stringify.h> for jump label (bsc#1105271).\n- s390: detect etoken facility (bnc#1106934, LTC#171029).\n- s390: fix br_r1_trampoline for machines without exrl (bnc#1012382 bnc#1106934 LTC#171029).\n- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).\n- scsi: 3w-9xxx: fix a missing-check bug (bnc#1012382).\n- scsi: 3w-xxxx: fix a missing-check bug (bnc#1012382).\n- scsi: core: Avoid that SCSI device removal through sysfs triggers a deadlock (bnc#1012382).\n- scsi: fcoe: drop frames in ELS LOGO error path (bnc#1012382).\n- scsi: hpsa: limit transfer length to 1MB, not 512kB (bsc#1102346).\n- scsi: libiscsi: fix possible NULL pointer dereference in case of TMF (bnc#1012382).\n- scsi: megaraid: silence a static checker bug (bnc#1012382).\n- scsi: megaraid_sas: Increase timeout by 1 sec for non-RAID fastpath IOs (bnc#1012382).\n- scsi: qla2xxx: Fix ISP recovery on unload (bnc#1012382).\n- scsi: qla2xxx: Return error when TMF returns (bnc#1012382).\n- scsi: scsi_dh: replace too broad 'TP9' string with the exact models (bnc#1012382).\n- scsi: sr: Avoid that opening a CD-ROM hangs with runtime power management enabled (bnc#1012382).\n- scsi: sysfs: Introduce sysfs_{un,}break_active_protection() (bnc#1012382).\n- scsi: ufs: fix exception event handling (bnc#1012382).\n- scsi: vmw_pvscsi: Return DID_RESET for status SAM_STAT_COMMAND_TERMINATED (bnc#1012382).\n- scsi: xen-scsifront: add error handling for xenbus_printf (bnc#1012382).\n- scsi_debug: call resp_XXX function after setting host_scribble (bsc#1069138).\n- scsi_debug: reset injection flags for every_nth > 0 (bsc#1069138).\n- selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC (bnc#1012382).\n- selftest/seccomp: Fix the seccomp(2) signature (bnc#1012382).\n- selftests/ftrace: Add snapshot and tracing_on test case (bnc#1012382).\n- selftests/x86/sigreturn/64: Fix spurious failures on AMD CPUs (bnc#1012382).\n- selftests: pstore: return Kselftest Skip code for skipped tests (bnc#1012382).\n- selftests: static_keys: return Kselftest Skip code for skipped tests (bnc#1012382).\n- selftests: sync: add config fragment for testing sync framework (bnc#1012382).\n- selftests: user: return Kselftest Skip code for skipped tests (bnc#1012382).\n- selftests: zram: return Kselftest Skip code for skipped tests (bnc#1012382).\n- serial: 8250_dw: always set baud rate in dw8250_set_termios (bnc#1012382).\n- sfc: stop the TX queue before pushing new buffers (bsc#1017967 ).\n- skbuff: Unconditionally copy pfmemalloc in __skb_clone() (bnc#1012382).\n- slab: __GFP_ZERO is incompatible with a constructor (bnc#1107060).\n- smb3: Do not send SMB3 SET_INFO if nothing changed (bnc#1012382).\n- smb3: do not request leases in symlink creation and query (bnc#1012382).\n- spi: davinci: fix a NULL pointer dereference (bnc#1012382).\n- squashfs: be more careful about metadata corruption (bnc#1012382).\n- squashfs: more metadata hardening (bnc#1012382).\n- squashfs: more metadata hardenings (bnc#1012382).\n- staging: android: ion: check for kref overflow (bnc#1012382).\n- string: drop __must_check from strscpy() and restore strscpy() usages in cgroup (bsc#1107319).\n- sys: do not hold uts_sem while accessing userspace memory (bnc#1106995).\n- target_core_rbd: use RCU in free_device (bsc#1105524).\n- tcp: Fix missing range_truesize enlargement in the backport (bnc#1012382).\n- tcp: add max_quickacks param to tcp_incr_quickack and tcp_enter_quickack_mode (bnc#1012382).\n- tcp: add one more quick ack after after ECN events (bnc#1012382).\n- tcp: do not aggressively quick ack after ECN events (bnc#1012382).\n- tcp: do not cancel delay-AcK on DCTCP special ACK (bnc#1012382).\n- tcp: do not delay ACK in DCTCP upon CE status change (bnc#1012382).\n- tcp: do not force quickack when receiving out-of-order packets (bnc#1012382).\n- tcp: fix dctcp delayed ACK schedule (bnc#1012382).\n- tcp: helpers to send special DCTCP ack (bnc#1012382).\n- tcp: identify cryptic messages as TCP seq # bugs (bnc#1012382).\n- tcp: refactor tcp_ecn_check_ce to remove sk type cast (bnc#1012382).\n- tcp: remove DELAYED ACK events in DCTCP (bnc#1012382).\n- tg3: Add higher cpu clock for 5762 (bnc#1012382).\n- thermal: exynos: fix setting rising_threshold for Exynos5433 (bnc#1012382).\n- timekeeping: Eliminate the stale declaration of ktime_get_raw_and_real_ts64() (bsc#969470).\n- tools/power turbostat: Read extended processor family from CPUID (bnc#1012382).\n- tools/power turbostat: fix -S on UP systems (bnc#1012382).\n- tools: usb: ffs-test: Fix build on big endian systems (bnc#1012382).\n- tpm: fix race condition in tpm_common_write() (bnc#1012382).\n- tracing/blktrace: Fix to allow setting same value (bnc#1012382).\n- tracing/kprobes: Fix trace_probe flags on enable_trace_kprobe() failure (bnc#1012382).\n- tracing: Do not call start/stop() functions when tracing_on does not change (bnc#1012382).\n- tracing: Fix double free of event_trigger_data (bnc#1012382).\n- tracing: Fix possible double free in event_enable_trigger_func() (bnc#1012382).\n- tracing: Quiet gcc warning about maybe unused link variable (bnc#1012382).\n- tracing: Use __printf markup to silence compiler (bnc#1012382).\n- tty: Fix data race in tty_insert_flip_string_fixed_flag (bnc#1012382).\n- turn off -Wattribute-alias (bnc#1012382).\n- ubi: Be more paranoid while seaching for the most recent Fastmap (bnc#1012382).\n- ubi: Fix Fastmap's update_vol() (bnc#1012382).\n- ubi: Fix races around ubi_refill_pools() (bnc#1012382).\n- ubi: Introduce vol_ignored() (bnc#1012382).\n- ubi: Rework Fastmap attach base code (bnc#1012382).\n- ubi: fastmap: Erase outdated anchor PEBs during attach (bnc#1012382).\n- ubifs: Check data node size before truncate (bsc#1106276).\n- ubifs: Fix memory leak in lprobs self-check (bsc#1106278).\n- ubifs: Fix synced_i_size calculation for xattr inodes (bsc#1106275).\n- ubifs: xattr: Do not operate on deleted inodes (bsc#1106271).\n- udl-kms: change down_interruptible to down (bnc#1012382).\n- udl-kms: fix crash due to uninitialized memory (bnc#1012382).\n- udl-kms: handle allocation failure (bnc#1012382).\n- udlfb: set optimal write delay (bnc#1012382).\n- uprobes: Use synchronize_rcu() not synchronize_sched() (bnc#1012382).\n- usb/phy: fix PPC64 build errors in phy-fsl-usb.c (bnc#1012382).\n- usb: audio-v2: Correct the comment for struct uac_clock_selector_descriptor (bsc#1099810).\n- usb: cdc_acm: Add quirk for Castles VEGA3000 (bnc#1012382).\n- usb: dwc2: debugfs: Do not touch RX FIFO during register dump (bsc#1100132).\n- usb: dwc2: fix isoc split in transfer with no data (bnc#1012382).\n- usb: gadget: composite: fix delayed_status race condition when set_interface (bnc#1012382).\n- usb: gadget: dwc2: fix memory leak in gadget_init() (bnc#1012382).\n- usb: gadget: f_fs: Only return delayed status when len is 0 (bnc#1012382).\n- usb: gadget: f_uac2: fix endianness of 'struct cntrl_*_lay3' (bnc#1012382).\n- usb: gadget: r8a66597: Fix a possible sleep-in-atomic-context bugs in r8a66597_queue() (bnc#1012382).\n- usb: gadget: r8a66597: Fix two possible sleep-in-atomic-context bugs in init_controller() (bnc#1012382).\n- usb: hub: Do not wait for connect state at resume for powered-off ports (bnc#1012382).\n- usb: renesas_usbhs: gadget: fix spin_lock_init() for &uep->lock (bsc#1085536).\n- usb: xhci: increase CRS timeout value (bnc#1012382).\n- usbip: usbip_detach: Fix memory, udev context and udev leak (bnc#1012382).\n- userns: move user access out of the mutex (bnc#1012382).\n- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).\n- virtio_balloon: fix another race between migration and ballooning (bnc#1012382).\n- virtio_console: fix uninitialized variable use.\n- vmw_balloon: VMCI_DOORBELL_SET does not check status (bnc#1012382).\n- vmw_balloon: do not use 2MB without batching (bnc#1012382).\n- vmw_balloon: fix VMCI use when balloon built into kernel (bnc#1012382).\n- vmw_balloon: fix inflation of 64-bit GFNs (bnc#1012382).\n- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1091860 bsc#1098253).\n- vmxnet3: add receive data ring support (bsc#1091860 bsc#1098253).\n- vmxnet3: add support for get_coalesce, set_coalesce ethtool operations (bsc#1091860 bsc#1098253).\n- vmxnet3: allow variable length transmit data ring buffer (bsc#1091860 bsc#1098253).\n- vmxnet3: avoid assumption about invalid dma_pa in vmxnet3_set_mc() (bsc#1091860 bsc#1098253).\n- vmxnet3: avoid format strint overflow warning (bsc#1091860 bsc#1098253).\n- vmxnet3: avoid xmit reset due to a race in vmxnet3 (bsc#1091860 bsc#1098253).\n- vmxnet3: fix incorrect dereference when rxvlan is disabled (bsc#1091860 bsc#1098253).\n- vmxnet3: fix non static symbol warning (bsc#1091860 bsc#1098253).\n- vmxnet3: fix tx data ring copy for variable size (bsc#1091860 bsc#1098253).\n- vmxnet3: increase default rx ring sizes (bsc#1091860 bsc#1098253).\n- vmxnet3: introduce command to register memory region (bsc#1091860 bsc#1098253).\n- vmxnet3: introduce generalized command interface to configure the device (bsc#1091860 bsc#1098253).\n- vmxnet3: prepare for version 3 changes (bsc#1091860 bsc#1098253).\n- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1091860 bsc#1098253).\n- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1091860 bsc#1098253).\n- vmxnet3: set the DMA mask before the first DMA map operation (bsc#1091860 bsc#1098253).\n- vmxnet3: update to version 3 (bsc#1091860 bsc#1098253).\n- vmxnet3: use DMA memory barriers where required (bsc#1091860 bsc#1098253).\n- vmxnet3: use correct flag to indicate LRO feature (bsc#1091860 bsc#1098253).\n- vsock: split dwork to avoid reinitializations (bnc#1012382).\n- vti6: Fix dev->max_mtu setting (bsc#1033962).\n- vti6: fix PMTU caching and reporting on xmit (bnc#1012382).\n- wlcore: sdio: check for valid platform device data before suspend (bnc#1012382).\n- x86/MCE: Remove min interval polling limitation (bnc#1012382).\n- x86/amd: do not set X86_BUG_SYSRET_SS_ATTRS when running under Xen (bnc#1012382).\n- x86/asm/entry/32: Simplify pushes of zeroed pt_regs->REGs (bnc#1012382).\n- x86/bugs: Move the l1tf function and define pr_fmt properly (bnc#1012382).\n- x86/bugs: Respect nospec command line option (bsc#1068032).\n- x86/cpu/AMD: Fix erratum 1076 (CPB bit) (bnc#1012382).\n- x86/cpu: Make alternative_msr_write work for 32-bit code (bnc#1012382).\n- x86/cpu: Re-apply forced caps every time CPU caps are re-read (bnc#1012382).\n- x86/cpufeature: preserve numbers (kabi).\n- x86/cpufeatures: Add CPUID_7_EDX CPUID leaf (bnc#1012382).\n- x86/cpufeatures: Clean up Spectre v2 related CPUID flags (bnc#1012382).\n- x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface (bnc#1012382).\n- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).\n- x86/init: fix build with CONFIG_SWAP=n (bnc#1012382).\n- x86/irqflags: Mark native_restore_fl extern inline (bnc#1012382).\n- x86/irqflags: Provide a declaration for native_save_fl.\n- x86/mm/kmmio: Make the tracer robust against L1TF (bnc#1012382).\n- x86/mm/pat: Fix L1TF stable backport for CPA (bnc#1012382).\n- x86/mm/pat: Fix L1TF stable backport for CPA, 2nd call (bnc#1012382).\n- x86/mm/pat: Make set_memory_np() L1TF safe (bnc#1012382).\n- x86/mm: Add TLB purge to free pmd/pte page interfaces (bnc#1012382).\n- x86/mm: Disable ioremap free page handling on x86-PAE (bnc#1012382).\n- x86/mm: Give each mm TLB flush generation a unique ID (bnc#1012382).\n- x86/paravirt: Fix spectre-v2 mitigations for paravirt guests (bnc#1012382).\n- x86/paravirt: Make native_save_fl() extern inline (bnc#1012382).\n- x86/process: Correct and optimize TIF_BLOCKSTEP switch (bnc#1012382).\n- x86/process: Optimize TIF checks in __switch_to_xtra() (bnc#1012382).\n- x86/process: Optimize TIF_NOTSC switch (bnc#1012382).\n- x86/process: Re-export start_thread() (bnc#1012382).\n- x86/spectre: Add missing family 6 check to microcode check (bnc#1012382).\n- x86/spectre_v2: Do not check microcode versions when running under hypervisors (bnc#1012382).\n- x86/speculation/l1tf: Exempt zeroed PTEs from inversion (bnc#1012382).\n- x86/speculation/l1tf: Extend 64bit swap file size limit (bnc#1012382).\n- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).\n- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1012382).\n- x86/speculation/l1tf: Fix up CPU feature flags (bnc#1012382).\n- x86/speculation/l1tf: Fix up pte->pfn conversion for PAE (bnc#1012382).\n- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).\n- x86/speculation/l1tf: Invert all not present mappings (bnc#1012382).\n- x86/speculation/l1tf: Make pmd/pud_mknotpresent() invert (bnc#1012382).\n- x86/speculation/l1tf: Protect PAE swap entries against L1TF (bnc#1012382).\n- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).\n- x86/speculation/l1tf: Unbreak !__HAVE_ARCH_PFN_MODIFY_ALLOWED architectures (bnc#1012382).\n- x86/speculation: Add <asm/msr-index.h> dependency (bnc#1012382).\n- x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support (bnc#1012382).\n- x86/speculation: Clean up various Spectre related details (bnc#1012382).\n- x86/speculation: Correct Speculation Control microcode blacklist again (bnc#1012382).\n- x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP (bnc#1012382).\n- x86/speculation: Update Speculation Control microcode blacklist (bnc#1012382).\n- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).\n- x86/speculation: Use IBRS if available before calling into firmware (bnc#1012382).\n- x86/speculation: Use Indirect Branch Prediction Barrier in context switch (bnc#1012382).\n- x86/xen: Add call of speculative_store_bypass_ht_init() to PV paths (bnc#1012382).\n- xen-netfront: wait xenbus state change when load module manually (bnc#1012382).\n- xen/blkback: do not keep persistent grants too long (bsc#1085042).\n- xen/blkback: move persistent grants flags to bool (bsc#1085042).\n- xen/blkfront: cleanup stale persistent grants (bsc#1085042).\n- xen/blkfront: reorder tests in xlblk_init() (bsc#1085042).\n- xen/netfront: do not cache skb_shinfo() (bnc#1012382).\n- xen: avoid crash in disable_hotplug_cpu (bsc#1106594).\n- xen: set cpu capabilities from xen_start_kernel() (bnc#1012382).\n- xfrm: fix missing dst_release() after policy blocking lbcast and multicast (bnc#1012382).\n- xfrm: free skb if nlsk pointer is NULL (bnc#1012382).\n- xfrm_user: prevent leaking 2 bytes of kernel memory (bnc#1012382).\n- xfs: Remove dead code from inode recover function (bsc#1105396).\n- xfs: repair malformed inode items during log recovery (bsc#1105396).\n- xhci: Fix perceived dead host due to runtime suspend race with event handler (bnc#1012382).\n- zswap: re-check zswap_is_full() after do zswap_shrink() (bnc#1012382).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-SDK-12-SP3-2018-2004,SUSE-SLE-SERVER-12-SP3-2018-2004", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2858-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:2858-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20182858-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:2858-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html", }, { category: "self", summary: "SUSE Bug 1012382", url: "https://bugzilla.suse.com/1012382", }, { category: "self", summary: "SUSE Bug 1015342", url: "https://bugzilla.suse.com/1015342", }, { category: "self", summary: "SUSE Bug 1015343", url: "https://bugzilla.suse.com/1015343", }, { category: "self", summary: "SUSE Bug 1017967", url: "https://bugzilla.suse.com/1017967", }, { category: "self", summary: "SUSE Bug 1019695", url: "https://bugzilla.suse.com/1019695", }, { category: "self", summary: "SUSE Bug 1019699", url: "https://bugzilla.suse.com/1019699", }, { category: "self", summary: "SUSE Bug 1020412", url: "https://bugzilla.suse.com/1020412", }, { category: "self", summary: "SUSE Bug 1021121", url: "https://bugzilla.suse.com/1021121", }, { category: "self", summary: "SUSE Bug 1022604", url: "https://bugzilla.suse.com/1022604", }, { category: "self", summary: "SUSE Bug 1024361", url: "https://bugzilla.suse.com/1024361", }, { category: "self", summary: "SUSE Bug 1024365", url: "https://bugzilla.suse.com/1024365", }, { category: "self", summary: "SUSE Bug 1024376", url: "https://bugzilla.suse.com/1024376", }, { category: "self", summary: "SUSE Bug 1027968", url: "https://bugzilla.suse.com/1027968", }, { category: "self", summary: "SUSE Bug 1030552", url: "https://bugzilla.suse.com/1030552", }, { category: "self", summary: "SUSE Bug 1033962", url: "https://bugzilla.suse.com/1033962", }, { category: "self", summary: "SUSE Bug 1042286", url: "https://bugzilla.suse.com/1042286", }, { category: "self", summary: "SUSE Bug 1048317", url: "https://bugzilla.suse.com/1048317", }, { category: "self", summary: "SUSE Bug 1050431", url: "https://bugzilla.suse.com/1050431", }, { category: "self", summary: "SUSE Bug 1053685", url: "https://bugzilla.suse.com/1053685", }, { category: "self", summary: "SUSE Bug 1055014", url: "https://bugzilla.suse.com/1055014", }, { category: "self", summary: "SUSE Bug 1056596", url: "https://bugzilla.suse.com/1056596", }, { category: "self", summary: "SUSE Bug 1062604", url: "https://bugzilla.suse.com/1062604", }, { category: "self", summary: "SUSE Bug 1063646", url: "https://bugzilla.suse.com/1063646", }, { category: "self", summary: "SUSE Bug 1064232", url: "https://bugzilla.suse.com/1064232", }, { category: "self", summary: "SUSE Bug 1065364", url: "https://bugzilla.suse.com/1065364", }, { category: "self", summary: "SUSE Bug 1066223", url: "https://bugzilla.suse.com/1066223", }, { category: "self", summary: "SUSE Bug 1068032", url: "https://bugzilla.suse.com/1068032", }, { category: "self", summary: "SUSE Bug 1068075", url: "https://bugzilla.suse.com/1068075", }, { category: "self", summary: "SUSE Bug 1069138", url: "https://bugzilla.suse.com/1069138", }, { category: "self", summary: "SUSE Bug 1078921", url: "https://bugzilla.suse.com/1078921", }, { category: "self", summary: "SUSE Bug 1080157", url: "https://bugzilla.suse.com/1080157", }, { category: "self", summary: "SUSE Bug 1083663", url: "https://bugzilla.suse.com/1083663", }, { category: "self", summary: "SUSE Bug 1085042", url: "https://bugzilla.suse.com/1085042", }, { category: "self", summary: "SUSE Bug 1085536", url: "https://bugzilla.suse.com/1085536", }, { category: "self", summary: "SUSE Bug 1085539", url: "https://bugzilla.suse.com/1085539", }, { category: "self", summary: "SUSE Bug 1086457", url: "https://bugzilla.suse.com/1086457", }, { category: "self", summary: "SUSE Bug 1087092", url: "https://bugzilla.suse.com/1087092", }, { category: "self", summary: "SUSE Bug 1089066", url: "https://bugzilla.suse.com/1089066", }, { category: "self", summary: "SUSE Bug 1090888", url: "https://bugzilla.suse.com/1090888", }, { category: "self", summary: "SUSE Bug 1091171", url: "https://bugzilla.suse.com/1091171", }, { category: "self", summary: "SUSE Bug 1091860", url: "https://bugzilla.suse.com/1091860", }, { category: "self", summary: "SUSE Bug 1092903", url: "https://bugzilla.suse.com/1092903", }, { category: "self", summary: "SUSE Bug 1096254", url: "https://bugzilla.suse.com/1096254", }, { category: "self", summary: "SUSE Bug 1096748", url: "https://bugzilla.suse.com/1096748", }, { category: "self", summary: "SUSE Bug 1097105", url: "https://bugzilla.suse.com/1097105", }, { category: "self", summary: "SUSE Bug 1098253", url: "https://bugzilla.suse.com/1098253", }, { category: "self", summary: "SUSE Bug 1098822", url: "https://bugzilla.suse.com/1098822", }, { category: "self", summary: "SUSE Bug 1099597", url: "https://bugzilla.suse.com/1099597", }, { category: "self", summary: "SUSE Bug 1099810", url: "https://bugzilla.suse.com/1099810", }, { category: "self", summary: "SUSE Bug 1099811", url: "https://bugzilla.suse.com/1099811", }, { category: "self", summary: "SUSE Bug 1099813", url: "https://bugzilla.suse.com/1099813", }, { category: "self", summary: "SUSE Bug 1099832", url: "https://bugzilla.suse.com/1099832", }, { category: "self", summary: "SUSE Bug 1099844", url: "https://bugzilla.suse.com/1099844", }, { category: "self", summary: "SUSE Bug 1099845", url: "https://bugzilla.suse.com/1099845", }, { category: "self", summary: "SUSE Bug 1099846", url: "https://bugzilla.suse.com/1099846", }, { category: "self", summary: "SUSE Bug 1099849", url: "https://bugzilla.suse.com/1099849", }, { category: "self", summary: "SUSE Bug 1099863", url: "https://bugzilla.suse.com/1099863", }, { category: "self", summary: "SUSE Bug 1099864", url: "https://bugzilla.suse.com/1099864", }, { category: "self", summary: "SUSE Bug 1099922", url: "https://bugzilla.suse.com/1099922", }, { category: "self", summary: "SUSE Bug 1099999", url: "https://bugzilla.suse.com/1099999", }, { category: "self", summary: "SUSE Bug 1100000", url: "https://bugzilla.suse.com/1100000", }, { category: "self", summary: "SUSE Bug 1100001", url: "https://bugzilla.suse.com/1100001", }, { category: "self", summary: "SUSE Bug 1100132", url: "https://bugzilla.suse.com/1100132", }, { category: "self", summary: "SUSE Bug 1101822", url: "https://bugzilla.suse.com/1101822", }, { category: "self", summary: "SUSE Bug 1101841", url: "https://bugzilla.suse.com/1101841", }, { category: "self", summary: "SUSE Bug 1102346", url: "https://bugzilla.suse.com/1102346", }, { category: "self", summary: "SUSE Bug 1102486", url: "https://bugzilla.suse.com/1102486", }, { category: "self", summary: "SUSE Bug 1102517", url: "https://bugzilla.suse.com/1102517", }, { category: "self", summary: "SUSE Bug 1102715", url: "https://bugzilla.suse.com/1102715", }, { category: "self", summary: "SUSE Bug 1102797", url: "https://bugzilla.suse.com/1102797", }, { category: "self", summary: "SUSE Bug 1103269", url: "https://bugzilla.suse.com/1103269", }, { category: "self", summary: "SUSE Bug 1103445", url: "https://bugzilla.suse.com/1103445", }, { category: "self", summary: "SUSE Bug 1104319", url: "https://bugzilla.suse.com/1104319", }, { category: "self", summary: "SUSE Bug 1104485", url: "https://bugzilla.suse.com/1104485", }, { category: "self", summary: "SUSE Bug 1104494", url: "https://bugzilla.suse.com/1104494", }, { category: "self", summary: "SUSE Bug 1104495", url: "https://bugzilla.suse.com/1104495", }, { category: "self", summary: "SUSE Bug 1104683", url: "https://bugzilla.suse.com/1104683", }, { category: "self", summary: "SUSE Bug 1104897", url: "https://bugzilla.suse.com/1104897", }, { category: "self", summary: "SUSE Bug 1105271", url: "https://bugzilla.suse.com/1105271", }, { category: "self", summary: "SUSE Bug 1105292", url: "https://bugzilla.suse.com/1105292", }, { category: "self", summary: "SUSE Bug 1105322", url: "https://bugzilla.suse.com/1105322", }, { category: "self", summary: "SUSE Bug 1105392", url: "https://bugzilla.suse.com/1105392", }, { category: "self", summary: "SUSE Bug 1105396", url: "https://bugzilla.suse.com/1105396", }, { category: "self", summary: "SUSE Bug 1105524", url: "https://bugzilla.suse.com/1105524", }, { category: "self", summary: "SUSE Bug 1105536", url: "https://bugzilla.suse.com/1105536", }, { category: "self", summary: "SUSE Bug 1105769", url: "https://bugzilla.suse.com/1105769", }, { category: "self", summary: "SUSE Bug 1106016", url: "https://bugzilla.suse.com/1106016", }, { category: "self", summary: "SUSE Bug 1106105", url: "https://bugzilla.suse.com/1106105", }, { category: "self", summary: "SUSE Bug 1106185", url: "https://bugzilla.suse.com/1106185", }, { category: "self", summary: "SUSE Bug 1106229", url: "https://bugzilla.suse.com/1106229", }, { category: "self", summary: "SUSE Bug 1106271", url: "https://bugzilla.suse.com/1106271", }, { category: "self", summary: "SUSE Bug 1106275", url: "https://bugzilla.suse.com/1106275", }, { category: "self", summary: "SUSE Bug 1106276", url: "https://bugzilla.suse.com/1106276", }, { category: "self", summary: "SUSE Bug 1106278", url: "https://bugzilla.suse.com/1106278", }, { category: "self", summary: "SUSE Bug 1106281", url: "https://bugzilla.suse.com/1106281", }, { category: "self", summary: "SUSE Bug 1106283", url: "https://bugzilla.suse.com/1106283", }, { category: "self", summary: "SUSE Bug 1106369", url: "https://bugzilla.suse.com/1106369", }, { category: "self", summary: "SUSE Bug 1106509", url: "https://bugzilla.suse.com/1106509", }, { category: "self", summary: "SUSE Bug 1106511", url: "https://bugzilla.suse.com/1106511", }, { category: "self", summary: "SUSE Bug 1106594", url: "https://bugzilla.suse.com/1106594", }, { category: "self", summary: "SUSE Bug 1106697", url: "https://bugzilla.suse.com/1106697", }, { category: "self", summary: "SUSE Bug 1106929", url: "https://bugzilla.suse.com/1106929", }, { category: "self", summary: "SUSE Bug 1106934", url: "https://bugzilla.suse.com/1106934", }, { category: "self", summary: "SUSE Bug 1106995", url: "https://bugzilla.suse.com/1106995", }, { category: "self", summary: "SUSE Bug 1107060", url: "https://bugzilla.suse.com/1107060", }, { category: "self", summary: "SUSE Bug 1107078", url: "https://bugzilla.suse.com/1107078", }, { category: "self", summary: "SUSE Bug 1107319", url: "https://bugzilla.suse.com/1107319", }, { category: "self", summary: "SUSE Bug 1107320", url: "https://bugzilla.suse.com/1107320", }, { category: "self", summary: "SUSE Bug 1107689", url: "https://bugzilla.suse.com/1107689", }, { category: "self", summary: "SUSE Bug 1107735", url: "https://bugzilla.suse.com/1107735", }, { category: "self", summary: "SUSE Bug 1107966", url: "https://bugzilla.suse.com/1107966", }, { category: "self", summary: "SUSE Bug 963575", url: "https://bugzilla.suse.com/963575", }, { category: "self", summary: "SUSE Bug 966170", url: "https://bugzilla.suse.com/966170", }, { category: "self", summary: "SUSE Bug 966172", url: "https://bugzilla.suse.com/966172", }, { category: "self", summary: "SUSE Bug 969470", url: "https://bugzilla.suse.com/969470", }, { category: "self", summary: "SUSE Bug 969476", url: "https://bugzilla.suse.com/969476", }, { category: "self", summary: "SUSE Bug 969477", url: "https://bugzilla.suse.com/969477", }, { category: "self", summary: "SUSE Bug 970506", url: "https://bugzilla.suse.com/970506", }, { category: "self", summary: "SUSE CVE CVE-2018-10876 page", url: "https://www.suse.com/security/cve/CVE-2018-10876/", }, { category: "self", summary: "SUSE CVE CVE-2018-10877 page", url: "https://www.suse.com/security/cve/CVE-2018-10877/", }, { category: "self", summary: "SUSE CVE CVE-2018-10878 page", url: "https://www.suse.com/security/cve/CVE-2018-10878/", }, { category: "self", summary: "SUSE CVE CVE-2018-10879 page", url: "https://www.suse.com/security/cve/CVE-2018-10879/", }, { category: "self", summary: "SUSE CVE CVE-2018-10880 page", url: "https://www.suse.com/security/cve/CVE-2018-10880/", }, { category: "self", summary: "SUSE CVE CVE-2018-10881 page", url: "https://www.suse.com/security/cve/CVE-2018-10881/", }, { category: "self", summary: "SUSE CVE CVE-2018-10882 page", url: "https://www.suse.com/security/cve/CVE-2018-10882/", }, { category: "self", summary: "SUSE CVE CVE-2018-10883 page", url: "https://www.suse.com/security/cve/CVE-2018-10883/", }, { category: "self", summary: "SUSE CVE CVE-2018-10902 page", url: "https://www.suse.com/security/cve/CVE-2018-10902/", }, { category: "self", summary: "SUSE CVE CVE-2018-10938 page", url: "https://www.suse.com/security/cve/CVE-2018-10938/", }, { category: "self", summary: "SUSE CVE CVE-2018-10940 page", url: "https://www.suse.com/security/cve/CVE-2018-10940/", }, { category: "self", summary: "SUSE CVE CVE-2018-1128 page", url: "https://www.suse.com/security/cve/CVE-2018-1128/", }, { category: "self", summary: "SUSE CVE CVE-2018-1129 page", url: "https://www.suse.com/security/cve/CVE-2018-1129/", }, { category: "self", summary: "SUSE CVE CVE-2018-12896 page", url: "https://www.suse.com/security/cve/CVE-2018-12896/", }, { category: "self", summary: "SUSE CVE CVE-2018-13093 page", url: "https://www.suse.com/security/cve/CVE-2018-13093/", }, { category: "self", summary: "SUSE CVE CVE-2018-13094 page", url: "https://www.suse.com/security/cve/CVE-2018-13094/", }, { category: "self", summary: "SUSE CVE CVE-2018-13095 page", url: "https://www.suse.com/security/cve/CVE-2018-13095/", }, { category: "self", summary: "SUSE CVE CVE-2018-15572 page", url: "https://www.suse.com/security/cve/CVE-2018-15572/", }, { category: "self", summary: "SUSE CVE CVE-2018-16658 page", url: "https://www.suse.com/security/cve/CVE-2018-16658/", }, { category: "self", summary: "SUSE CVE CVE-2018-6554 page", url: "https://www.suse.com/security/cve/CVE-2018-6554/", }, { category: "self", summary: "SUSE CVE CVE-2018-6555 page", url: "https://www.suse.com/security/cve/CVE-2018-6555/", }, { category: "self", summary: "SUSE CVE CVE-2018-9363 page", url: "https://www.suse.com/security/cve/CVE-2018-9363/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2018-09-25T13:02:46Z", generator: { date: "2018-09-25T13:02:46Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:2858-1", initial_release_date: "2018-09-25T13:02:46Z", revision_history: [ { date: "2018-09-25T13:02:46Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-docs-azure-4.4.155-4.16.1.noarch", product: { name: "kernel-docs-azure-4.4.155-4.16.1.noarch", product_id: "kernel-docs-azure-4.4.155-4.16.1.noarch", }, }, { category: "product_version", name: "kernel-devel-azure-4.4.155-4.16.1.noarch", product: { name: "kernel-devel-azure-4.4.155-4.16.1.noarch", product_id: "kernel-devel-azure-4.4.155-4.16.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-4.4.155-4.16.1.noarch", product: { name: "kernel-source-azure-4.4.155-4.16.1.noarch", product_id: "kernel-source-azure-4.4.155-4.16.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-azure-4.4.155-4.16.1.x86_64", product: { name: "kernel-azure-4.4.155-4.16.1.x86_64", product_id: "kernel-azure-4.4.155-4.16.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-base-4.4.155-4.16.1.x86_64", product: { name: "kernel-azure-base-4.4.155-4.16.1.x86_64", product_id: "kernel-azure-base-4.4.155-4.16.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-4.4.155-4.16.1.x86_64", product: { name: "kernel-azure-devel-4.4.155-4.16.1.x86_64", product_id: "kernel-azure-devel-4.4.155-4.16.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-4.4.155-4.16.1.x86_64", product: { name: "kernel-syms-azure-4.4.155-4.16.1.x86_64", product_id: "kernel-syms-azure-4.4.155-4.16.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP3", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3", product: { name: "SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-docs-azure-4.4.155-4.16.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", }, product_reference: "kernel-docs-azure-4.4.155-4.16.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-4.4.155-4.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", }, product_reference: "kernel-azure-4.4.155-4.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-base-4.4.155-4.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", }, product_reference: "kernel-azure-base-4.4.155-4.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-4.4.155-4.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", }, product_reference: "kernel-azure-devel-4.4.155-4.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-4.4.155-4.16.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", }, product_reference: "kernel-devel-azure-4.4.155-4.16.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-4.4.155-4.16.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", }, product_reference: "kernel-source-azure-4.4.155-4.16.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-4.4.155-4.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", }, product_reference: "kernel-syms-azure-4.4.155-4.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-4.4.155-4.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", }, product_reference: "kernel-azure-4.4.155-4.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-base-4.4.155-4.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", }, product_reference: "kernel-azure-base-4.4.155-4.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-4.4.155-4.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", }, product_reference: "kernel-azure-devel-4.4.155-4.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-4.4.155-4.16.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", }, product_reference: "kernel-devel-azure-4.4.155-4.16.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-4.4.155-4.16.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", }, product_reference: "kernel-source-azure-4.4.155-4.16.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-4.4.155-4.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", }, product_reference: "kernel-syms-azure-4.4.155-4.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, ], }, vulnerabilities: [ { cve: "CVE-2018-10876", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10876", }, ], notes: [ { category: "general", text: "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-10876", url: "https://www.suse.com/security/cve/CVE-2018-10876", }, { category: "external", summary: "SUSE Bug 1099811 for CVE-2018-10876", url: "https://bugzilla.suse.com/1099811", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-09-25T13:02:46Z", details: "low", }, ], title: "CVE-2018-10876", }, { cve: "CVE-2018-10877", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10877", }, ], notes: [ { category: "general", text: "Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-10877", url: "https://www.suse.com/security/cve/CVE-2018-10877", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10877", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099846 for CVE-2018-10877", url: "https://bugzilla.suse.com/1099846", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-09-25T13:02:46Z", details: "low", }, ], title: "CVE-2018-10877", }, { cve: "CVE-2018-10878", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10878", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-10878", url: "https://www.suse.com/security/cve/CVE-2018-10878", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10878", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099813 for CVE-2018-10878", url: "https://bugzilla.suse.com/1099813", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-09-25T13:02:46Z", details: "moderate", }, ], title: "CVE-2018-10878", }, { cve: "CVE-2018-10879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10879", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-10879", url: "https://www.suse.com/security/cve/CVE-2018-10879", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10879", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099844 for CVE-2018-10879", url: "https://bugzilla.suse.com/1099844", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-09-25T13:02:46Z", details: "moderate", }, ], title: "CVE-2018-10879", }, { cve: "CVE-2018-10880", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10880", }, ], notes: [ { category: "general", text: "Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-10880", url: "https://www.suse.com/security/cve/CVE-2018-10880", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10880", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099845 for CVE-2018-10880", url: "https://bugzilla.suse.com/1099845", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-09-25T13:02:46Z", details: "moderate", }, ], title: "CVE-2018-10880", }, { cve: "CVE-2018-10881", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10881", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-10881", url: "https://www.suse.com/security/cve/CVE-2018-10881", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10881", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099864 for CVE-2018-10881", url: "https://bugzilla.suse.com/1099864", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-09-25T13:02:46Z", details: "moderate", }, ], title: "CVE-2018-10881", }, { cve: "CVE-2018-10882", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10882", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-10882", url: "https://www.suse.com/security/cve/CVE-2018-10882", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10882", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099849 for CVE-2018-10882", url: "https://bugzilla.suse.com/1099849", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-09-25T13:02:46Z", details: "moderate", }, ], title: "CVE-2018-10882", }, { cve: "CVE-2018-10883", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10883", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-10883", url: "https://www.suse.com/security/cve/CVE-2018-10883", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10883", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099863 for CVE-2018-10883", url: "https://bugzilla.suse.com/1099863", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-09-25T13:02:46Z", details: "moderate", }, ], title: "CVE-2018-10883", }, { cve: "CVE-2018-10902", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10902", }, ], notes: [ { category: "general", text: "It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-10902", url: "https://www.suse.com/security/cve/CVE-2018-10902", }, { category: "external", summary: "SUSE Bug 1105322 for CVE-2018-10902", url: "https://bugzilla.suse.com/1105322", }, { category: "external", summary: "SUSE Bug 1105323 for CVE-2018-10902", url: "https://bugzilla.suse.com/1105323", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-09-25T13:02:46Z", details: "moderate", }, ], title: "CVE-2018-10902", }, { cve: "CVE-2018-10938", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10938", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-10938", url: "https://www.suse.com/security/cve/CVE-2018-10938", }, { category: "external", summary: "SUSE Bug 1106016 for CVE-2018-10938", url: "https://bugzilla.suse.com/1106016", }, { category: "external", summary: "SUSE Bug 1106191 for CVE-2018-10938", url: "https://bugzilla.suse.com/1106191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-09-25T13:02:46Z", details: "important", }, ], title: "CVE-2018-10938", }, { cve: "CVE-2018-10940", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10940", }, ], notes: [ { category: "general", text: "The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c in the Linux kernel before 4.16.6 allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-10940", url: "https://www.suse.com/security/cve/CVE-2018-10940", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10940", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092903 for CVE-2018-10940", url: "https://bugzilla.suse.com/1092903", }, { category: "external", summary: "SUSE Bug 1107689 for CVE-2018-10940", url: "https://bugzilla.suse.com/1107689", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-10940", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-09-25T13:02:46Z", details: "moderate", }, ], title: "CVE-2018-10940", }, { cve: "CVE-2018-1128", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1128", }, ], notes: [ { category: "general", text: "It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-1128", url: "https://www.suse.com/security/cve/CVE-2018-1128", }, { category: "external", summary: "SUSE Bug 1096748 for CVE-2018-1128", url: "https://bugzilla.suse.com/1096748", }, { category: "external", summary: "SUSE Bug 1114710 for CVE-2018-1128", url: "https://bugzilla.suse.com/1114710", }, { category: "external", summary: "SUSE Bug 1177843 for CVE-2018-1128", url: "https://bugzilla.suse.com/1177843", }, { category: "external", summary: "SUSE Bug 1177859 for CVE-2018-1128", url: "https://bugzilla.suse.com/1177859", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-09-25T13:02:46Z", details: "important", }, ], title: "CVE-2018-1128", }, { cve: "CVE-2018-1129", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1129", }, ], notes: [ { category: "general", text: "A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-1129", url: "https://www.suse.com/security/cve/CVE-2018-1129", }, { category: "external", summary: "SUSE Bug 1096748 for CVE-2018-1129", url: "https://bugzilla.suse.com/1096748", }, { category: "external", summary: "SUSE Bug 1114710 for CVE-2018-1129", url: "https://bugzilla.suse.com/1114710", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-09-25T13:02:46Z", details: "important", }, ], title: "CVE-2018-1129", }, { cve: "CVE-2018-12896", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12896", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-12896", url: "https://www.suse.com/security/cve/CVE-2018-12896", }, { category: "external", summary: "SUSE Bug 1099922 for CVE-2018-12896", url: "https://bugzilla.suse.com/1099922", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-09-25T13:02:46Z", details: "low", }, ], title: "CVE-2018-12896", }, { cve: "CVE-2018-13093", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-13093", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/xfs/xfs_icache.c in the Linux kernel through 4.17.3. There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-13093", url: "https://www.suse.com/security/cve/CVE-2018-13093", }, { category: "external", summary: "SUSE Bug 1100001 for CVE-2018-13093", url: "https://bugzilla.suse.com/1100001", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-09-25T13:02:46Z", details: "moderate", }, ], title: "CVE-2018-13093", }, { cve: "CVE-2018-13094", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-13094", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/xfs/libxfs/xfs_attr_leaf.c in the Linux kernel through 4.17.3. An OOPS may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-13094", url: "https://www.suse.com/security/cve/CVE-2018-13094", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-13094", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1100000 for CVE-2018-13094", url: "https://bugzilla.suse.com/1100000", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-09-25T13:02:46Z", details: "moderate", }, ], title: "CVE-2018-13094", }, { cve: "CVE-2018-13095", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-13095", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.17.3. A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-13095", url: "https://www.suse.com/security/cve/CVE-2018-13095", }, { category: "external", summary: "SUSE Bug 1099999 for CVE-2018-13095", url: "https://bugzilla.suse.com/1099999", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-09-25T13:02:46Z", details: "moderate", }, ], title: "CVE-2018-13095", }, { cve: "CVE-2018-15572", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-15572", }, ], notes: [ { category: "general", text: "The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-15572", url: "https://www.suse.com/security/cve/CVE-2018-15572", }, { category: "external", summary: "SUSE Bug 1102517 for CVE-2018-15572", url: "https://bugzilla.suse.com/1102517", }, { category: "external", summary: "SUSE Bug 1105296 for CVE-2018-15572", url: "https://bugzilla.suse.com/1105296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-09-25T13:02:46Z", details: "important", }, ], title: "CVE-2018-15572", }, { cve: "CVE-2018-16658", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16658", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-16658", url: "https://www.suse.com/security/cve/CVE-2018-16658", }, { category: "external", summary: "SUSE Bug 1092903 for CVE-2018-16658", url: "https://bugzilla.suse.com/1092903", }, { category: "external", summary: "SUSE Bug 1107689 for CVE-2018-16658", url: "https://bugzilla.suse.com/1107689", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-16658", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-09-25T13:02:46Z", details: "low", }, ], title: "CVE-2018-16658", }, { cve: "CVE-2018-6554", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6554", }, ], notes: [ { category: "general", text: "Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-6554", url: "https://www.suse.com/security/cve/CVE-2018-6554", }, { category: "external", summary: "SUSE Bug 1106509 for CVE-2018-6554", url: "https://bugzilla.suse.com/1106509", }, { category: "external", summary: "SUSE Bug 1106511 for CVE-2018-6554", url: "https://bugzilla.suse.com/1106511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-09-25T13:02:46Z", details: "low", }, ], title: "CVE-2018-6554", }, { cve: "CVE-2018-6555", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6555", }, ], notes: [ { category: "general", text: "The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-6555", url: "https://www.suse.com/security/cve/CVE-2018-6555", }, { category: "external", summary: "SUSE Bug 1106509 for CVE-2018-6555", url: "https://bugzilla.suse.com/1106509", }, { category: "external", summary: "SUSE Bug 1106511 for CVE-2018-6555", url: "https://bugzilla.suse.com/1106511", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2018-6555", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-09-25T13:02:46Z", details: "moderate", }, ], title: "CVE-2018-6555", }, { cve: "CVE-2018-9363", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-9363", }, ], notes: [ { category: "general", text: "In the hidp_process_report in bluetooth, there is an integer overflow. This could lead to an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-65853588 References: Upstream kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-9363", url: "https://www.suse.com/security/cve/CVE-2018-9363", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-9363", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1105292 for CVE-2018-9363", url: "https://bugzilla.suse.com/1105292", }, { category: "external", summary: "SUSE Bug 1105293 for CVE-2018-9363", url: "https://bugzilla.suse.com/1105293", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.155-4.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.155-4.16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.155-4.16.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-09-25T13:02:46Z", details: "important", }, ], title: "CVE-2018-9363", }, ], }
suse-su-2018:2381-1
Vulnerability from csaf_suse
Published
2018-08-16 12:30
Modified
2018-08-16 12:30
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-5391 aka 'FragmentSmack': A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).
- CVE-2018-10876: A flaw was found in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image. (bnc#1099811)
- CVE-2018-10877: The ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image. (bnc#1099846)
- CVE-2018-10878: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image. (bnc#1099813)
- CVE-2018-10879: A flaw was found in the ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image. (bnc#1099844)
- CVE-2018-10880: Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service. (bnc#1099845)
- CVE-2018-10881: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099864)
- CVE-2018-10882: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image. (bnc#1099849)
- CVE-2018-10883: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099863)
The following non-security bugs were fixed:
- acpi / lpss: Only call pwm_add_table() for Bay Trail PWM if PMIC HRV is 2 (bsc#1051510).
- af_key: Always verify length of provided sadb_key (bsc#1051510).
- af_key: fix buffer overread in parse_exthdrs() (bsc#1051510).
- af_key: fix buffer overread in verify_address_len() (bsc#1051510).
- afs: Fix directory permissions check (bsc#1101828).
- agp: uninorth: make two functions static (bsc#1051510).
- alsa: emu10k1: add error handling for snd_ctl_add (bsc#1051510).
- alsa: emu10k1: Rate-limit error messages about page errors (bsc#1051510).
- alsa: fm801: add error handling for snd_ctl_add (bsc#1051510).
- alsa: usb-audio: Apply rate limit to warning messages in URB complete callback (bsc#1051510).
- arm64: Correct type for PUD macros (bsc#1103723).
- arm64: Disable unhandled signal log messages by default (bsc#1103724).
- arm64: kvm: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1103725).
- arm64: mm: Fix set_memory_valid() declaration (bsc#1103726).
- arm64: perf: correct PMUVer probing (bsc#1103727).
- arm64: ptrace: Avoid setting compat FPR to garbage if get_user fails (bsc#1103728).
- arm64: spinlock: Fix theoretical trylock() A-B-A with LSE atomics (bsc#1103729).
- arm64: vdso: fix clock_getres for 4GiB-aligned res (bsc#1103730).
- arm: 8715/1: add a private asm/unaligned.h (bsc#1051510).
- arm: 8720/1: ensure dump_instr() checks addr_limit (bsc#1051510).
- arm: 8721/1: mm: dump: check hardware RO bit for LPAE (bsc#1051510).
- arm: 8722/1: mm: make STRICT_KERNEL_RWX effective for LPAE (bsc#1051510).
- arm: 8731/1: Fix csum_partial_copy_from_user() stack mismatch (bsc#1051510).
- arm: 8743/1: bL_switcher: add MODULE_LICENSE tag (bsc#1051510).
- arm: 8746/1: vfp: Go back to clearing vfp_current_hw_state[] (bsc#1051510).
- arm: 8748/1: mm: Define vdso_start, vdso_end as array (bsc#1051510).
- arm: 8753/1: decompressor: add a missing parameter to the addruart macro (bsc#1051510).
- arm: 8758/1: decompressor: restore r1 and r2 just before jumping to the kernel (bsc#1051510).
- arm: 8764/1: kgdb: fix NUMREGBYTES so that gdb_regs[] is the correct size (bsc#1051510).
- arm: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed (bsc#1051510).
- arm: 8770/1: kprobes: Prohibit probing on optimized_callback (bsc#1051510).
- arm: 8771/1: kprobes: Prohibit kprobes on do_undefinstr (bsc#1051510).
- arm: 8772/1: kprobes: Prohibit kprobes on get_user functions (bsc#1051510).
- arm: AM33xx: PRM: Remove am33xx_pwrdm_read_prev_pwrst function (bsc#1051510).
- arm: amba: Fix race condition with driver_override (bsc#1051510).
- arm: amba: Fix wrong indentation in driver_override_store() (bsc#1051510).
- arm: amba: Make driver_override output consistent with other buses (bsc#1051510).
- arm: at91: do not select CONFIG_ARM_CPU_SUSPEND for old platforms (bsc#1051510).
- arm: avoid faulting on qemu (bsc#1051510).
- arm: BUG if jumping to usermode address in kernel mode (bsc#1051510).
- arm-ccn: perf: Prevent module unload while PMU is in use (bsc#1051510).
- arm: davinci: Add dma_mask to dm365's eDMA device (bsc#1051510).
- arm: davinci: board-da830-evm: fix GPIO lookup for MMC/SD (bsc#1051510).
- arm: davinci: board-da850-evm: fix GPIO lookup for MMC/SD (bsc#1051510).
- arm: davinci: board-da850-evm: fix WP pin polarity for MMC/SD (bsc#1051510).
- arm: davinci: board-dm355-evm: fix broken networking (bsc#1051510).
- arm: davinci: board-dm646x-evm: pass correct I2C adapter id for VPIF (bsc#1051510).
- arm: davinci: board-dm646x-evm: set VPIF capture card name (bsc#1051510).
- arm: davinci: board-omapl138-hawk: fix GPIO numbers for MMC/SD lookup (bsc#1051510).
- arm: davinci: dm646x: fix timer interrupt generation (bsc#1051510).
- arm: davinci: fix mmc entries in dm365's dma_slave_map (bsc#1051510).
- arm: davinci: fix the GPIO lookup for omapl138-hawk (bsc#1051510).
- arm: davinci: Use platform_device_register_full() to create pdev for dm365's eDMA (bsc#1051510).
- arm: DRA722: remove redundant definition of 1.0 device (bsc#1051510).
- arm: fix return value of parse_cpu_capacity (bsc#1051510).
- arm: kexec: fix failure to boot crash kernel (bsc#1051510).
- arm: kexec: fix kdump register saving on panic() (bsc#1051510).
- arm: keystone: fix platform_domain_notifier array overrun (bsc#1051510).
- arm: kvm: fix building with gcc-8 (bsc#1051510).
- arm: multi_v7_defconfig: Replace DRM_RCAR_HDMI by generic bridge options (bsc#1051510).
- arm: multi_v7_defconfig: Replace SND_SOC_RSRC_CARD by SND_SIMPLE_SCU_CARD (bsc#1051510).
- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bsc#1051510).
- arm: OMAP1: clock: Fix debugfs_create_*() usage (bsc#1051510).
- arm: OMAP2+: Fix SRAM virt to phys translation for save_secure_ram_context (bsc#1051510).
- arm: omap2: hide omap3_save_secure_ram on non-OMAP3 builds (bsc#1051510).
- arm: OMAP2+: omap_device: drop broken RPM status update from suspend_noirq (bsc#1051510).
- arm: OMAP2+: powerdomain: use raw_smp_processor_id() for trace (bsc#1051510).
- arm: OMAP2+: timer: fix a kmemleak caused in omap_get_timer_dt (bsc#1051510).
- arm: OMAP3: Fix prm wake interrupt for resume (bsc#1051510).
- arm: OMAP3: hwmod_data: add missing module_offs for MMC3 (bsc#1051510).
- arm: OMAP3+: PRM: fix of_irq_get() result check (bsc#1051510).
- arm: OMAP4+: PRM: fix of_irq_get() result checks (bsc#1051510).
- arm: OMAP: Fix dmtimer init for omap1 (bsc#1051510).
- arm: OMAP: Fix SRAM W+X mapping (bsc#1051510).
- arm: orion5x: Revert commit 4904dbda41c8 (bsc#1051510).
- arm: orion: fix orion_ge00_switch_board_info initialization (bsc#1051510).
- arm: pxa: select both FB and FB_W100 for eseries (bsc#1051510).
- arm: pxa/tosa-bt: add MODULE_LICENSE tag (bsc#1051510).
- arm: remove wrong CONFIG_PROC_SYSCTL ifdef (bsc#1051510).
- arm: s3c24xx: Fix NAND ECC mode for mini2440 board (bsc#1051510).
- arm: shmobile: defconfig: Enable missing PCIE_RCAR dependency (bsc#1051510).
- arm: shmobile: defconfig: Replace DRM_RCAR_HDMI by generic bridge options (bsc#1051510).
- arm: shmobile: defconfig: Replace SND_SOC_RSRC_CARD by SND_SIMPLE_SCU_CARD (bsc#1051510).
- arm: shmobile: defconfig: Replace USB_XHCI_RCAR by USB_XHCI_PLATFORM (bsc#1051510).
- arm: shmobile: rcar-gen2: Fix deadlock in regulator quirk (bsc#1051510).
- arm: socfpga_defconfig: Remove QSPI Sector 4K size force (bsc#1051510).
- arm: spear13xx: Fix dmas cells (bsc#1051510).
- arm: sunxi_defconfig: Enable CMA (bsc#1051510).
- arm: sunxi: fix the core number of V3s in sunxi README (bsc#1051510).
- asoc: dpcm: fix BE dai not hw_free and shutdown (bsc#1051510).
- asoc: topology: Add missing clock gating parameter when parsing hw_configs (bsc#1051510).
- asoc: topology: Fix bclk and fsync inversion in set_link_hw_format() (bsc#1051510).
- ata: do not schedule hot plug if it is a sas host ().
- ath: Add regulatory mapping for APL13_WORLD (bsc#1051510).
- ath: Add regulatory mapping for APL2_FCCA (bsc#1051510).
- ath: Add regulatory mapping for Bahamas (bsc#1051510).
- ath: Add regulatory mapping for Bermuda (bsc#1051510).
- ath: Add regulatory mapping for ETSI8_WORLD (bsc#1051510).
- ath: Add regulatory mapping for FCC3_ETSIC (bsc#1051510).
- ath: Add regulatory mapping for Serbia (bsc#1051510).
- ath: Add regulatory mapping for Tanzania (bsc#1051510).
- ath: Add regulatory mapping for Uganda (bsc#1051510).
- audit: fix potential null dereference 'context->module.name' (bsc#1051510).
- backlight: pwm_bl: Do not use GPIOF_* with gpiod_get_direction (bsc#1051510).
- bdi: Move cgroup bdi_writeback to a dedicated low concurrency workqueue (bsc#1101867).
- befs_lookup(): use d_splice_alias() (bsc#1101844).
- block: Fix transfer when chunk sectors exceeds max (bsc#1101874).
- bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bsc#1051510).
- bluetooth: btusb: add ID for LiteOn 04ca:301a (bsc#1051510).
- bluetooth: hci_qca: Fix 'Sleep inside atomic section' warning (bsc#1051510).
- branch-check: fix long->int truncation when profiling branches (bsc#1101116,).
- brcmfmac: Add support for bcm43364 wireless chipset (bsc#1051510).
- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).
- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).
- cachefiles: Wait rather than BUG'ing on 'Unexpected object collision' (bsc#1099858).
- can: dev: increase bus-off message severity (bsc#1051510).
- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bsc#1051510).
- can: m_can: change comparison to bitshift when dealing with a mask (bsc#1051510).
- cdrom: do not call check_disk_change() inside cdrom_open() (bsc#1101872).
- clk: at91: fix clk-generated compilation (bsc#1051510).
- clk: renesas: cpg-mssr: Stop using printk format %pCr (bsc#1051510).
- coccinelle: fix parallel build with CHECK=scripts/coccicheck (bsc#1051510).
- compiler.h: enable builtin overflow checkers and add fallback code (bsc#1101116,).
- cpufreq: intel_pstate: Limit the scope of HWP dynamic boost platforms (bsc#1066110).
- cpu/hotplug: Make bringup/teardown of smp threads symmetric (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- crypto: authenc - do not leak pointers to authenc keys (bsc#1051510).
- crypto: authencesn - do not leak pointers to authenc keys (bsc#1051510).
- crypto: padlock-aes - Fix Nano workaround data corruption (bsc#1051510).
- delayacct: fix crash in delayacct_blkio_end() after delayacct init failure (bsc#1104066).
- dm: add writecache target (bsc#1101116,).
- dm: prevent DAX mounts if not supported (bsc#1103917).
- dm writecache: support optional offset for start of device (bsc#1101116,).
- dm writecache: use 2-factor allocator arguments (bsc#1101116,).
- doc: Add vendor prefix for Kieback & Peter GmbH (bsc#1051510).
- drivers: soc: sunxi: fix error processing on base address when claiming (bsc#1051510).
- drm: Add DP PSR2 sink enable bit (bsc#1051510).
- drm/amdgpu: Remove VRAM from shared bo domains (bsc#1051510).
- drm/atomic: Check old_plane_state->crtc in drm_atomic_helper_async_check() (bsc#1051510).
- drm/atomic: Handling the case when setting old crtc for plane (bsc#1051510).
- drm/atomic-helper: Drop plane->fb references only for drm_atomic_helper_shutdown() (bsc#1051510).
- drm/atomic: Initialize variables in drm_atomic_helper_async_check() to make gcc happy (bsc#1051510).
- drm/atomic: Make async plane update checks work as intended, v2 (bsc#1051510).
- drm/atomic: Make atomic helper track newly assigned planes correctly, v2 (bsc#1051510).
- drm/atomic: Make atomic iterators less surprising (bsc#1051510).
- drm/dp/mst: Fix off-by-one typo when dump payload table (bsc#1051510).
- drm/gma500: fix psb_intel_lvds_mode_valid()'s return type (bsc#1051510).
- drm/nouveau/fifo/gk104-: poll for runlist update completion (bsc#1051510).
- drm/radeon: fix mode_valid's return type (bsc#1051510).
- drm: re-enable error handling (bsc#1051510).
- drm/vc4: Reset ->{x, y}_scaling[1] when dealing with uniplanar formats (bsc#1051510).
- Enable / support pinctrl-lewisburg ()
- ext2: fix a block leak (bsc#1101875).
- ext4: add more mount time checks of the superblock (bsc#1101900).
- ext4: bubble errors from ext4_find_inline_data_nolock() up to ext4_iget() (bsc#1101896).
- ext4: check superblock mapped prior to committing (bsc#1101902).
- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).
- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix fencepost error in check for inode count overflow during resize (bsc#1101853).
- ext4: include the illegal physical block in the bad map ext4_error msg (bsc#1101903).
- ext4: report delalloc reserve as non-free in statfs for project quota (bsc#1101843).
- ext4: update mtime in ext4_punch_hole even if no blocks are released (bsc#1101895).
- f2fs: call unlock_new_inode() before d_instantiate() (bsc#1101837).
- fix io_destroy()/aio_complete() race (bsc#1101852).
- Force log to disk before reading the AGF during a fstrim (bsc#1101893).
- fs: allow per-device dax status checking for filesystems (bsc#1103917).
- fscache: Allow cancelled operations to be enqueued (bsc#1099858).
- fscache: Fix hanging wait on page discarded by writeback (bsc#1101885).
- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).
- fs: clear writeback errors in inode_init_always (bsc#1101882).
- fs: do not scan the inode cache before SB_BORN is set (bsc#1101883).
- genirq: Check __free_irq() return value for NULL (bsc#1103517).
- hid: hid-plantronics: Re-resend Update to map button for PTT products (bsc#1051510).
- hid: i2c-hid: check if device is there before really probing (bsc#1051510).
- hippi: Fix a Fix a possible sleep-in-atomic bug in rr_close (bsc#1051510).
- hv_netvsc: Ensure correct teardown message sequence order ().
- hv/netvsc: fix handling of fallback to single queue mode ().
- hv_netvsc: Fix net device attach on older Windows hosts ().
- hv_netvsc: set master device (bsc#1051979).
- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() ().
- hv_netvsc: split sub-channel setup into async and sync ().
- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown ().
- ibmasm: do not write out of bounds in read handler (bsc#1051510).
- ibmvnic: Remove code to request error information (bsc#1104174).
- ibmvnic: Revise RX/TX queue error messages (bsc#1101331).
- ibmvnic: Update firmware error reporting with cause string (bsc#1104174).
- input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bsc#1051510).
- input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bsc#1051510).
- input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bsc#1051510).
- irqchip: brcmstb-l2: Define an irq_pm_shutdown function (bsc#1051510).
- irqchip/gic: Take lock when updating irq type (bsc#1051510).
- irqchip/gic-v3: Change pr_debug message to pr_devel (bsc#1051510).
- irqchip/gic-v3: Fix the driver probe() fail due to disabled GICC entry (bsc#1051510).
- irqchip/gic-v3: Ignore disabled ITS nodes (bsc#1051510).
- irqchip/gic-v3: Use wmb() instead of smb_wmb() in gic_raise_softirq() (bsc#1051510).
- irqchip/qcom: Fix check for spurious interrupts (bsc#1051510).
- irqchip/qcom: Fix u32 comparison with value less than zero (bsc#1051510).
- isofs: fix potential memory leak in mount option parsing (bsc#1101887).
- iwlwifi: add more card IDs for 9000 series (bsc#1051510).
- iwlwifi: pcie: fix race in Rx buffer allocator (bsc#1051510).
- jump_label: Fix concurrent static_key_enable/disable() (bsc#1089343).
- jump_label: Provide hotplug context variants (bsc#1089343).
- jump_label: Reorder hotplug lock and jump_label_lock (bsc#1089343).
- kabi protect bdev_dax_supported (bsc#1103917).
- kabi protect struct ccw_device_private (bsc#1103421).
- kabi/severities: do not complain on hisi_sas internal changes ().
- kabi/severities: ignore x86_kvm_ops; lttng-modules would have to be adjusted in case they depend on this particular change
- kbuild: add '-fno-stack-check' to kernel build options (bsc#1051510).
- kbuild: Handle builtin dtb file names containing hyphens (bsc#1051510).
- kbuild: pkg: use --transform option to prefix paths in tar (bsc#1051510).
- kconfig: display recursive dependency resolution hint just once (bsc#1051510).
- kmemleak: add scheduling point to kmemleak_scan() (bsc#1051510).
- kvm: SVM: Add pause filter threshold ().
- kvm: SVM: Implement pause loop exit logic in SVM ().
- kvm: VMX: Bring the common code to header file ().
- kvm: VMX: Fix the module parameters for vmx ().
- kvm: VMX: Remove ple_window_actual_max ().
- libata: add refcounting to ata_host (git-fixes).
- libata: ensure host is free'd on error exit paths (git-fixes).
- libnvdimm, dimm: fix dpa reservation vs uninitialized label area (git-fixes).
- linvdimm, pmem: Preserve read-only setting for pmem devices (git-fixes).
- media: media-device: fix ioctl function types (bsc#1051510).
- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bsc#1051510).
- media: saa7164: Fix driver name in debug output (bsc#1051510).
- media: si470x: fix __be16 annotations (bsc#1051510).
- media: siano: get rid of __le32/__le16 cast warnings (bsc#1051510).
- media: tw686x: Fix incorrect vb2_mem_ops GFP flags (bsc#1051510).
- mfd: cros_ec: Fail early if we cannot identify the EC (bsc#1051510).
- mfd: fsl-imx25: Clean up irq settings during removal (bsc#1051510).
- mfd: mxs-lradc: Fix error handling in mxs_lradc_probe() (bsc#1051510).
- misc: pci_endpoint_test: Avoid triggering a BUG() (bsc#1051510).
- mmc: dw_mmc: update actual clock for mmc debugfs (bsc#1051510).
- mmc: pwrseq: Use kmalloc_array instead of stack VLA (bsc#1051510).
- mm: fix __gup_device_huge vs unmap (bsc#1101839).
- mm/kmemleak.c: make cond_resched() rate-limiting more efficient (bsc#1051510).
- mwifiex: correct histogram data with appropriate index (bsc#1051510).
- mwifiex: handle race during mwifiex_usb_disconnect (bsc#1051510).
- nohz: Fix local_timer_softirq_pending() (bsc#1051510).
- nvme: ensure forward progress during Admin passthru (git-fixes).
- nvme-fabrics: Ignore nr_io_queues option for discovery controllers (bsc#1102633).
- nvme: fixup crash on failed discovery (bsc#1103920).
- nvme.h: fixup ANA group descriptor format (bsc#1104111).
- nvme: use hw qid in trace events (bsc#1102633).
- orangefs: report attributes_mask and attributes for statx (bsc#1101832).
- orangefs: set i_size on new symlink (bsc#1101845).
- overflow.h: Add allocation size calculation helpers (bsc#1101116,).
- pci: pciehp: Assume NoCompl+ for Thunderbolt ports (bsc#1051510).
- pci: pciehp: Request control of native hotplug only if supported (bsc#1051510).
- pci: Prevent sysfs disable of device while driver is attached (bsc#1051510).
- pinctrl: at91-pio4: add missing of_node_put (bsc#1051510).
- pinctrl: intel: Add Intel Lewisburg GPIO support ().
- pinctrl: nand: meson-gxl: fix missing data pins (bsc#1051510).
- pmem: only set QUEUE_FLAG_DAX for fsdax mode (bsc#1103917).
- qed*: Add link change count value to ethtool statistics display (bsc#1086314).
- qed: Add qed APIs for PHY module query (bsc#1086314 ).
- qed: Add srq core support for RoCE and iWARP (bsc#1086314 ).
- qede: Add driver callbacks for eeprom module query (bsc#1086314 ).
- qed: fix spelling mistake 'successffuly' -> 'successfully' (bsc#1086314).
- qed: Make some functions static (bsc#1086314).
- qed: remove redundant functions qed_get_cm_pq_idx_rl (bsc#1086314).
- qed: remove redundant functions qed_set_gft_event_id_cm_hdr (bsc#1086314).
- qed: remove redundant pointer 'name' (bsc#1086314).
- qed: use dma_zalloc_coherent instead of allocator/memset (bsc#1086314).
- qed*: Utilize FW 8.37.2.0 (bsc#1086314).
- RDMA/qedr: Fix NULL pointer dereference when running over iWARP without RDMA-CM (bsc#1086314).
- RDMA/qedr: fix spelling mistake: 'adrresses' -> 'addresses' (bsc#1086314).
- RDMA/qedr: fix spelling mistake: 'failes' -> 'fails' (bsc#1086314).
- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bsc#1051510).
- reiserfs: fix buffer overflow with long warning messages (bsc#1101847).
- Revert 'drm/nouveau/drm/therm/fan: add a fallback if no fan control is specified in the vbios' (bsc#1103356).
- s390/cio: clear timer when terminating driver I/O (bsc#1103421).
- s390/cio: fix return code after missing interrupt (bsc#1103421).
- s390/dasd: fix handling of internal requests (bsc#1103421).
- s390/dasd: fix wrongly assigned configuration data (bsc#1103421).
- s390/dasd: prevent prefix I/O error (bsc#1103421).
- s390/eadm: fix CONFIG_BLOCK include dependency (bsc#1103421).
- s390/ipl: ensure loadparm valid flag is set (bsc#1103421).
- s390/pci: do not require AIS facility (bsc#1103421).
- s390/qdio: do not release memory in qdio_setup_irq() (bsc#1103421).
- sc16is7xx: Check for an error when the clock is enabled (bsc#1051510).
- sched/fair: Consider RT/IRQ pressure in capacity_spare_wake() (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Fix find_idlest_group() when local group is not allowed (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Fix usage of find_idlest_group() when no groups are allowed (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Fix usage of find_idlest_group() when the local group is idlest (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Move select_task_rq_fair() slow-path into its own function (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Remove impossible condition from find_idlest_group_cpu() (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Remove unnecessary comparison with -1 (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Spare idle load balancing on nohz_full CPUs (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Use 'unsigned long' for utilization, consistently (bnc#1101669 optimise numa balancing for fast migrate).
- sched/smt: Update sched_smt_present at runtime (bsc#1089343).
- scsi: ata: enhance the definition of SET MAX feature field value ().
- scsi: hisi_sas: add an mechanism to do reset work synchronously ().
- scsi: hisi_sas: add check of device in hisi_sas_task_exec() ().
- scsi: hisi_sas: add internal abort dev in some places ().
- scsi: hisi_sas: Add LED feature for v3 hw ().
- scsi: hisi_sas: add RAS feature for v3 hw ().
- scsi: hisi_sas: add readl poll timeout helper wrappers ().
- scsi: hisi_sas: Add some checks to avoid free'ing a sas_task twice ().
- scsi: hisi_sas: add some print to enhance debugging ().
- scsi: hisi_sas: Add v2 hw force PHY function for internal ATA command ().
- scsi: hisi_sas: add v2 hw port AXI error handling support ().
- scsi: hisi_sas: add v3 hw MODULE_DEVICE_TABLE() ().
- scsi: hisi_sas: add v3 hw suspend and resume ().
- scsi: hisi_sas: allocate slot buffer earlier ().
- scsi: hisi_sas: Change common allocation mode of device id ().
- scsi: hisi_sas: Change frame type for SET MAX commands ().
- scsi: hisi_sas: change ncq process for v3 hw ().
- scsi: hisi_sas: change slot index allocation mode ().
- scsi: hisi_sas: check host frozen before calling 'done' function ().
- scsi: hisi_sas: check IPTT is valid before using it for v3 hw ().
- scsi: hisi_sas: check sas_dev gone earlier in hisi_sas_abort_task() ().
- scsi: hisi_sas: Code cleanup and minor bug fixes ().
- scsi: hisi_sas: config ATA de-reset as an constrained command for v3 hw ().
- scsi: hisi_sas: consolidate command check in hisi_sas_get_ata_protocol() ().
- scsi: hisi_sas: Create a scsi_host_template per HW module ().
- scsi: hisi_sas: delete timer when removing hisi_sas driver ().
- scsi: hisi_sas: do link reset for some CHL_INT2 ints ().
- scsi: hisi_sas: Do not lock DQ for complete task sending ().
- scsi: hisi_sas: dt-bindings: add an property of signal attenuation ().
- scsi: hisi_sas: fix a bug in hisi_sas_dev_gone() ().
- scsi: hisi_sas: fix a typo in hisi_sas_task_prep() ().
- scsi: hisi_sas: fix dma_unmap_sg() parameter ().
- scsi: hisi_sas: fix PI memory size ().
- scsi: hisi_sas: fix return value of hisi_sas_task_prep() ().
- scsi: hisi_sas: Fix return value when get_free_slot() failed ().
- scsi: hisi_sas: fix SAS_QUEUE_FULL problem while running IO ().
- scsi: hisi_sas: fix the issue of link rate inconsistency ().
- scsi: hisi_sas: fix the issue of setting linkrate register ().
- scsi: hisi_sas: improve int_chnl_int_v2_hw() consistency with v3 hw ().
- scsi: hisi_sas: Include TMF elements in struct hisi_sas_slot ().
- scsi: hisi_sas: increase timer expire of internal abort task ().
- scsi: hisi_sas: Init disks after controller reset ().
- scsi: hisi_sas: initialize dq spinlock before use ().
- scsi: hisi_sas: Introduce hisi_sas_phy_set_linkrate() ().
- scsi: hisi_sas: judge result of internal abort ().
- scsi: hisi_sas: make local symbol host_attrs static ().
- scsi: hisi_sas: make return type of prep functions void ().
- scsi: hisi_sas: make SAS address of SATA disks unique ().
- scsi: hisi_sas: Mark PHY as in reset for nexus reset ().
- scsi: hisi_sas: modify hisi_sas_dev_gone() for reset ().
- scsi: hisi_sas: modify some register config for hip08 ().
- scsi: hisi_sas: optimise port id refresh function ().
- scsi: hisi_sas: optimise the usage of DQ locking ().
- scsi: hisi_sas: print device id for errors ().
- scsi: hisi_sas: re-add the lldd_port_deformed() ().
- scsi: hisi_sas: relocate clearing ITCT and freeing device ().
- scsi: hisi_sas: relocate smp sg map ().
- scsi: hisi_sas: Remove depends on HAS_DMA in case of platform dependency ().
- scsi: hisi_sas: remove redundant handling to event95 for v3 ().
- scsi: hisi_sas: remove some unneeded structure members ().
- scsi: hisi_sas: remove unused variable hisi_sas_devices.running_req ().
- scsi: hisi_sas: Reset disks when discovered ().
- scsi: hisi_sas: some optimizations of host controller reset ().
- scsi: hisi_sas: stop controller timer for reset ().
- scsi: hisi_sas: support the property of signal attenuation for v2 hw ().
- scsi: hisi_sas: Terminate STP reject quickly for v2 hw ().
- scsi: hisi_sas: Try wait commands before before controller reset ().
- scsi: hisi_sas: update PHY linkrate after a controller reset ().
- scsi: hisi_sas: update RAS feature for later revision of v3 HW ().
- scsi: hisi_sas: use an general way to delay PHY work ().
- scsi: hisi_sas: Use device lock to protect slot alloc/free ().
- scsi: hisi_sas: use dma_zalloc_coherent() ().
- scsi: hisi_sas: workaround a v3 hw hilink bug ().
- scsi: libsas: defer ata device eh commands to libata ().
- scsi: lpfc: Add Buffer overflow check, when nvme_info larger than PAGE_SIZE (bsc#1102658).
- scsi: lpfc: Correct LCB ACCept payload (bsc#1102658).
- scsi: lpfc: devloss timeout race condition caused null pointer reference (bsc#1102658).
- scsi: lpfc: Fix abort error path for NVMET (bsc#1102658).
- scsi: lpfc: Fix driver crash when re-registering NVME rports (bsc#1102658).
- scsi: lpfc: Fix driver not setting dpp bits correctly in doorbell word (bsc#1102658).
- scsi: lpfc: Fix ELS abort on SLI-3 adapters (bsc#1102658).
- scsi: lpfc: Fix list corruption on the completion queue (bsc#1102658).
- scsi: lpfc: Fix NVME Target crash in defer rcv logic (bsc#1102658).
- scsi: lpfc: Fix panic if driver unloaded when port is offline (bsc#1102658).
- scsi: lpfc: Fix sysfs Speed value on CNA ports (bsc#1102658).
- scsi: lpfc: Limit tracking of tgt queue depth in fast path (bsc#1102658).
- scsi: lpfc: Make PBDE optimizations configurable (bsc#1102658).
- scsi: lpfc: Remove lpfc_enable_pbde as module parameter (bsc#1102658).
- scsi: lpfc: Revise copyright for new company language (bsc#1102658).
- scsi: lpfc: Support duration field in Link Cable Beacon V1 command (bsc#1102658).
- scsi: lpfc: update driver version to 12.0.0.5 (bsc#1102658).
- scsi: lpfc: update driver version to 12.0.0.6 (bsc#1102658).
- scsi: qla2xxx: Avoid double completion of abort command (git-fixes).
- scsi: qla2xxx: Fix driver unload by shutting down chip (git-fixes).
- scsi: qla2xxx: Fix NPIV deletion by calling wait_for_sess_deletion (git-fixes).
- scsi: qla2xxx: Fix NULL pointer dereference for fcport search (git-fixes).
- scsi: qla2xxx: Fix unintialized List head crash (git-fixes).
- scsi: qla2xxx: Return error when TMF returns (git-fixes).
- scsi: smartpqi: add in new supported controllers (bsc#1086274).
- scsi: smartpqi: add inspur advantech ids (bsc#1086274).
- scsi: smartpqi: bump driver version to 1.1.4-130 (bsc#1086274).
- scsi: smartpqi: fix critical ARM issue reading PQI index registers (bsc#1086274).
- scsi: smartpqi: improve error checking for sync requests (bsc#1086274).
- scsi: smartpqi: improve handling for sync requests (bsc#1086274).
- scsi: smartpqi: update driver version (bsc#1086274).
- scsi: smartpqi: workaround fw bug for oq deletion (bsc#1086274).
- sctp: fix the issue that pathmtu may be set lower than MINSEGMENT (git-fixes).
- sctp: introduce sctp_dst_mtu (git-fixes).
- soc: bcm2835: Make !RASPBERRYPI_FIRMWARE dummies return failure (bsc#1051510).
- soc: bcm: raspberrypi-power: Fix use of __packed (bsc#1051510).
- soc: imx: gpc: de-register power domains only if initialized (bsc#1051510).
- soc: imx: gpc: restrict register range for regmap access (bsc#1051510).
- soc: imx: gpcv2: correct PGC offset (bsc#1051510).
- soc: imx: gpcv2: Do not pass static memory as platform data (bsc#1051510).
- soc: imx: gpcv2: fix regulator deferred probe (bsc#1051510).
- soc: mediatek: pwrap: fix compiler errors (bsc#1051510).
- soc: qcom: wcnss_ctrl: Fix increment in NV upload (bsc#1051510).
- soc: rockchip: power-domain: Fix wrong value when power up pd with writemask (bsc#1051510).
- soc/tegra: Fix bad of_node_put() in powergate init (bsc#1051510).
- soc/tegra: flowctrl: Fix error handling (bsc#1051510).
- soc: ti: ti_sci_pm_domains: Populate name for genpd (bsc#1051510).
- soc: zte: Restrict SOC_ZTE to ARCH_ZX or COMPILE_TEST (bsc#1051510).
- spi: bcm2835aux: ensure interrupts are enabled for shared handler (bsc#1051510).
- spi/bcm63xx-hspi: Enable the clock before calling clk_get_rate() (bsc#1051510).
- spi: bcm-qspi: Always read and set BSPI_MAST_N_BOOT_CTRL (bsc#1051510).
- spi: bcm-qspi: Avoid setting MSPI_CDRAM_PCS for spi-nor master (bsc#1051510).
- spi: cadence: Add usleep_range() for cdns_spi_fill_tx_fifo() (bsc#1051510).
- spi: pxa2xx: Allow 64-bit DMA (bsc#1051510).
- spi: pxa2xx: check clk_prepare_enable() return value (bsc#1051510).
- sr: pass down correctly sized SCSI sense buffer (git-fixes).
- staging: ks7010: Use constants from ieee80211_eid instead of literal ints (bsc#1051510).
- staging: speakup: fix wraparound in uaccess length check (bsc#1051510).
- supported.conf: add drivers/md/dm-writecache
- sysrq : fix Show Regs call trace on ARM (bsc#1051510).
- thermal: exynos: fix setting rising_threshold for Exynos5433 (bsc#1051510).
- tty: Fix data race in tty_insert_flip_string_fixed_flag (bsc#1051510).
- typec: tcpm: Fix a msecs vs jiffies bug (bsc#1100132).
- udf: Detect incorrect directory size (bsc#1101891).
- udf: Provide saner default for invalid uid / gid (bsc#1101890).
- Update config files to add CONFIG_DM_WRITECACHE=m
- Update patches.arch/KVM-PPC-Check-if-IOMMU-page-is-contained-in-the-pinn.patch (bsc#1077761, git-fixes, bsc#1103948, bsc#1103949).
- usb: hub: Do not wait for connect state at resume for powered-off ports (bsc#1051510).
- usbip: usbip_detach: Fix memory, udev context and udev leak (bsc#1051510).
- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).
- virtio_balloon: fix another race between migration and ballooning (bsc#1051510).
- wlcore: sdio: check for valid platform device data before suspend (bsc#1051510).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/KVM/VMX: Add module argument for L1TF mitigation.
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- x86: Treat R_X86_64_PLT32 as R_X86_64_PC32 (binutils_2.31).
- xfs: catch inode allocation state mismatch corruption (bsc#1104211).
- xfs: prevent creating negative-sized file via INSERT_RANGE (bsc#1101833).
Patchnames
SUSE-SLE-Module-Live-Patching-15-2018-1614
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).\n- CVE-2018-5391 aka 'FragmentSmack': A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).\n- CVE-2018-10876: A flaw was found in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image. (bnc#1099811)\n- CVE-2018-10877: The ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image. (bnc#1099846)\n- CVE-2018-10878: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image. (bnc#1099813)\n- CVE-2018-10879: A flaw was found in the ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image. (bnc#1099844)\n- CVE-2018-10880: Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service. (bnc#1099845)\n- CVE-2018-10881: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099864)\n- CVE-2018-10882: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image. (bnc#1099849)\n- CVE-2018-10883: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099863)\n\nThe following non-security bugs were fixed:\n\n- acpi / lpss: Only call pwm_add_table() for Bay Trail PWM if PMIC HRV is 2 (bsc#1051510).\n- af_key: Always verify length of provided sadb_key (bsc#1051510).\n- af_key: fix buffer overread in parse_exthdrs() (bsc#1051510).\n- af_key: fix buffer overread in verify_address_len() (bsc#1051510).\n- afs: Fix directory permissions check (bsc#1101828).\n- agp: uninorth: make two functions static (bsc#1051510).\n- alsa: emu10k1: add error handling for snd_ctl_add (bsc#1051510).\n- alsa: emu10k1: Rate-limit error messages about page errors (bsc#1051510).\n- alsa: fm801: add error handling for snd_ctl_add (bsc#1051510).\n- alsa: usb-audio: Apply rate limit to warning messages in URB complete callback (bsc#1051510).\n- arm64: Correct type for PUD macros (bsc#1103723).\n- arm64: Disable unhandled signal log messages by default (bsc#1103724).\n- arm64: kvm: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1103725).\n- arm64: mm: Fix set_memory_valid() declaration (bsc#1103726).\n- arm64: perf: correct PMUVer probing (bsc#1103727).\n- arm64: ptrace: Avoid setting compat FPR to garbage if get_user fails (bsc#1103728).\n- arm64: spinlock: Fix theoretical trylock() A-B-A with LSE atomics (bsc#1103729).\n- arm64: vdso: fix clock_getres for 4GiB-aligned res (bsc#1103730).\n- arm: 8715/1: add a private asm/unaligned.h (bsc#1051510).\n- arm: 8720/1: ensure dump_instr() checks addr_limit (bsc#1051510).\n- arm: 8721/1: mm: dump: check hardware RO bit for LPAE (bsc#1051510).\n- arm: 8722/1: mm: make STRICT_KERNEL_RWX effective for LPAE (bsc#1051510).\n- arm: 8731/1: Fix csum_partial_copy_from_user() stack mismatch (bsc#1051510).\n- arm: 8743/1: bL_switcher: add MODULE_LICENSE tag (bsc#1051510).\n- arm: 8746/1: vfp: Go back to clearing vfp_current_hw_state[] (bsc#1051510).\n- arm: 8748/1: mm: Define vdso_start, vdso_end as array (bsc#1051510).\n- arm: 8753/1: decompressor: add a missing parameter to the addruart macro (bsc#1051510).\n- arm: 8758/1: decompressor: restore r1 and r2 just before jumping to the kernel (bsc#1051510).\n- arm: 8764/1: kgdb: fix NUMREGBYTES so that gdb_regs[] is the correct size (bsc#1051510).\n- arm: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed (bsc#1051510).\n- arm: 8770/1: kprobes: Prohibit probing on optimized_callback (bsc#1051510).\n- arm: 8771/1: kprobes: Prohibit kprobes on do_undefinstr (bsc#1051510).\n- arm: 8772/1: kprobes: Prohibit kprobes on get_user functions (bsc#1051510).\n- arm: AM33xx: PRM: Remove am33xx_pwrdm_read_prev_pwrst function (bsc#1051510).\n- arm: amba: Fix race condition with driver_override (bsc#1051510).\n- arm: amba: Fix wrong indentation in driver_override_store() (bsc#1051510).\n- arm: amba: Make driver_override output consistent with other buses (bsc#1051510).\n- arm: at91: do not select CONFIG_ARM_CPU_SUSPEND for old platforms (bsc#1051510).\n- arm: avoid faulting on qemu (bsc#1051510).\n- arm: BUG if jumping to usermode address in kernel mode (bsc#1051510).\n- arm-ccn: perf: Prevent module unload while PMU is in use (bsc#1051510).\n- arm: davinci: Add dma_mask to dm365's eDMA device (bsc#1051510).\n- arm: davinci: board-da830-evm: fix GPIO lookup for MMC/SD (bsc#1051510).\n- arm: davinci: board-da850-evm: fix GPIO lookup for MMC/SD (bsc#1051510).\n- arm: davinci: board-da850-evm: fix WP pin polarity for MMC/SD (bsc#1051510).\n- arm: davinci: board-dm355-evm: fix broken networking (bsc#1051510).\n- arm: davinci: board-dm646x-evm: pass correct I2C adapter id for VPIF (bsc#1051510).\n- arm: davinci: board-dm646x-evm: set VPIF capture card name (bsc#1051510).\n- arm: davinci: board-omapl138-hawk: fix GPIO numbers for MMC/SD lookup (bsc#1051510).\n- arm: davinci: dm646x: fix timer interrupt generation (bsc#1051510).\n- arm: davinci: fix mmc entries in dm365's dma_slave_map (bsc#1051510).\n- arm: davinci: fix the GPIO lookup for omapl138-hawk (bsc#1051510).\n- arm: davinci: Use platform_device_register_full() to create pdev for dm365's eDMA (bsc#1051510).\n- arm: DRA722: remove redundant definition of 1.0 device (bsc#1051510).\n- arm: fix return value of parse_cpu_capacity (bsc#1051510).\n- arm: kexec: fix failure to boot crash kernel (bsc#1051510).\n- arm: kexec: fix kdump register saving on panic() (bsc#1051510).\n- arm: keystone: fix platform_domain_notifier array overrun (bsc#1051510).\n- arm: kvm: fix building with gcc-8 (bsc#1051510).\n- arm: multi_v7_defconfig: Replace DRM_RCAR_HDMI by generic bridge options (bsc#1051510).\n- arm: multi_v7_defconfig: Replace SND_SOC_RSRC_CARD by SND_SIMPLE_SCU_CARD (bsc#1051510).\n- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bsc#1051510).\n- arm: OMAP1: clock: Fix debugfs_create_*() usage (bsc#1051510).\n- arm: OMAP2+: Fix SRAM virt to phys translation for save_secure_ram_context (bsc#1051510).\n- arm: omap2: hide omap3_save_secure_ram on non-OMAP3 builds (bsc#1051510).\n- arm: OMAP2+: omap_device: drop broken RPM status update from suspend_noirq (bsc#1051510).\n- arm: OMAP2+: powerdomain: use raw_smp_processor_id() for trace (bsc#1051510).\n- arm: OMAP2+: timer: fix a kmemleak caused in omap_get_timer_dt (bsc#1051510).\n- arm: OMAP3: Fix prm wake interrupt for resume (bsc#1051510).\n- arm: OMAP3: hwmod_data: add missing module_offs for MMC3 (bsc#1051510).\n- arm: OMAP3+: PRM: fix of_irq_get() result check (bsc#1051510).\n- arm: OMAP4+: PRM: fix of_irq_get() result checks (bsc#1051510).\n- arm: OMAP: Fix dmtimer init for omap1 (bsc#1051510).\n- arm: OMAP: Fix SRAM W+X mapping (bsc#1051510).\n- arm: orion5x: Revert commit 4904dbda41c8 (bsc#1051510).\n- arm: orion: fix orion_ge00_switch_board_info initialization (bsc#1051510).\n- arm: pxa: select both FB and FB_W100 for eseries (bsc#1051510).\n- arm: pxa/tosa-bt: add MODULE_LICENSE tag (bsc#1051510).\n- arm: remove wrong CONFIG_PROC_SYSCTL ifdef (bsc#1051510).\n- arm: s3c24xx: Fix NAND ECC mode for mini2440 board (bsc#1051510).\n- arm: shmobile: defconfig: Enable missing PCIE_RCAR dependency (bsc#1051510).\n- arm: shmobile: defconfig: Replace DRM_RCAR_HDMI by generic bridge options (bsc#1051510).\n- arm: shmobile: defconfig: Replace SND_SOC_RSRC_CARD by SND_SIMPLE_SCU_CARD (bsc#1051510).\n- arm: shmobile: defconfig: Replace USB_XHCI_RCAR by USB_XHCI_PLATFORM (bsc#1051510).\n- arm: shmobile: rcar-gen2: Fix deadlock in regulator quirk (bsc#1051510).\n- arm: socfpga_defconfig: Remove QSPI Sector 4K size force (bsc#1051510).\n- arm: spear13xx: Fix dmas cells (bsc#1051510).\n- arm: sunxi_defconfig: Enable CMA (bsc#1051510).\n- arm: sunxi: fix the core number of V3s in sunxi README (bsc#1051510).\n- asoc: dpcm: fix BE dai not hw_free and shutdown (bsc#1051510).\n- asoc: topology: Add missing clock gating parameter when parsing hw_configs (bsc#1051510).\n- asoc: topology: Fix bclk and fsync inversion in set_link_hw_format() (bsc#1051510).\n- ata: do not schedule hot plug if it is a sas host ().\n- ath: Add regulatory mapping for APL13_WORLD (bsc#1051510).\n- ath: Add regulatory mapping for APL2_FCCA (bsc#1051510).\n- ath: Add regulatory mapping for Bahamas (bsc#1051510).\n- ath: Add regulatory mapping for Bermuda (bsc#1051510).\n- ath: Add regulatory mapping for ETSI8_WORLD (bsc#1051510).\n- ath: Add regulatory mapping for FCC3_ETSIC (bsc#1051510).\n- ath: Add regulatory mapping for Serbia (bsc#1051510).\n- ath: Add regulatory mapping for Tanzania (bsc#1051510).\n- ath: Add regulatory mapping for Uganda (bsc#1051510).\n- audit: fix potential null dereference 'context->module.name' (bsc#1051510).\n- backlight: pwm_bl: Do not use GPIOF_* with gpiod_get_direction (bsc#1051510).\n- bdi: Move cgroup bdi_writeback to a dedicated low concurrency workqueue (bsc#1101867).\n- befs_lookup(): use d_splice_alias() (bsc#1101844).\n- block: Fix transfer when chunk sectors exceeds max (bsc#1101874).\n- bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bsc#1051510).\n- bluetooth: btusb: add ID for LiteOn 04ca:301a (bsc#1051510).\n- bluetooth: hci_qca: Fix 'Sleep inside atomic section' warning (bsc#1051510).\n- branch-check: fix long->int truncation when profiling branches (bsc#1101116,).\n- brcmfmac: Add support for bcm43364 wireless chipset (bsc#1051510).\n- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).\n- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).\n- cachefiles: Wait rather than BUG'ing on 'Unexpected object collision' (bsc#1099858).\n- can: dev: increase bus-off message severity (bsc#1051510).\n- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bsc#1051510).\n- can: m_can: change comparison to bitshift when dealing with a mask (bsc#1051510).\n- cdrom: do not call check_disk_change() inside cdrom_open() (bsc#1101872).\n- clk: at91: fix clk-generated compilation (bsc#1051510).\n- clk: renesas: cpg-mssr: Stop using printk format %pCr (bsc#1051510).\n- coccinelle: fix parallel build with CHECK=scripts/coccicheck (bsc#1051510).\n- compiler.h: enable builtin overflow checkers and add fallback code (bsc#1101116,).\n- cpufreq: intel_pstate: Limit the scope of HWP dynamic boost platforms (bsc#1066110).\n- cpu/hotplug: Make bringup/teardown of smp threads symmetric (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- crypto: authenc - do not leak pointers to authenc keys (bsc#1051510).\n- crypto: authencesn - do not leak pointers to authenc keys (bsc#1051510).\n- crypto: padlock-aes - Fix Nano workaround data corruption (bsc#1051510).\n- delayacct: fix crash in delayacct_blkio_end() after delayacct init failure (bsc#1104066).\n- dm: add writecache target (bsc#1101116,).\n- dm: prevent DAX mounts if not supported (bsc#1103917).\n- dm writecache: support optional offset for start of device (bsc#1101116,).\n- dm writecache: use 2-factor allocator arguments (bsc#1101116,).\n- doc: Add vendor prefix for Kieback & Peter GmbH (bsc#1051510).\n- drivers: soc: sunxi: fix error processing on base address when claiming (bsc#1051510).\n- drm: Add DP PSR2 sink enable bit (bsc#1051510).\n- drm/amdgpu: Remove VRAM from shared bo domains (bsc#1051510).\n- drm/atomic: Check old_plane_state->crtc in drm_atomic_helper_async_check() (bsc#1051510).\n- drm/atomic: Handling the case when setting old crtc for plane (bsc#1051510).\n- drm/atomic-helper: Drop plane->fb references only for drm_atomic_helper_shutdown() (bsc#1051510).\n- drm/atomic: Initialize variables in drm_atomic_helper_async_check() to make gcc happy (bsc#1051510).\n- drm/atomic: Make async plane update checks work as intended, v2 (bsc#1051510).\n- drm/atomic: Make atomic helper track newly assigned planes correctly, v2 (bsc#1051510).\n- drm/atomic: Make atomic iterators less surprising (bsc#1051510).\n- drm/dp/mst: Fix off-by-one typo when dump payload table (bsc#1051510).\n- drm/gma500: fix psb_intel_lvds_mode_valid()'s return type (bsc#1051510).\n- drm/nouveau/fifo/gk104-: poll for runlist update completion (bsc#1051510).\n- drm/radeon: fix mode_valid's return type (bsc#1051510).\n- drm: re-enable error handling (bsc#1051510).\n- drm/vc4: Reset ->{x, y}_scaling[1] when dealing with uniplanar formats (bsc#1051510).\n- Enable / support pinctrl-lewisburg ()\n- ext2: fix a block leak (bsc#1101875).\n- ext4: add more mount time checks of the superblock (bsc#1101900).\n- ext4: bubble errors from ext4_find_inline_data_nolock() up to ext4_iget() (bsc#1101896).\n- ext4: check superblock mapped prior to committing (bsc#1101902).\n- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).\n- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).\n- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).\n- ext4: fix fencepost error in check for inode count overflow during resize (bsc#1101853).\n- ext4: include the illegal physical block in the bad map ext4_error msg (bsc#1101903).\n- ext4: report delalloc reserve as non-free in statfs for project quota (bsc#1101843).\n- ext4: update mtime in ext4_punch_hole even if no blocks are released (bsc#1101895).\n- f2fs: call unlock_new_inode() before d_instantiate() (bsc#1101837).\n- fix io_destroy()/aio_complete() race (bsc#1101852).\n- Force log to disk before reading the AGF during a fstrim (bsc#1101893).\n- fs: allow per-device dax status checking for filesystems (bsc#1103917).\n- fscache: Allow cancelled operations to be enqueued (bsc#1099858).\n- fscache: Fix hanging wait on page discarded by writeback (bsc#1101885).\n- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).\n- fs: clear writeback errors in inode_init_always (bsc#1101882).\n- fs: do not scan the inode cache before SB_BORN is set (bsc#1101883).\n- genirq: Check __free_irq() return value for NULL (bsc#1103517).\n- hid: hid-plantronics: Re-resend Update to map button for PTT products (bsc#1051510).\n- hid: i2c-hid: check if device is there before really probing (bsc#1051510).\n- hippi: Fix a Fix a possible sleep-in-atomic bug in rr_close (bsc#1051510).\n- hv_netvsc: Ensure correct teardown message sequence order ().\n- hv/netvsc: fix handling of fallback to single queue mode ().\n- hv_netvsc: Fix net device attach on older Windows hosts ().\n- hv_netvsc: set master device (bsc#1051979).\n- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() ().\n- hv_netvsc: split sub-channel setup into async and sync ().\n- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown ().\n- ibmasm: do not write out of bounds in read handler (bsc#1051510).\n- ibmvnic: Remove code to request error information (bsc#1104174).\n- ibmvnic: Revise RX/TX queue error messages (bsc#1101331).\n- ibmvnic: Update firmware error reporting with cause string (bsc#1104174).\n- input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bsc#1051510).\n- input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bsc#1051510).\n- input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bsc#1051510).\n- irqchip: brcmstb-l2: Define an irq_pm_shutdown function (bsc#1051510).\n- irqchip/gic: Take lock when updating irq type (bsc#1051510).\n- irqchip/gic-v3: Change pr_debug message to pr_devel (bsc#1051510).\n- irqchip/gic-v3: Fix the driver probe() fail due to disabled GICC entry (bsc#1051510).\n- irqchip/gic-v3: Ignore disabled ITS nodes (bsc#1051510).\n- irqchip/gic-v3: Use wmb() instead of smb_wmb() in gic_raise_softirq() (bsc#1051510).\n- irqchip/qcom: Fix check for spurious interrupts (bsc#1051510).\n- irqchip/qcom: Fix u32 comparison with value less than zero (bsc#1051510).\n- isofs: fix potential memory leak in mount option parsing (bsc#1101887).\n- iwlwifi: add more card IDs for 9000 series (bsc#1051510).\n- iwlwifi: pcie: fix race in Rx buffer allocator (bsc#1051510).\n- jump_label: Fix concurrent static_key_enable/disable() (bsc#1089343).\n- jump_label: Provide hotplug context variants (bsc#1089343).\n- jump_label: Reorder hotplug lock and jump_label_lock (bsc#1089343).\n- kabi protect bdev_dax_supported (bsc#1103917).\n- kabi protect struct ccw_device_private (bsc#1103421).\n- kabi/severities: do not complain on hisi_sas internal changes ().\n- kabi/severities: ignore x86_kvm_ops; lttng-modules would have to be adjusted in case they depend on this particular change\n- kbuild: add '-fno-stack-check' to kernel build options (bsc#1051510).\n- kbuild: Handle builtin dtb file names containing hyphens (bsc#1051510).\n- kbuild: pkg: use --transform option to prefix paths in tar (bsc#1051510).\n- kconfig: display recursive dependency resolution hint just once (bsc#1051510).\n- kmemleak: add scheduling point to kmemleak_scan() (bsc#1051510).\n- kvm: SVM: Add pause filter threshold ().\n- kvm: SVM: Implement pause loop exit logic in SVM ().\n- kvm: VMX: Bring the common code to header file ().\n- kvm: VMX: Fix the module parameters for vmx ().\n- kvm: VMX: Remove ple_window_actual_max ().\n- libata: add refcounting to ata_host (git-fixes).\n- libata: ensure host is free'd on error exit paths (git-fixes).\n- libnvdimm, dimm: fix dpa reservation vs uninitialized label area (git-fixes).\n- linvdimm, pmem: Preserve read-only setting for pmem devices (git-fixes).\n- media: media-device: fix ioctl function types (bsc#1051510).\n- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bsc#1051510).\n- media: saa7164: Fix driver name in debug output (bsc#1051510).\n- media: si470x: fix __be16 annotations (bsc#1051510).\n- media: siano: get rid of __le32/__le16 cast warnings (bsc#1051510).\n- media: tw686x: Fix incorrect vb2_mem_ops GFP flags (bsc#1051510).\n- mfd: cros_ec: Fail early if we cannot identify the EC (bsc#1051510).\n- mfd: fsl-imx25: Clean up irq settings during removal (bsc#1051510).\n- mfd: mxs-lradc: Fix error handling in mxs_lradc_probe() (bsc#1051510).\n- misc: pci_endpoint_test: Avoid triggering a BUG() (bsc#1051510).\n- mmc: dw_mmc: update actual clock for mmc debugfs (bsc#1051510).\n- mmc: pwrseq: Use kmalloc_array instead of stack VLA (bsc#1051510).\n- mm: fix __gup_device_huge vs unmap (bsc#1101839).\n- mm/kmemleak.c: make cond_resched() rate-limiting more efficient (bsc#1051510).\n- mwifiex: correct histogram data with appropriate index (bsc#1051510).\n- mwifiex: handle race during mwifiex_usb_disconnect (bsc#1051510).\n- nohz: Fix local_timer_softirq_pending() (bsc#1051510).\n- nvme: ensure forward progress during Admin passthru (git-fixes).\n- nvme-fabrics: Ignore nr_io_queues option for discovery controllers (bsc#1102633).\n- nvme: fixup crash on failed discovery (bsc#1103920).\n- nvme.h: fixup ANA group descriptor format (bsc#1104111).\n- nvme: use hw qid in trace events (bsc#1102633).\n- orangefs: report attributes_mask and attributes for statx (bsc#1101832).\n- orangefs: set i_size on new symlink (bsc#1101845).\n- overflow.h: Add allocation size calculation helpers (bsc#1101116,).\n- pci: pciehp: Assume NoCompl+ for Thunderbolt ports (bsc#1051510).\n- pci: pciehp: Request control of native hotplug only if supported (bsc#1051510).\n- pci: Prevent sysfs disable of device while driver is attached (bsc#1051510).\n- pinctrl: at91-pio4: add missing of_node_put (bsc#1051510).\n- pinctrl: intel: Add Intel Lewisburg GPIO support ().\n- pinctrl: nand: meson-gxl: fix missing data pins (bsc#1051510).\n- pmem: only set QUEUE_FLAG_DAX for fsdax mode (bsc#1103917).\n- qed*: Add link change count value to ethtool statistics display (bsc#1086314).\n- qed: Add qed APIs for PHY module query (bsc#1086314 ).\n- qed: Add srq core support for RoCE and iWARP (bsc#1086314 ).\n- qede: Add driver callbacks for eeprom module query (bsc#1086314 ).\n- qed: fix spelling mistake 'successffuly' -> 'successfully' (bsc#1086314).\n- qed: Make some functions static (bsc#1086314).\n- qed: remove redundant functions qed_get_cm_pq_idx_rl (bsc#1086314).\n- qed: remove redundant functions qed_set_gft_event_id_cm_hdr (bsc#1086314).\n- qed: remove redundant pointer 'name' (bsc#1086314).\n- qed: use dma_zalloc_coherent instead of allocator/memset (bsc#1086314).\n- qed*: Utilize FW 8.37.2.0 (bsc#1086314).\n- RDMA/qedr: Fix NULL pointer dereference when running over iWARP without RDMA-CM (bsc#1086314).\n- RDMA/qedr: fix spelling mistake: 'adrresses' -> 'addresses' (bsc#1086314).\n- RDMA/qedr: fix spelling mistake: 'failes' -> 'fails' (bsc#1086314).\n- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bsc#1051510).\n- reiserfs: fix buffer overflow with long warning messages (bsc#1101847).\n- Revert 'drm/nouveau/drm/therm/fan: add a fallback if no fan control is specified in the vbios' (bsc#1103356).\n- s390/cio: clear timer when terminating driver I/O (bsc#1103421).\n- s390/cio: fix return code after missing interrupt (bsc#1103421).\n- s390/dasd: fix handling of internal requests (bsc#1103421).\n- s390/dasd: fix wrongly assigned configuration data (bsc#1103421).\n- s390/dasd: prevent prefix I/O error (bsc#1103421).\n- s390/eadm: fix CONFIG_BLOCK include dependency (bsc#1103421).\n- s390/ipl: ensure loadparm valid flag is set (bsc#1103421).\n- s390/pci: do not require AIS facility (bsc#1103421).\n- s390/qdio: do not release memory in qdio_setup_irq() (bsc#1103421).\n- sc16is7xx: Check for an error when the clock is enabled (bsc#1051510).\n- sched/fair: Consider RT/IRQ pressure in capacity_spare_wake() (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Fix find_idlest_group() when local group is not allowed (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Fix usage of find_idlest_group() when no groups are allowed (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Fix usage of find_idlest_group() when the local group is idlest (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Move select_task_rq_fair() slow-path into its own function (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Remove impossible condition from find_idlest_group_cpu() (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Remove unnecessary comparison with -1 (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Spare idle load balancing on nohz_full CPUs (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Use 'unsigned long' for utilization, consistently (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/smt: Update sched_smt_present at runtime (bsc#1089343).\n- scsi: ata: enhance the definition of SET MAX feature field value ().\n- scsi: hisi_sas: add an mechanism to do reset work synchronously ().\n- scsi: hisi_sas: add check of device in hisi_sas_task_exec() ().\n- scsi: hisi_sas: add internal abort dev in some places ().\n- scsi: hisi_sas: Add LED feature for v3 hw ().\n- scsi: hisi_sas: add RAS feature for v3 hw ().\n- scsi: hisi_sas: add readl poll timeout helper wrappers ().\n- scsi: hisi_sas: Add some checks to avoid free'ing a sas_task twice ().\n- scsi: hisi_sas: add some print to enhance debugging ().\n- scsi: hisi_sas: Add v2 hw force PHY function for internal ATA command ().\n- scsi: hisi_sas: add v2 hw port AXI error handling support ().\n- scsi: hisi_sas: add v3 hw MODULE_DEVICE_TABLE() ().\n- scsi: hisi_sas: add v3 hw suspend and resume ().\n- scsi: hisi_sas: allocate slot buffer earlier ().\n- scsi: hisi_sas: Change common allocation mode of device id ().\n- scsi: hisi_sas: Change frame type for SET MAX commands ().\n- scsi: hisi_sas: change ncq process for v3 hw ().\n- scsi: hisi_sas: change slot index allocation mode ().\n- scsi: hisi_sas: check host frozen before calling 'done' function ().\n- scsi: hisi_sas: check IPTT is valid before using it for v3 hw ().\n- scsi: hisi_sas: check sas_dev gone earlier in hisi_sas_abort_task() ().\n- scsi: hisi_sas: Code cleanup and minor bug fixes ().\n- scsi: hisi_sas: config ATA de-reset as an constrained command for v3 hw ().\n- scsi: hisi_sas: consolidate command check in hisi_sas_get_ata_protocol() ().\n- scsi: hisi_sas: Create a scsi_host_template per HW module ().\n- scsi: hisi_sas: delete timer when removing hisi_sas driver ().\n- scsi: hisi_sas: do link reset for some CHL_INT2 ints ().\n- scsi: hisi_sas: Do not lock DQ for complete task sending ().\n- scsi: hisi_sas: dt-bindings: add an property of signal attenuation ().\n- scsi: hisi_sas: fix a bug in hisi_sas_dev_gone() ().\n- scsi: hisi_sas: fix a typo in hisi_sas_task_prep() ().\n- scsi: hisi_sas: fix dma_unmap_sg() parameter ().\n- scsi: hisi_sas: fix PI memory size ().\n- scsi: hisi_sas: fix return value of hisi_sas_task_prep() ().\n- scsi: hisi_sas: Fix return value when get_free_slot() failed ().\n- scsi: hisi_sas: fix SAS_QUEUE_FULL problem while running IO ().\n- scsi: hisi_sas: fix the issue of link rate inconsistency ().\n- scsi: hisi_sas: fix the issue of setting linkrate register ().\n- scsi: hisi_sas: improve int_chnl_int_v2_hw() consistency with v3 hw ().\n- scsi: hisi_sas: Include TMF elements in struct hisi_sas_slot ().\n- scsi: hisi_sas: increase timer expire of internal abort task ().\n- scsi: hisi_sas: Init disks after controller reset ().\n- scsi: hisi_sas: initialize dq spinlock before use ().\n- scsi: hisi_sas: Introduce hisi_sas_phy_set_linkrate() ().\n- scsi: hisi_sas: judge result of internal abort ().\n- scsi: hisi_sas: make local symbol host_attrs static ().\n- scsi: hisi_sas: make return type of prep functions void ().\n- scsi: hisi_sas: make SAS address of SATA disks unique ().\n- scsi: hisi_sas: Mark PHY as in reset for nexus reset ().\n- scsi: hisi_sas: modify hisi_sas_dev_gone() for reset ().\n- scsi: hisi_sas: modify some register config for hip08 ().\n- scsi: hisi_sas: optimise port id refresh function ().\n- scsi: hisi_sas: optimise the usage of DQ locking ().\n- scsi: hisi_sas: print device id for errors ().\n- scsi: hisi_sas: re-add the lldd_port_deformed() ().\n- scsi: hisi_sas: relocate clearing ITCT and freeing device ().\n- scsi: hisi_sas: relocate smp sg map ().\n- scsi: hisi_sas: Remove depends on HAS_DMA in case of platform dependency ().\n- scsi: hisi_sas: remove redundant handling to event95 for v3 ().\n- scsi: hisi_sas: remove some unneeded structure members ().\n- scsi: hisi_sas: remove unused variable hisi_sas_devices.running_req ().\n- scsi: hisi_sas: Reset disks when discovered ().\n- scsi: hisi_sas: some optimizations of host controller reset ().\n- scsi: hisi_sas: stop controller timer for reset ().\n- scsi: hisi_sas: support the property of signal attenuation for v2 hw ().\n- scsi: hisi_sas: Terminate STP reject quickly for v2 hw ().\n- scsi: hisi_sas: Try wait commands before before controller reset ().\n- scsi: hisi_sas: update PHY linkrate after a controller reset ().\n- scsi: hisi_sas: update RAS feature for later revision of v3 HW ().\n- scsi: hisi_sas: use an general way to delay PHY work ().\n- scsi: hisi_sas: Use device lock to protect slot alloc/free ().\n- scsi: hisi_sas: use dma_zalloc_coherent() ().\n- scsi: hisi_sas: workaround a v3 hw hilink bug ().\n- scsi: libsas: defer ata device eh commands to libata ().\n- scsi: lpfc: Add Buffer overflow check, when nvme_info larger than PAGE_SIZE (bsc#1102658).\n- scsi: lpfc: Correct LCB ACCept payload (bsc#1102658).\n- scsi: lpfc: devloss timeout race condition caused null pointer reference (bsc#1102658).\n- scsi: lpfc: Fix abort error path for NVMET (bsc#1102658).\n- scsi: lpfc: Fix driver crash when re-registering NVME rports (bsc#1102658).\n- scsi: lpfc: Fix driver not setting dpp bits correctly in doorbell word (bsc#1102658).\n- scsi: lpfc: Fix ELS abort on SLI-3 adapters (bsc#1102658).\n- scsi: lpfc: Fix list corruption on the completion queue (bsc#1102658).\n- scsi: lpfc: Fix NVME Target crash in defer rcv logic (bsc#1102658).\n- scsi: lpfc: Fix panic if driver unloaded when port is offline (bsc#1102658).\n- scsi: lpfc: Fix sysfs Speed value on CNA ports (bsc#1102658).\n- scsi: lpfc: Limit tracking of tgt queue depth in fast path (bsc#1102658).\n- scsi: lpfc: Make PBDE optimizations configurable (bsc#1102658).\n- scsi: lpfc: Remove lpfc_enable_pbde as module parameter (bsc#1102658).\n- scsi: lpfc: Revise copyright for new company language (bsc#1102658).\n- scsi: lpfc: Support duration field in Link Cable Beacon V1 command (bsc#1102658).\n- scsi: lpfc: update driver version to 12.0.0.5 (bsc#1102658).\n- scsi: lpfc: update driver version to 12.0.0.6 (bsc#1102658).\n- scsi: qla2xxx: Avoid double completion of abort command (git-fixes).\n- scsi: qla2xxx: Fix driver unload by shutting down chip (git-fixes).\n- scsi: qla2xxx: Fix NPIV deletion by calling wait_for_sess_deletion (git-fixes).\n- scsi: qla2xxx: Fix NULL pointer dereference for fcport search (git-fixes).\n- scsi: qla2xxx: Fix unintialized List head crash (git-fixes).\n- scsi: qla2xxx: Return error when TMF returns (git-fixes).\n- scsi: smartpqi: add in new supported controllers (bsc#1086274).\n- scsi: smartpqi: add inspur advantech ids (bsc#1086274).\n- scsi: smartpqi: bump driver version to 1.1.4-130 (bsc#1086274).\n- scsi: smartpqi: fix critical ARM issue reading PQI index registers (bsc#1086274).\n- scsi: smartpqi: improve error checking for sync requests (bsc#1086274).\n- scsi: smartpqi: improve handling for sync requests (bsc#1086274).\n- scsi: smartpqi: update driver version (bsc#1086274).\n- scsi: smartpqi: workaround fw bug for oq deletion (bsc#1086274).\n- sctp: fix the issue that pathmtu may be set lower than MINSEGMENT (git-fixes).\n- sctp: introduce sctp_dst_mtu (git-fixes).\n- soc: bcm2835: Make !RASPBERRYPI_FIRMWARE dummies return failure (bsc#1051510).\n- soc: bcm: raspberrypi-power: Fix use of __packed (bsc#1051510).\n- soc: imx: gpc: de-register power domains only if initialized (bsc#1051510).\n- soc: imx: gpc: restrict register range for regmap access (bsc#1051510).\n- soc: imx: gpcv2: correct PGC offset (bsc#1051510).\n- soc: imx: gpcv2: Do not pass static memory as platform data (bsc#1051510).\n- soc: imx: gpcv2: fix regulator deferred probe (bsc#1051510).\n- soc: mediatek: pwrap: fix compiler errors (bsc#1051510).\n- soc: qcom: wcnss_ctrl: Fix increment in NV upload (bsc#1051510).\n- soc: rockchip: power-domain: Fix wrong value when power up pd with writemask (bsc#1051510).\n- soc/tegra: Fix bad of_node_put() in powergate init (bsc#1051510).\n- soc/tegra: flowctrl: Fix error handling (bsc#1051510).\n- soc: ti: ti_sci_pm_domains: Populate name for genpd (bsc#1051510).\n- soc: zte: Restrict SOC_ZTE to ARCH_ZX or COMPILE_TEST (bsc#1051510).\n- spi: bcm2835aux: ensure interrupts are enabled for shared handler (bsc#1051510).\n- spi/bcm63xx-hspi: Enable the clock before calling clk_get_rate() (bsc#1051510).\n- spi: bcm-qspi: Always read and set BSPI_MAST_N_BOOT_CTRL (bsc#1051510).\n- spi: bcm-qspi: Avoid setting MSPI_CDRAM_PCS for spi-nor master (bsc#1051510).\n- spi: cadence: Add usleep_range() for cdns_spi_fill_tx_fifo() (bsc#1051510).\n- spi: pxa2xx: Allow 64-bit DMA (bsc#1051510).\n- spi: pxa2xx: check clk_prepare_enable() return value (bsc#1051510).\n- sr: pass down correctly sized SCSI sense buffer (git-fixes).\n- staging: ks7010: Use constants from ieee80211_eid instead of literal ints (bsc#1051510).\n- staging: speakup: fix wraparound in uaccess length check (bsc#1051510).\n- supported.conf: add drivers/md/dm-writecache\n- sysrq : fix Show Regs call trace on ARM (bsc#1051510).\n- thermal: exynos: fix setting rising_threshold for Exynos5433 (bsc#1051510).\n- tty: Fix data race in tty_insert_flip_string_fixed_flag (bsc#1051510).\n- typec: tcpm: Fix a msecs vs jiffies bug (bsc#1100132).\n- udf: Detect incorrect directory size (bsc#1101891).\n- udf: Provide saner default for invalid uid / gid (bsc#1101890).\n- Update config files to add CONFIG_DM_WRITECACHE=m\n- Update patches.arch/KVM-PPC-Check-if-IOMMU-page-is-contained-in-the-pinn.patch (bsc#1077761, git-fixes, bsc#1103948, bsc#1103949).\n- usb: hub: Do not wait for connect state at resume for powered-off ports (bsc#1051510).\n- usbip: usbip_detach: Fix memory, udev context and udev leak (bsc#1051510).\n- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).\n- virtio_balloon: fix another race between migration and ballooning (bsc#1051510).\n- wlcore: sdio: check for valid platform device data before suspend (bsc#1051510).\n- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).\n- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/KVM/VMX: Add module argument for L1TF mitigation.\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- x86: Treat R_X86_64_PLT32 as R_X86_64_PC32 (binutils_2.31).\n- xfs: catch inode allocation state mismatch corruption (bsc#1104211).\n- xfs: prevent creating negative-sized file via INSERT_RANGE (bsc#1101833).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-Module-Live-Patching-15-2018-1614", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2381-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:2381-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20182381-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:2381-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html", }, { category: "self", summary: "SUSE Bug 1051510", url: "https://bugzilla.suse.com/1051510", }, { category: "self", summary: "SUSE Bug 1051979", url: "https://bugzilla.suse.com/1051979", }, { category: "self", summary: "SUSE Bug 1066110", url: "https://bugzilla.suse.com/1066110", }, { category: "self", summary: "SUSE Bug 1077761", url: "https://bugzilla.suse.com/1077761", }, { category: "self", summary: "SUSE Bug 1086274", url: "https://bugzilla.suse.com/1086274", }, { category: "self", summary: "SUSE Bug 1086314", url: "https://bugzilla.suse.com/1086314", }, { category: "self", summary: "SUSE Bug 1087081", url: "https://bugzilla.suse.com/1087081", }, { category: "self", summary: "SUSE Bug 1089343", url: "https://bugzilla.suse.com/1089343", }, { category: "self", summary: "SUSE Bug 1099811", url: "https://bugzilla.suse.com/1099811", }, { category: "self", summary: "SUSE Bug 1099813", url: "https://bugzilla.suse.com/1099813", }, { category: "self", summary: "SUSE Bug 1099844", url: "https://bugzilla.suse.com/1099844", }, { category: "self", summary: "SUSE Bug 1099845", url: "https://bugzilla.suse.com/1099845", }, { category: "self", summary: "SUSE Bug 1099846", url: "https://bugzilla.suse.com/1099846", }, { category: "self", summary: "SUSE Bug 1099849", url: "https://bugzilla.suse.com/1099849", }, { category: "self", summary: "SUSE Bug 1099858", url: "https://bugzilla.suse.com/1099858", }, { category: "self", summary: "SUSE Bug 1099863", url: "https://bugzilla.suse.com/1099863", }, { category: "self", summary: "SUSE Bug 1099864", url: "https://bugzilla.suse.com/1099864", }, { category: "self", summary: "SUSE Bug 1100132", url: "https://bugzilla.suse.com/1100132", }, { category: "self", summary: "SUSE Bug 1101116", url: "https://bugzilla.suse.com/1101116", }, { category: "self", summary: "SUSE Bug 1101331", url: "https://bugzilla.suse.com/1101331", }, { category: "self", summary: "SUSE Bug 1101669", url: "https://bugzilla.suse.com/1101669", }, { category: "self", summary: "SUSE Bug 1101828", url: "https://bugzilla.suse.com/1101828", }, { category: "self", summary: "SUSE Bug 1101832", url: "https://bugzilla.suse.com/1101832", }, { category: "self", summary: "SUSE Bug 1101833", url: "https://bugzilla.suse.com/1101833", }, { category: "self", summary: "SUSE Bug 1101837", url: "https://bugzilla.suse.com/1101837", }, { category: "self", summary: "SUSE Bug 1101839", url: "https://bugzilla.suse.com/1101839", }, { category: "self", summary: "SUSE Bug 1101841", url: "https://bugzilla.suse.com/1101841", }, { category: "self", summary: "SUSE Bug 1101843", url: "https://bugzilla.suse.com/1101843", }, { category: "self", summary: "SUSE Bug 1101844", url: "https://bugzilla.suse.com/1101844", }, { category: "self", summary: "SUSE Bug 1101845", url: "https://bugzilla.suse.com/1101845", }, { category: "self", summary: "SUSE Bug 1101847", url: "https://bugzilla.suse.com/1101847", }, { category: "self", summary: "SUSE Bug 1101852", url: "https://bugzilla.suse.com/1101852", }, { category: "self", summary: "SUSE Bug 1101853", url: "https://bugzilla.suse.com/1101853", }, { category: "self", summary: "SUSE Bug 1101867", url: "https://bugzilla.suse.com/1101867", }, { category: "self", summary: "SUSE Bug 1101872", url: "https://bugzilla.suse.com/1101872", }, { category: "self", summary: "SUSE Bug 1101874", url: "https://bugzilla.suse.com/1101874", }, { category: "self", summary: "SUSE Bug 1101875", url: "https://bugzilla.suse.com/1101875", }, { category: "self", summary: "SUSE Bug 1101882", url: "https://bugzilla.suse.com/1101882", }, { category: "self", summary: "SUSE Bug 1101883", url: "https://bugzilla.suse.com/1101883", }, { category: "self", summary: "SUSE Bug 1101885", url: "https://bugzilla.suse.com/1101885", }, { category: "self", summary: "SUSE Bug 1101887", url: "https://bugzilla.suse.com/1101887", }, { category: "self", summary: "SUSE Bug 1101890", url: "https://bugzilla.suse.com/1101890", }, { category: "self", summary: "SUSE Bug 1101891", url: "https://bugzilla.suse.com/1101891", }, { category: "self", summary: "SUSE Bug 1101893", url: "https://bugzilla.suse.com/1101893", }, { category: "self", summary: "SUSE Bug 1101895", url: "https://bugzilla.suse.com/1101895", }, { category: "self", summary: "SUSE Bug 1101896", url: "https://bugzilla.suse.com/1101896", }, { category: "self", summary: "SUSE Bug 1101900", url: "https://bugzilla.suse.com/1101900", }, { category: "self", summary: "SUSE Bug 1101902", url: "https://bugzilla.suse.com/1101902", }, { category: "self", summary: "SUSE Bug 1101903", url: "https://bugzilla.suse.com/1101903", }, { category: "self", summary: "SUSE Bug 1102633", url: "https://bugzilla.suse.com/1102633", }, { category: "self", summary: "SUSE Bug 1102658", url: "https://bugzilla.suse.com/1102658", }, { category: "self", summary: "SUSE Bug 1103097", url: "https://bugzilla.suse.com/1103097", }, { category: "self", summary: "SUSE Bug 1103356", url: "https://bugzilla.suse.com/1103356", }, { category: "self", summary: "SUSE Bug 1103421", url: "https://bugzilla.suse.com/1103421", }, { category: "self", summary: "SUSE Bug 1103517", url: "https://bugzilla.suse.com/1103517", }, { category: "self", summary: "SUSE Bug 1103723", url: "https://bugzilla.suse.com/1103723", }, { category: "self", summary: "SUSE Bug 1103724", url: "https://bugzilla.suse.com/1103724", }, { category: "self", summary: "SUSE Bug 1103725", url: "https://bugzilla.suse.com/1103725", }, { category: "self", summary: "SUSE Bug 1103726", url: "https://bugzilla.suse.com/1103726", }, { category: "self", summary: "SUSE Bug 1103727", url: "https://bugzilla.suse.com/1103727", }, { category: "self", summary: "SUSE Bug 1103728", url: "https://bugzilla.suse.com/1103728", }, { category: "self", summary: "SUSE Bug 1103729", url: "https://bugzilla.suse.com/1103729", }, { category: "self", summary: "SUSE Bug 1103730", url: "https://bugzilla.suse.com/1103730", }, { category: "self", summary: "SUSE Bug 1103917", url: "https://bugzilla.suse.com/1103917", }, { category: "self", summary: "SUSE Bug 1103920", url: "https://bugzilla.suse.com/1103920", }, { category: "self", summary: "SUSE Bug 1103948", url: "https://bugzilla.suse.com/1103948", }, { category: "self", summary: "SUSE Bug 1103949", url: "https://bugzilla.suse.com/1103949", }, { category: "self", summary: "SUSE Bug 1104066", url: "https://bugzilla.suse.com/1104066", }, { category: "self", summary: "SUSE Bug 1104111", url: "https://bugzilla.suse.com/1104111", }, { category: "self", summary: "SUSE Bug 1104174", url: "https://bugzilla.suse.com/1104174", }, { category: "self", summary: "SUSE Bug 1104211", url: "https://bugzilla.suse.com/1104211", }, { category: "self", summary: "SUSE Bug 1104319", url: "https://bugzilla.suse.com/1104319", }, { category: "self", summary: "SUSE CVE CVE-2018-10876 page", url: "https://www.suse.com/security/cve/CVE-2018-10876/", }, { category: "self", summary: "SUSE CVE CVE-2018-10877 page", url: "https://www.suse.com/security/cve/CVE-2018-10877/", }, { category: "self", summary: "SUSE CVE CVE-2018-10878 page", url: "https://www.suse.com/security/cve/CVE-2018-10878/", }, { category: "self", summary: "SUSE CVE CVE-2018-10879 page", url: "https://www.suse.com/security/cve/CVE-2018-10879/", }, { category: "self", summary: "SUSE CVE CVE-2018-10880 page", url: "https://www.suse.com/security/cve/CVE-2018-10880/", }, { category: "self", summary: "SUSE CVE CVE-2018-10881 page", url: "https://www.suse.com/security/cve/CVE-2018-10881/", }, { category: "self", summary: "SUSE CVE CVE-2018-10882 page", url: "https://www.suse.com/security/cve/CVE-2018-10882/", }, { category: "self", summary: "SUSE CVE CVE-2018-10883 page", url: "https://www.suse.com/security/cve/CVE-2018-10883/", }, { category: "self", summary: "SUSE CVE CVE-2018-3620 page", url: "https://www.suse.com/security/cve/CVE-2018-3620/", }, { category: "self", summary: "SUSE CVE CVE-2018-3646 page", url: "https://www.suse.com/security/cve/CVE-2018-3646/", }, { category: "self", summary: "SUSE CVE CVE-2018-5391 page", url: "https://www.suse.com/security/cve/CVE-2018-5391/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2018-08-16T12:30:04Z", generator: { date: "2018-08-16T12:30:04Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:2381-1", initial_release_date: "2018-08-16T12:30:04Z", revision_history: [ { date: "2018-08-16T12:30:04Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-default-livepatch-4.12.14-25.13.1.ppc64le", product: { name: "kernel-default-livepatch-4.12.14-25.13.1.ppc64le", product_id: "kernel-default-livepatch-4.12.14-25.13.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-default-livepatch-4.12.14-25.13.1.x86_64", product: { name: "kernel-default-livepatch-4.12.14-25.13.1.x86_64", product_id: "kernel-default-livepatch-4.12.14-25.13.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15", product: { name: "SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-4.12.14-25.13.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", }, product_reference: "kernel-default-livepatch-4.12.14-25.13.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-4.12.14-25.13.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", }, product_reference: "kernel-default-livepatch-4.12.14-25.13.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, ], }, vulnerabilities: [ { cve: "CVE-2018-10876", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10876", }, ], notes: [ { category: "general", text: "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10876", url: "https://www.suse.com/security/cve/CVE-2018-10876", }, { category: "external", summary: "SUSE Bug 1099811 for CVE-2018-10876", url: "https://bugzilla.suse.com/1099811", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-16T12:30:04Z", details: "low", }, ], title: "CVE-2018-10876", }, { cve: "CVE-2018-10877", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10877", }, ], notes: [ { category: "general", text: "Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10877", url: "https://www.suse.com/security/cve/CVE-2018-10877", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10877", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099846 for CVE-2018-10877", url: "https://bugzilla.suse.com/1099846", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-16T12:30:04Z", details: "low", }, ], title: "CVE-2018-10877", }, { cve: "CVE-2018-10878", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10878", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10878", url: "https://www.suse.com/security/cve/CVE-2018-10878", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10878", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099813 for CVE-2018-10878", url: "https://bugzilla.suse.com/1099813", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-16T12:30:04Z", details: "moderate", }, ], title: "CVE-2018-10878", }, { cve: "CVE-2018-10879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10879", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10879", url: "https://www.suse.com/security/cve/CVE-2018-10879", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10879", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099844 for CVE-2018-10879", url: "https://bugzilla.suse.com/1099844", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-16T12:30:04Z", details: "moderate", }, ], title: "CVE-2018-10879", }, { cve: "CVE-2018-10880", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10880", }, ], notes: [ { category: "general", text: "Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10880", url: "https://www.suse.com/security/cve/CVE-2018-10880", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10880", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099845 for CVE-2018-10880", url: "https://bugzilla.suse.com/1099845", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-16T12:30:04Z", details: "moderate", }, ], title: "CVE-2018-10880", }, { cve: "CVE-2018-10881", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10881", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10881", url: "https://www.suse.com/security/cve/CVE-2018-10881", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10881", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099864 for CVE-2018-10881", url: "https://bugzilla.suse.com/1099864", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-16T12:30:04Z", details: "moderate", }, ], title: "CVE-2018-10881", }, { cve: "CVE-2018-10882", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10882", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10882", url: "https://www.suse.com/security/cve/CVE-2018-10882", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10882", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099849 for CVE-2018-10882", url: "https://bugzilla.suse.com/1099849", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-16T12:30:04Z", details: "moderate", }, ], title: "CVE-2018-10882", }, { cve: "CVE-2018-10883", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10883", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10883", url: "https://www.suse.com/security/cve/CVE-2018-10883", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10883", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099863 for CVE-2018-10883", url: "https://bugzilla.suse.com/1099863", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-16T12:30:04Z", details: "moderate", }, ], title: "CVE-2018-10883", }, { cve: "CVE-2018-3620", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3620", }, ], notes: [ { category: "general", text: "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3620", url: "https://www.suse.com/security/cve/CVE-2018-3620", }, { category: "external", summary: "SUSE Bug 1087078 for CVE-2018-3620", url: "https://bugzilla.suse.com/1087078", }, { category: "external", summary: "SUSE Bug 1087081 for CVE-2018-3620", url: "https://bugzilla.suse.com/1087081", }, { category: "external", summary: "SUSE Bug 1089343 for CVE-2018-3620", url: "https://bugzilla.suse.com/1089343", }, { category: "external", summary: "SUSE Bug 1090340 for CVE-2018-3620", url: "https://bugzilla.suse.com/1090340", }, { category: "external", summary: "SUSE Bug 1091107 for CVE-2018-3620", url: "https://bugzilla.suse.com/1091107", }, { category: "external", summary: "SUSE Bug 1099306 for CVE-2018-3620", url: "https://bugzilla.suse.com/1099306", }, { category: "external", summary: "SUSE Bug 1104894 for CVE-2018-3620", url: "https://bugzilla.suse.com/1104894", }, { category: "external", summary: "SUSE Bug 1136865 for CVE-2018-3620", url: "https://bugzilla.suse.com/1136865", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2018-3620", url: "https://bugzilla.suse.com/1201877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-16T12:30:04Z", details: "moderate", }, ], title: "CVE-2018-3620", }, { cve: "CVE-2018-3646", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3646", }, ], notes: [ { category: "general", text: "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3646", url: "https://www.suse.com/security/cve/CVE-2018-3646", }, { category: "external", summary: "SUSE Bug 1087078 for CVE-2018-3646", url: "https://bugzilla.suse.com/1087078", }, { category: "external", summary: "SUSE Bug 1087081 for CVE-2018-3646", url: "https://bugzilla.suse.com/1087081", }, { category: "external", summary: "SUSE Bug 1089343 for CVE-2018-3646", url: "https://bugzilla.suse.com/1089343", }, { category: "external", summary: "SUSE Bug 1091107 for CVE-2018-3646", url: "https://bugzilla.suse.com/1091107", }, { category: "external", summary: "SUSE Bug 1099306 for CVE-2018-3646", url: "https://bugzilla.suse.com/1099306", }, { category: "external", summary: "SUSE Bug 1104365 for CVE-2018-3646", url: "https://bugzilla.suse.com/1104365", }, { category: "external", summary: "SUSE Bug 1104894 for CVE-2018-3646", url: "https://bugzilla.suse.com/1104894", }, { category: "external", summary: "SUSE Bug 1106548 for CVE-2018-3646", url: "https://bugzilla.suse.com/1106548", }, { category: "external", summary: "SUSE Bug 1113534 for CVE-2018-3646", url: "https://bugzilla.suse.com/1113534", }, { category: "external", summary: "SUSE Bug 1136865 for CVE-2018-3646", url: "https://bugzilla.suse.com/1136865", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2018-3646", url: "https://bugzilla.suse.com/1178658", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2018-3646", url: "https://bugzilla.suse.com/1201877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-16T12:30:04Z", details: "important", }, ], title: "CVE-2018-3646", }, { cve: "CVE-2018-5391", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-5391", }, ], notes: [ { category: "general", text: "The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-5391", url: "https://www.suse.com/security/cve/CVE-2018-5391", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-5391", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1102340 for CVE-2018-5391", url: "https://bugzilla.suse.com/1102340", }, { category: "external", summary: "SUSE Bug 1103097 for CVE-2018-5391", url: "https://bugzilla.suse.com/1103097", }, { category: "external", summary: "SUSE Bug 1103098 for CVE-2018-5391", url: "https://bugzilla.suse.com/1103098", }, { category: "external", summary: "SUSE Bug 1108654 for CVE-2018-5391", url: "https://bugzilla.suse.com/1108654", }, { category: "external", summary: "SUSE Bug 1114071 for CVE-2018-5391", url: "https://bugzilla.suse.com/1114071", }, { category: "external", summary: "SUSE Bug 1121102 for CVE-2018-5391", url: "https://bugzilla.suse.com/1121102", }, { category: "external", summary: "SUSE Bug 1134140 for CVE-2018-5391", url: "https://bugzilla.suse.com/1134140", }, { category: "external", summary: "SUSE Bug 1181460 for CVE-2018-5391", url: "https://bugzilla.suse.com/1181460", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-16T12:30:04Z", details: "important", }, ], title: "CVE-2018-5391", }, ], }
suse-su-2018:2450-1
Vulnerability from csaf_suse
Published
2018-08-20 08:36
Modified
2018-08-20 08:36
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-5391: A remote attacker even with relatively low bandwidth could
have caused lots of CPU usage by triggering the worst case scenario during
fragment reassembly (bsc#1103097)
- CVE-2018-3620, CVE-2018-3646: Local attackers in virtualized guest systems
could use speculative code patterns on hyperthreaded processors to read data
present in the L1 Datacache used by other hyperthreads on the same CPU core,
potentially leaking sensitive data, even from other virtual machines or the
host system. (bnc#1089343, bsc#1087081).
- CVE-2018-10882: A local user could have caused an out-of-bound write, leading
to denial of service and a system crash by unmounting a crafted ext4 filesystem
image (bsc#1099849).
- CVE-2018-10880: Prevent a stack-out-of-bounds write in the ext4 filesystem
code when mounting and writing crafted ext4 images. An attacker could have used
this to cause a system crash and a denial of service (bsc#1099845).
- CVE-2018-10881: A local user could have caused an out-of-bound access and a
system crash by mounting and operating on a crafted ext4 filesystem image
(bsc#1099864).
- CVE-2018-10877: Prevent an out-of-bound access in the ext4_ext_drop_refs()
function when operating on a crafted ext4 filesystem image (bsc#1099846).
- CVE-2018-10876: Prevent use-after-free in ext4_ext_remove_space() function
when mounting and operating a crafted ext4 image (bsc#1099811).
- CVE-2018-10878: A local user could have caused an out-of-bounds write and a
denial of service by mounting and operating a crafted ext4 filesystem image
(bsc#1099813).
- CVE-2018-10883: A local user could have caused an out-of-bounds write in
jbd2_journal_dirty_metadata(), a denial of service, and a system crash by
mounting and operating on a crafted ext4 filesystem image (bsc#1099863).
- CVE-2018-10879: A local user could have caused a use-after-free in
ext4_xattr_set_entry function and a denial of service or unspecified other
impact may occur by renaming a file in a crafted ext4 filesystem image
(bsc#1099844).
- CVE-2018-10853: A flaw was found in Linux Kernel KVM. In which certain
instructions such as sgdt/sidt call segmented_write_std doesn't propagate
access correctly. As such, during userspace induced exception, the
guest can incorrectly assume that the exception happened in the kernel
and panic. (bnc#1097104).
The following non-security bugs were fixed:
- apci / lpss: Only call pwm_add_table() for Bay Trail PWM if PMIC HRV is 2 (bsc#1051510).
- acpi / pci: Bail early in acpi_pci_add_bus() if there is no ACPI handle (bsc#1051510).
- af_key: Always verify length of provided sadb_key (bsc#1051510).
- af_key: fix buffer overread in parse_exthdrs() (bsc#1051510).
- af_key: fix buffer overread in verify_address_len() (bsc#1051510).
- afs: Fix directory permissions check (bsc#1101828).
- agp: uninorth: make two functions static (bsc#1051510).
- alsa: emu10k1: add error handling for snd_ctl_add (bsc#1051510).
- alsa: emu10k1: Rate-limit error messages about page errors (bsc#1051510).
- alsa: fm801: add error handling for snd_ctl_add (bsc#1051510).
- alsa: snd-aoa: add of_node_put() in error path (bsc#1051510).
- alsa: usb-audio: Apply rate limit to warning messages in URB complete callback (bsc#1051510).
- arm64: Correct type for PUD macros (bsc#1103723).
- arm64: Disable unhandled signal log messages by default (bsc#1103724).
- arm64: KVM: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1103725).
- arm64: mm: Fix set_memory_valid() declaration (bsc#1103726).
- arm64: perf: correct PMUVer probing (bsc#1103727).
- arm64: ptrace: Avoid setting compat FPR to garbage if get_user fails (bsc#1103728).
- arm64: spinlock: Fix theoretical trylock() A-B-A with LSE atomics (bsc#1103729).
- arm64: vdso: fix clock_getres for 4GiB-aligned res (bsc#1103730).
- arm: 8715/1: add a private asm/unaligned.h (bsc#1051510).
- arm: 8720/1: ensure dump_instr() checks addr_limit (bsc#1051510).
- arm: 8721/1: mm: dump: check hardware RO bit for LPAE (bsc#1051510).
- arm: 8722/1: mm: make STRICT_KERNEL_RWX effective for LPAE (bsc#1051510).
- arm: 8731/1: Fix csum_partial_copy_from_user() stack mismatch (bsc#1051510).
- arm: 8743/1: bL_switcher: add MODULE_LICENSE tag (bsc#1051510).
- arm: 8746/1: vfp: Go back to clearing vfp_current_hw_state[] (bsc#1051510).
- arm: 8748/1: mm: Define vdso_start, vdso_end as array (bsc#1051510).
- arm: 8753/1: decompressor: add a missing parameter to the addruart macro (bsc#1051510).
- arm: 8758/1: decompressor: restore r1 and r2 just before jumping to the kernel (bsc#1051510).
- arm: 8764/1: kgdb: fix NUMREGBYTES so that gdb_regs[] is the correct size (bsc#1051510).
- arm: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed (bsc#1051510).
- arm: 8770/1: kprobes: Prohibit probing on optimized_callback (bsc#1051510).
- arm: 8771/1: kprobes: Prohibit kprobes on do_undefinstr (bsc#1051510).
- arm: 8772/1: kprobes: Prohibit kprobes on get_user functions (bsc#1051510).
- arm: AM33xx: PRM: Remove am33xx_pwrdm_read_prev_pwrst function (bsc#1051510).
- arm: amba: Fix race condition with driver_override (bsc#1051510).
- arm: amba: Fix wrong indentation in driver_override_store() (bsc#1051510).
- arm: amba: Make driver_override output consistent with other buses (bsc#1051510).
- arm: at91: do not select CONFIG_ARM_CPU_SUSPEND for old platforms (bsc#1051510).
- arm: avoid faulting on qemu (bsc#1051510).
- arm: BUG if jumping to usermode address in kernel mode (bsc#1051510).
- arm-ccn: perf: Prevent module unload while PMU is in use (bsc#1051510).
- arm: davinci: Add dma_mask to dm365's eDMA device (bsc#1051510).
- arm: davinci: board-da830-evm: fix GPIO lookup for MMC/SD (bsc#1051510).
- arm: davinci: board-da850-evm: fix GPIO lookup for MMC/SD (bsc#1051510).
- arm: davinci: board-da850-evm: fix WP pin polarity for MMC/SD (bsc#1051510).
- arm: davinci: board-dm355-evm: fix broken networking (bsc#1051510).
- arm: davinci: board-dm646x-evm: pass correct I2C adapter id for VPIF (bsc#1051510).
- arm: davinci: board-dm646x-evm: set VPIF capture card name (bsc#1051510).
- arm: davinci: board-omapl138-hawk: fix GPIO numbers for MMC/SD lookup (bsc#1051510).
- arm: davinci: dm646x: fix timer interrupt generation (bsc#1051510).
- arm: davinci: fix mmc entries in dm365's dma_slave_map (bsc#1051510).
- arm: davinci: fix the GPIO lookup for omapl138-hawk (bsc#1051510).
- arm: davinci: Use platform_device_register_full() to create pdev for dm365's eDMA (bsc#1051510).
- arm: DRA722: remove redundant definition of 1.0 device (bsc#1051510).
- arm: fix return value of parse_cpu_capacity (bsc#1051510).
- arm: kexec: fix failure to boot crash kernel (bsc#1051510).
- arm: kexec: fix kdump register saving on panic() (bsc#1051510).
- arm: keystone: fix platform_domain_notifier array overrun (bsc#1051510).
- arm: kvm: fix building with gcc-8 (bsc#1051510).
- arm: multi_v7_defconfig: Replace DRM_RCAR_HDMI by generic bridge options (bsc#1051510).
- arm: multi_v7_defconfig: Replace SND_SOC_RSRC_CARD by SND_SIMPLE_SCU_CARD (bsc#1051510).
- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bsc#1051510).
- arm: OMAP1: clock: Fix debugfs_create_*() usage (bsc#1051510).
- arm: OMAP2+: Fix SRAM virt to phys translation for save_secure_ram_context (bsc#1051510).
- arm: omap2: hide omap3_save_secure_ram on non-OMAP3 builds (bsc#1051510).
- arm: OMAP2+: omap_device: drop broken RPM status update from suspend_noirq (bsc#1051510).
- arm: OMAP2+: powerdomain: use raw_smp_processor_id() for trace (bsc#1051510).
- arm: OMAP2+: timer: fix a kmemleak caused in omap_get_timer_dt (bsc#1051510).
- arm: OMAP3: Fix prm wake interrupt for resume (bsc#1051510).
- arm: OMAP3: hwmod_data: add missing module_offs for MMC3 (bsc#1051510).
- arm: OMAP3+: PRM: fix of_irq_get() result check (bsc#1051510).
- arm: OMAP4+: PRM: fix of_irq_get() result checks (bsc#1051510).
- arm: OMAP: Fix dmtimer init for omap1 (bsc#1051510).
- arm: OMAP: Fix SRAM W+X mapping (bsc#1051510).
- arm: orion5x: Revert commit 4904dbda41c8 (bsc#1051510).
- arm: orion: fix orion_ge00_switch_board_info initialization (bsc#1051510).
- arm: pxa: select both FB and FB_W100 for eseries (bsc#1051510).
- arm: pxa/tosa-bt: add MODULE_LICENSE tag (bsc#1051510).
- arm: remove wrong CONFIG_PROC_SYSCTL ifdef (bsc#1051510).
- arm: s3c24xx: Fix NAND ECC mode for mini2440 board (bsc#1051510).
- arm: shmobile: defconfig: Enable missing PCIE_RCAR dependency (bsc#1051510).
- arm: shmobile: defconfig: Replace DRM_RCAR_HDMI by generic bridge options (bsc#1051510).
- arm: shmobile: defconfig: Replace SND_SOC_RSRC_CARD by SND_SIMPLE_SCU_CARD (bsc#1051510).
- arm: shmobile: defconfig: Replace USB_XHCI_RCAR by USB_XHCI_PLATFORM (bsc#1051510).
- arm: shmobile: rcar-gen2: Fix deadlock in regulator quirk (bsc#1051510).
- arm: socfpga_defconfig: Remove QSPI Sector 4K size force (bsc#1051510).
- arm: spear13xx: Fix dmas cells (bsc#1051510).
- arm: sunxi_defconfig: Enable CMA (bsc#1051510).
- arm: sunxi: fix the core number of V3s in sunxi README (bsc#1051510).
- asoc: dpcm: do not merge format from invalid codec dai (bsc#1051510).
- ASoC: dpcm: fix BE dai not hw_free and shutdown (bsc#1051510).
- asoc: es7134: remove 64kHz rate from the supported rates (bsc#1051510).
- asoc: rsnd: cmd: Add missing newline to debug message (bsc#1051510).
- asoc: sirf: Fix potential NULL pointer dereference (bsc#1051510).
- asoc: topology: Add missing clock gating parameter when parsing hw_configs (bsc#1051510).
- asoc: topology: Fix bclk and fsync inversion in set_link_hw_format() (bsc#1051510).
- asoc: zte: Fix incorrect PCM format bit usages (bsc#1051510).
- ata: do not schedule hot plug if it is a sas host ().
- ath: Add regulatory mapping for APL13_WORLD (bsc#1051510).
- ath: Add regulatory mapping for APL2_FCCA (bsc#1051510).
- ath: Add regulatory mapping for Bahamas (bsc#1051510).
- ath: Add regulatory mapping for Bermuda (bsc#1051510).
- ath: Add regulatory mapping for ETSI8_WORLD (bsc#1051510).
- ath: Add regulatory mapping for FCC3_ETSIC (bsc#1051510).
- ath: Add regulatory mapping for Serbia (bsc#1051510).
- ath: Add regulatory mapping for Tanzania (bsc#1051510).
- ath: Add regulatory mapping for Uganda (bsc#1051510).
- audit: fix potential null dereference 'context->module.name' (bsc#1051510).
- backlight: pwm_bl: Do not use GPIOF_* with gpiod_get_direction (bsc#1051510).
- bdi: Move cgroup bdi_writeback to a dedicated low concurrency workqueue (bsc#1101867).
- be2net: gather debug info and reset adapter (only for Lancer) on a tx-timeout (bsc#1086288).
- be2net: Update the driver version to 12.0.0.0 (bsc#1086288 ).
- befs_lookup(): use d_splice_alias() (bsc#1101844).
- block: Fix transfer when chunk sectors exceeds max (bsc#1101874).
- Bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bsc#1051510).
- Bluetooth: btusb: add ID for LiteOn 04ca:301a (bsc#1051510).
- Bluetooth: hci_qca: Fix 'Sleep inside atomic section' warning (bsc#1051510).
- bpf, ppc64: fix unexpected r0=0 exit path inside bpf_xadd (bsc#1083647).
- branch-check: fix long->int truncation when profiling branches (bsc#1101116,).
- brcmfmac: Add support for bcm43364 wireless chipset (bsc#1051510).
- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).
- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).
- cachefiles: Wait rather than BUG'ing on 'Unexpected object collision' (bsc#1099858).
- can: dev: increase bus-off message severity (bsc#1051510).
- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bsc#1051510).
- can: m_can: change comparison to bitshift when dealing with a mask (bsc#1051510).
- cdrom: do not call check_disk_change() inside cdrom_open() (bsc#1101872).
- clk: at91: fix clk-generated compilation (bsc#1051510).
- clk: renesas: cpg-mssr: Stop using printk format %pCr (bsc#1051510).
- coccinelle: fix parallel build with CHECK=scripts/coccicheck (bsc#1051510).
- compiler.h: enable builtin overflow checkers and add fallback code (bsc#1101116,).
- cpufreq: intel_pstate: Limit the scope of HWP dynamic boost platforms (bsc#1066110).
- cpu/hotplug: Make bringup/teardown of smp threads symmetric (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- crypto: authenc - do not leak pointers to authenc keys (bsc#1051510).
- crypto: authencesn - do not leak pointers to authenc keys (bsc#1051510).
- crypto: padlock-aes - Fix Nano workaround data corruption (bsc#1051510).
- delayacct: fix crash in delayacct_blkio_end() after delayacct init failure (bsc#1104066).
- Delete patches.suse/0201-dax-dm-allow-device-mapper-to-operate-without-dax-su.patch (bsc#1103917).
- disable PINCTRL_LEWISBURG
- dm: add writecache target (bsc#1101116,).
- dm: prevent DAX mounts if not supported (bsc#1103917).
- dm writecache: support optional offset for start of device (bsc#1101116,).
- dm writecache: use 2-factor allocator arguments (bsc#1101116,).
- doc: Add vendor prefix for Kieback and Peter GmbH (bsc#1051510).
- docs: zh_CN: fix location of oops-tracing.txt (bsc#1051510).
- drivers: soc: sunxi: fix error processing on base address when claiming (bsc#1051510).
- drm: Add DP PSR2 sink enable bit (bsc#1051510).
- drm/amdgpu: Remove VRAM from shared bo domains (bsc#1051510).
- drm/atomic: Check old_plane_state->crtc in drm_atomic_helper_async_check() (bsc#1051510).
- drm/atomic: Handling the case when setting old crtc for plane (bsc#1051510).
- drm/atomic-helper: Drop plane->fb references only for drm_atomic_helper_shutdown() (bsc#1051510).
- drm/atomic: Initialize variables in drm_atomic_helper_async_check() to make gcc happy (bsc#1051510).
- drm/atomic: Make async plane update checks work as intended, v2 (bsc#1051510).
- drm/atomic: Make atomic helper track newly assigned planes correctly, v2 (bsc#1051510).
- drm/atomic: Make atomic iterators less surprising (bsc#1051510).
- drm/cirrus: Use drm_framebuffer_put to avoid kernel oops in clean-up (bsc#1101822).
- drm/dp/mst: Fix off-by-one typo when dump payload table (bsc#1051510).
- drm/gma500: fix psb_intel_lvds_mode_valid()'s return type (bsc#1051510).
- drm/nouveau/fifo/gk104-: poll for runlist update completion (bsc#1051510).
- drm/radeon: fix mode_valid's return type (bsc#1051510).
- drm: re-enable error handling (bsc#1051510).
- drm/vc4: Reset ->{x, y}_scaling[1] when dealing with uniplanar formats (bsc#1051510).
- edac: Add missing MEM_LRDDR4 entry in edac_mem_types[] (bsc#1103886).
- edac, altera: Fix ARM64 build warning (bsc#1051510).
- edac: Drop duplicated array of strings for memory type names (bsc#1103886).
- edac, mv64x60: Fix an error handling path (bsc#1051510).
- edac, octeon: Fix an uninitialized variable warning (bsc#1051510).
- edac, sb_edac: Fix missing break in switch (bsc#1051510).
- ext2: fix a block leak (bsc#1101875).
- ext4: add more mount time checks of the superblock (bsc#1101900).
- ext4: bubble errors from ext4_find_inline_data_nolock() up to ext4_iget() (bsc#1101896).
- ext4: check for allocation block validity with block group locked (bsc#1104495).
- ext4: check superblock mapped prior to committing (bsc#1101902).
- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).
- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).
- ext4: fix fencepost error in check for inode count overflow during resize (bsc#1101853).
- ext4: fix inline data updates with checksums enabled (bsc#1104494).
- ext4: include the illegal physical block in the bad map ext4_error msg (bsc#1101903).
- ext4: report delalloc reserve as non-free in statfs for project quota (bsc#1101843).
- ext4: update mtime in ext4_punch_hole even if no blocks are released (bsc#1101895).
- f2fs: call unlock_new_inode() before d_instantiate() (bsc#1101837).
- fix io_destroy()/aio_complete() race (bsc#1101852).
- Force log to disk before reading the AGF during a fstrim (bsc#1101893).
- fs: allow per-device dax status checking for filesystems (bsc#1103917).
- fscache: Allow cancelled operations to be enqueued (bsc#1099858).
- fscache: Fix hanging wait on page discarded by writeback (bsc#1101885).
- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).
- fs: clear writeback errors in inode_init_always (bsc#1101882).
- fs: do not scan the inode cache before SB_BORN is set (bsc#1101883).
- geneve: update skb dst pmtu on tx path (bsc#1051510).
- genirq: Check __free_irq() return value for NULL (bsc#1103517).
- genirq: Fix editing error in a comment (bsc#1051510).
- genirq: Make force irq threading setup more robust (bsc#1051510).
- gtp: Initialize 64-bit per-cpu stats correctly (bsc#1051510).
- HID: hid-plantronics: Re-resend Update to map button for PTT products (bsc#1051510).
- HID: i2c-hid: check if device is there before really probing (bsc#1051510).
- hippi: Fix a Fix a possible sleep-in-atomic bug in rr_close (bsc#1051510).
- hns3: fix unused function warning (bsc#1104353).
- hns3pf: do not check handle during mqprio offload (bsc#1104353 ).
- hns3pf: fix hns3_del_tunnel_port() (bsc#1104353).
- hns3pf: Fix some harmless copy and paste bugs (bsc#1104353 ).
- hv_netvsc: Ensure correct teardown message sequence order ().
- hv/netvsc: fix handling of fallback to single queue mode ().
- hv_netvsc: Fix napi reschedule while receive completion is busy.
- hv_netvsc: Fix net device attach on older Windows hosts ().
- hv/netvsc: Fix NULL dereference at single queue mode fallback (bsc#1104708).
- hv_netvsc: set master device (bsc#1051979).
- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() ().
- hv_netvsc: split sub-channel setup into async and sync ().
- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown ().
- hwmon: (asus_atk0110) Replace deprecated device register call (bsc#1103363).
- i2c: imx: Fix reinit_completion() use (bsc#1051510).
- IB/hns: Annotate iomem pointers correctly (bsc#1104427 ).
- IB/hns: Avoid compile test under non 64bit environments (bsc#1104427).
- IB/hns: Declare local functions 'static' (bsc#1104427 ).
- IB/hns: fix boolreturn.cocci warnings (bsc#1104427).
- IB/hns: Fix for checkpatch.pl comment style warnings (bsc#1104427).
- IB/hns: fix memory leak on ah on error return path (bsc#1104427 ).
- IB/hns: fix returnvar.cocci warnings (bsc#1104427).
- IB/hns: fix semicolon.cocci warnings (bsc#1104427).
- IB/hns: Fix the bug of polling cq failed for loopback Qps (bsc#1104427).
- IB/hns: Fix the bug with modifying the MAC address without removing the driver (bsc#1104427).
- IB/hns: Fix the bug with rdma operation (bsc#1104427 ).
- IB/hns: Fix the bug with wild pointer when destroy rc qp (bsc#1104427).
- IB/hns: include linux/interrupt.h (bsc#1104427).
- IB/hns: Support compile test for hns RoCE driver (bsc#1104427 ).
- IB/hns: Use zeroing memory allocator instead of allocator/memset (bsc#1104427).
- ibmasm: do not write out of bounds in read handler (bsc#1051510).
- ibmvnic: Remove code to request error information (bsc#1104174).
- ibmvnic: Revise RX/TX queue error messages (bsc#1101331).
- ibmvnic: Update firmware error reporting with cause string (bsc#1104174).
- init: rename and re-order boot_cpu_state_init() (bsc#1104365).
- Input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bsc#1051510).
- Input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bsc#1051510).
- Input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bsc#1051510).
- irqchip: brcmstb-l2: Define an irq_pm_shutdown function (bsc#1051510).
- irqchip/gic: Take lock when updating irq type (bsc#1051510).
- irqchip/gic-v3: Change pr_debug message to pr_devel (bsc#1051510).
- irqchip/gic-v3: Fix the driver probe() fail due to disabled GICC entry (bsc#1051510).
- irqchip/gic-v3: Ignore disabled ITS nodes (bsc#1051510).
- irqchip/gic-v3: Use wmb() instead of smb_wmb() in gic_raise_softirq() (bsc#1051510).
- irqchip/qcom: Fix check for spurious interrupts (bsc#1051510).
- irqchip/qcom: Fix u32 comparison with value less than zero (bsc#1051510).
- isofs: fix potential memory leak in mount option parsing (bsc#1101887).
- iwlwifi: add more card IDs for 9000 series (bsc#1051510).
- iwlwifi: pcie: fix race in Rx buffer allocator (bsc#1051510).
- jump_label: Fix concurrent static_key_enable/disable() (bsc#1089343).
- jump_label: Provide hotplug context variants (bsc#1089343).
- jump_label: Reorder hotplug lock and jump_label_lock (bsc#1089343).
- kabi protect bdev_dax_supported (bsc#1103917).
- kabi protect struct ccw_device_private (bsc#1103421).
- KABI protect structy ata_host (git-fixes).
- kabi/severities: Allow kABI changes for kvm/x86 (except for kvm_x86_ops)
- kabi/severities: do not complain on hisi_sas internal changes ().
- kabi/severities: ignore qla2xxx as all symbols are internal
- kabi/severities: ignore x86_kvm_ops; lttng-modules would have to be adjusted in case they depend on this particular change
- kbuild: add '-fno-stack-check' to kernel build options (bsc#1051510).
- kbuild: Handle builtin dtb file names containing hyphens (bsc#1051510).
- kbuild: pkg: use --transform option to prefix paths in tar (bsc#1051510).
- kconfig: display recursive dependency resolution hint just once (bsc#1051510).
- kmemleak: add scheduling point to kmemleak_scan() (bsc#1051510).
- kthread, tracing: Do not expose half-written comm when creating kthreads (bsc#1104897).
- KVM: SVM: Add pause filter threshold ().
- KVM: SVM: Implement pause loop exit logic in SVM ().
- KVM: VMX: Bring the common code to header file ().
- KVM: VMX: Fix the module parameters for vmx ().
- KVM: VMX: Remove ple_window_actual_max ().
- libata: add refcounting to ata_host (git-fixes).
- libata: ensure host is free'd on error exit paths (git-fixes).
- libnvdimm, dimm: fix dpa reservation vs uninitialized label area (git-fixes).
- linvdimm, pmem: Preserve read-only setting for pmem devices (git-fixes).
- MAINTAINERS: review Renesas DT bindings as well (bsc#1051510).
- media: media-device: fix ioctl function types (bsc#1051510).
- media: omap3isp: fix unbalanced dma_iommu_mapping (bsc#1051510).
- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bsc#1051510).
- media: rc: oops in ir_timer_keyup after device unplug (bsc#1090888).
- media: saa7164: Fix driver name in debug output (bsc#1051510).
- media: si470x: fix __be16 annotations (bsc#1051510).
- media: siano: get rid of __le32/__le16 cast warnings (bsc#1051510).
- media: tw686x: Fix incorrect vb2_mem_ops GFP flags (bsc#1051510).
- media: videobuf2-core: do not call memop 'finish' when queueing (bsc#1051510).
- mfd: cros_ec: Fail early if we cannot identify the EC (bsc#1051510).
- mfd: fsl-imx25: Clean up irq settings during removal (bsc#1051510).
- mfd: mxs-lradc: Fix error handling in mxs_lradc_probe() (bsc#1051510).
- misc: pci_endpoint_test: Avoid triggering a BUG() (bsc#1051510).
- mmc: dw_mmc: update actual clock for mmc debugfs (bsc#1051510).
- mmc: pwrseq: Use kmalloc_array instead of stack VLA (bsc#1051510).
- mm: fix __gup_device_huge vs unmap (bsc#1101839).
- mm/kmemleak.c: make cond_resched() rate-limiting more efficient (bsc#1051510).
- mwifiex: correct histogram data with appropriate index (bsc#1051510).
- mwifiex: handle race during mwifiex_usb_disconnect (bsc#1051510).
- net: hns3: Add a check for client instance init state (bsc#1104353).
- net: hns3: add a mask initialization for mac_vlan table (bsc#1104353).
- net: hns3: Add *Asserting Reset* mailbox message and handling in VF (bsc#1104353).
- net: hns3: add Asym Pause support to phy default features (bsc#1104353).
- net: hns3: Add dcb netlink interface for the support of DCB feature (bsc#1104353).
- net: hns3: Add DCB support when interacting with network stack (bsc#1104353).
- net: hns3: Add ethtool interface for vlan filter (bsc#1104353 ).
- net: hns3: add ethtool_ops.get_channels support for VF (bsc#1104353).
- net: hns3: add ethtool_ops.get_coalesce support to PF (bsc#1104353).
- net: hns3: add ethtool_ops.set_coalesce support to PF (bsc#1104353).
- net: hns3: add ethtool -p support for fiber port (bsc#1104353 ).
- net: hns3: add ethtool related offload command (bsc#1104353 ).
- net: hns3: Add Ethtool support to HNS3 driver (bsc#1104353 ).
- net: hns3: add existence checking before adding unicast mac address (bsc#1104353).
- net: hns3: add existence check when remove old uc mac address (bsc#1104353).
- net: hns3: add feature check when feature changed (bsc#1104353 ).
- net: hns3: add get_link support to VF (bsc#1104353).
- net: hns3: add get/set_coalesce support to VF (bsc#1104353 ).
- net: hns3: add handling vlan tag offload in bd (bsc#1104353 ).
- net: hns3: Add hclge_dcb module for the support of DCB feature (bsc#1104353).
- net: hns3: Add HNS3 Acceleration Engine and Compatibility Layer Support (bsc#1104353).
- net: hns3: Add HNS3 driver to kernel build framework and MAINTAINERS (bsc#1104353).
- net: hns3: Add hns3_get_handle macro in hns3 driver (bsc#1104353 ).
- net: hns3: Add HNS3 IMP(Integrated Mgmt Proc) Cmd Interface Support (bsc#1104353).
- net: hns3: Add HNS3 VF driver to kernel build framework (bsc#1104353).
- net: hns3: Add HNS3 VF HCL(Hardware Compatibility Layer) Support (bsc#1104353).
- net: hns3: Add HNS3 VF IMP(Integrated Management Proc) cmd interface (bsc#1104353).
- net: hns3: add int_gl_idx setup for TX and RX queues (bsc#1104353).
- net: hns3: add int_gl_idx setup for VF (bsc#1104353 ).
- net: hns3: Add mac loopback selftest support in hns3 driver (bsc#1104353).
- net: hns3: Add mailbox interrupt handling to PF driver (bsc#1104353).
- net: hns3: Add mailbox support to PF driver (bsc#1104353 ).
- net: hns3: Add mailbox support to VF driver (bsc#1104353 ).
- net: hns3: add manager table initialization for hardware (bsc#1104353).
- net: hns3: Add MDIO support to HNS3 Ethernet driver for hip08 SoC (bsc#1104353).
- net: hns3: Add missing break in misc_irq_handle (bsc#1104353 ).
- net: hns3: Add more packet size statisctics (bsc#1104353 ).
- net: hns3: add MTU initialization for hardware (bsc#1104353 ).
- net: hns3: add net status led support for fiber port (bsc#1104353).
- net: hns3: add nic_client check when initialize roce base information (bsc#1104353).
- net: hns3: add querying speed and duplex support to VF (bsc#1104353).
- net: hns3: Add repeat address checking for setting mac address (bsc#1104353).
- net: hns3: Add reset interface implementation in client (bsc#1104353).
- net: hns3: Add reset process in hclge_main (bsc#1104353 ).
- net: hns3: Add reset service task for handling reset requests (bsc#1104353).
- net: hns3: add result checking for VF when modify unicast mac address (bsc#1104353).
- net: hns3: Add some interface for the support of DCB feature (bsc#1104353).
- net: hns3: Adds support for led locate command for copper port (bsc#1104353).
- net: hns3: Add STRP_TAGP field support for hardware revision 0x21 (bsc#1104353).
- net: hns3: Add support for dynamically buffer reallocation (bsc#1104353).
- net: hns3: add support for ETHTOOL_GRXFH (bsc#1104353 ).
- net: hns3: add support for get_regs (bsc#1104353).
- net: hns3: Add support for IFF_ALLMULTI flag (bsc#1104353 ).
- net: hns3: Add support for misc interrupt (bsc#1104353 ).
- net: hns3: add support for nway_reset (bsc#1104353).
- net: hns3: Add support for PFC setting in TM module (bsc#1104353 ).
- net: hns3: Add support for port shaper setting in TM module (bsc#1104353).
- net: hns3: add support for querying advertised pause frame by ethtool ethx (bsc#1104353).
- net: hns3: add support for querying pfc puase packets statistic (bsc#1104353).
- net: hns3: add support for set_link_ksettings (bsc#1104353 ).
- net: hns3: add support for set_pauseparam (bsc#1104353 ).
- net: hns3: add support for set_ringparam (bsc#1104353 ).
- net: hns3: add support for set_rxnfc (bsc#1104353).
- net: hns3: Add support for tx_accept_tag2 and tx_accept_untag2 config (bsc#1104353).
- net: hns3: add support for VF driver inner interface hclgevf_ops.get_tqps_and_rss_info (bsc#1104353).
- net: hns3: Add support of hardware rx-vlan-offload to HNS3 VF driver (bsc#1104353).
- net: hns3: Add support of HNS3 Ethernet Driver for hip08 SoC (bsc#1104353).
- net: hns3: Add support of .sriov_configure in HNS3 driver (bsc#1104353).
- net: hns3: Add support of the HNAE3 framework (bsc#1104353 ).
- net: hns3: Add support of TX Scheduler and Shaper to HNS3 driver (bsc#1104353).
- net: hns3: Add support to change MTU in HNS3 hardware (bsc#1104353).
- net: hns3: Add support to enable TX/RX promisc mode for H/W rev(0x21) (bsc#1104353).
- net: hns3: add support to modify tqps number (bsc#1104353 ).
- net: hns3: add support to query tqps number (bsc#1104353 ).
- net: hns3: Add support to re-initialize the hclge device (bsc#1104353).
- net: hns3: Add support to request VF Reset to PF (bsc#1104353 ).
- net: hns3: Add support to reset the enet/ring mgmt layer (bsc#1104353).
- net: hns3: add support to update flow control settings after autoneg (bsc#1104353).
- net: hns3: Add tc-based TM support for sriov enabled port (bsc#1104353).
- net: hns3: Add timeout process in hns3_enet (bsc#1104353 ).
- net: hns3: Add VF Reset device state and its handling (bsc#1104353).
- net: hns3: Add VF Reset Service Task to support event handling (bsc#1104353).
- net: hns3: add vlan offload config command (bsc#1104353 ).
- net: hns3: change GL update rate (bsc#1104353).
- net: hns3: Change PF to add ring-vect binding and resetQ to mailbox (bsc#1104353).
- net: hns3: Change return type of hnae3_register_ae_algo (bsc#1104353).
- net: hns3: Change return type of hnae3_register_ae_dev (bsc#1104353).
- net: hns3: Change return value in hnae3_register_client (bsc#1104353).
- net: hns3: Changes required in PF mailbox to support VF reset (bsc#1104353).
- net: hns3: Changes to make enet watchdog timeout func common for PF/VF (bsc#1104353).
- net: hns3: Changes to support ARQ(Asynchronous Receive Queue) (bsc#1104353).
- net: hns3: change the returned tqp number by ethtool -x (bsc#1104353).
- net: hns3: change the time interval of int_gl calculating (bsc#1104353).
- net: hns3: change the unit of GL value macro (bsc#1104353 ).
- net: hns3: change TM sched mode to TC-based mode when SRIOV enabled (bsc#1104353).
- net: hns3: check for NULL function pointer in hns3_nic_set_features (bsc#1104353).
- net: hns3: Cleanup for endian issue in hns3 driver (bsc#1104353 ).
- net: hns3: Cleanup for non-static function in hns3 driver (bsc#1104353).
- net: hns3: Cleanup for ROCE capability flag in ae_dev (bsc#1104353).
- net: hns3: Cleanup for shifting true in hns3 driver (bsc#1104353 ).
- net: hns3: Cleanup for struct that used to send cmd to firmware (bsc#1104353).
- net: hns3: Cleanup indentation for Kconfig in the the hisilicon folder (bsc#1104353).
- net: hns3: cleanup mac auto-negotiation state query (bsc#1104353 ).
- net: hns3: cleanup mac auto-negotiation state query in hclge_update_speed_duplex (bsc#1104353).
- net: hns3: cleanup of return values in hclge_init_client_instance() (bsc#1104353).
- net: hns3: Clear TX/RX rings when stopping port and un-initializing client (bsc#1104353).
- net: hns3: Consistently using GENMASK in hns3 driver (bsc#1104353).
- net: hns3: converting spaces into tabs to avoid checkpatch.pl warning (bsc#1104353).
- net: hns3: Disable VFs change rxvlan offload status (bsc#1104353 ).
- net: hns3: Disable vf vlan filter when vf vlan table is full (bsc#1104353).
- net: hns3: ensure media_type is unitialized (bsc#1104353 ).
- net: hns3: export pci table of hclge and hclgevf to userspace (bsc#1104353).
- net: hns3: fix a bug about hns3_clean_tx_ring (bsc#1104353 ).
- net: hns3: fix a bug for phy supported feature initialization (bsc#1104353).
- net: hns3: fix a bug in hclge_uninit_client_instance (bsc#1104353).
- net: hns3: fix a bug in hns3_driv_to_eth_caps (bsc#1104353 ).
- net: hns3: fix a bug when alloc new buffer (bsc#1104353 ).
- net: hns3: fix a bug when getting phy address from NCL_config file (bsc#1104353).
- net: hns3: fix a dead loop in hclge_cmd_csq_clean (bsc#1104353 ).
- net: hns3: fix a handful of spelling mistakes (bsc#1104353 ).
- net: hns3: Fix a loop index error of tqp statistics query (bsc#1104353).
- net: hns3: Fix a misuse to devm_free_irq (bsc#1104353 ).
- net: hns3: Fix an error handling path in 'hclge_rss_init_hw()' (bsc#1104353).
- net: hns3: Fix an error macro definition of HNS3_TQP_STAT (bsc#1104353).
- net: hns3: Fix an error of total drop packet statistics (bsc#1104353).
- net: hns3: Fix a response data read error of tqp statistics query (bsc#1104353).
- net: hns3: fix endian issue when PF get mbx message flag (bsc#1104353).
- net: hns3: fix error type definition of return value (bsc#1104353).
- net: hns3: Fixes API to fetch ethernet header length with kernel default (bsc#1104353).
- net: hns3: Fixes error reported by Kbuild and internal review (bsc#1104353).
- net: hns3: Fixes initalization of RoCE handle and makes it conditional (bsc#1104353).
- net: hns3: Fixes initialization of phy address from firmware (bsc#1104353).
- net: hns3: Fixes kernel panic issue during rmmod hns3 driver (bsc#1104353).
- net: hns3: Fixes ring-to-vector map-and-unmap command (bsc#1104353).
- net: hns3: Fixes the back pressure setting when sriov is enabled (bsc#1104353).
- net: hns3: Fixes the command used to unmap ring from vector (bsc#1104353).
- net: hns3: Fixes the default VLAN-id of PF (bsc#1104353 ).
- net: hns3: Fixes the error legs in hclge_init_ae_dev function (bsc#1104353).
- net: hns3: Fixes the ether address copy with appropriate API (bsc#1104353).
- net: hns3: Fixes the initialization of MAC address in hardware (bsc#1104353).
- net: hns3: Fixes the init of the VALID BD info in the descriptor (bsc#1104353).
- net: hns3: Fixes the missing PCI iounmap for various legs (bsc#1104353).
- net: hns3: Fixes the missing u64_stats_fetch_begin_irq in 64-bit stats fetch (bsc#1104353).
- net: hns3: Fixes the out of bounds access in hclge_map_tqp (bsc#1104353).
- net: hns3: Fixes the premature exit of loop when matching clients (bsc#1104353).
- net: hns3: fixes the ring index in hns3_fini_ring (bsc#1104353 ).
- net: hns3: Fixes the state to indicate client-type initialization (bsc#1104353).
- net: hns3: Fixes the static checker error warning in hns3_get_link_ksettings() (bsc#1104353).
- net: hns3: Fixes the static check warning due to missing unsupp L3 proto check (bsc#1104353).
- net: hns3: Fixes the wrong IS_ERR check on the returned phydev value (bsc#1104353).
- net: hns3: fix for buffer overflow smatch warning (bsc#1104353 ).
- net: hns3: fix for changing MTU (bsc#1104353).
- net: hns3: fix for cleaning ring problem (bsc#1104353 ).
- net: hns3: Fix for CMDQ and Misc. interrupt init order problem (bsc#1104353).
- net: hns3: fix for coal configuation lost when setting the channel (bsc#1104353).
- net: hns3: fix for coalesce configuration lost during reset (bsc#1104353).
- net: hns3: Fix for deadlock problem occurring when unregistering ae_algo (bsc#1104353).
- net: hns3: Fix for DEFAULT_DV when dev does not support DCB (bsc#1104353).
- net: hns3: Fix for fiber link up problem (bsc#1104353 ).
- net: hns3: fix for getting advertised_caps in hns3_get_link_ksettings (bsc#1104353).
- net: hns3: fix for getting autoneg in hns3_get_link_ksettings (bsc#1104353).
- net: hns3: fix for getting auto-negotiation state in hclge_get_autoneg (bsc#1104353).
- net: hns3: fix for getting wrong link mode problem (bsc#1104353 ).
- net: hns3: Fix for hclge_reset running repeatly problem (bsc#1104353).
- net: hns3: Fix for hns3 module is loaded multiple times problem (bsc#1104353).
- net: hns3: fix for ipv6 address loss problem after setting channels (bsc#1104353).
- net: hns3: fix for loopback failure when vlan filter is enable (bsc#1104353).
- net: hns3: fix for netdev not running problem after calling net_stop and net_open (bsc#1104353).
- net: hns3: Fix for netdev not running problem after calling net_stop and net_open (bsc#1104353).
- net: hns3: fix for not initializing VF rss_hash_key problem (bsc#1104353).
- net: hns3: fix for not returning problem in get_link_ksettings when phy exists (bsc#1104353).
- net: hns3: fix for not setting pause parameters (bsc#1104353 ).
- net: hns3: Fix for not setting rx private buffer size to zero (bsc#1104353).
- net: hns3: Fix for packet loss due wrong filter config in VLAN tbls (bsc#1104353).
- net: hns3: fix for pause configuration lost during reset (bsc#1104353).
- net: hns3: Fix for PF mailbox receving unknown message (bsc#1104353).
- net: hns3: fix for phy_addr error in hclge_mac_mdio_config (bsc#1104353).
- net: hns3: Fix for phy not link up problem after resetting (bsc#1104353).
- net: hns3: Fix for pri to tc mapping in TM (bsc#1104353 ).
- net: hns3: fix for returning wrong value problem in hns3_get_rss_indir_size (bsc#1104353).
- net: hns3: fix for returning wrong value problem in hns3_get_rss_key_size (bsc#1104353).
- net: hns3: fix for RSS configuration loss problem during reset (bsc#1104353).
- net: hns3: Fix for rx priv buf allocation when DCB is not supported (bsc#1104353).
- net: hns3: Fix for rx_priv_buf_alloc not setting rx shared buffer (bsc#1104353).
- net: hns3: Fix for service_task not running problem after resetting (bsc#1104353).
- net: hns3: Fix for setting mac address when resetting (bsc#1104353).
- net: hns3: fix for setting MTU (bsc#1104353).
- net: hns3: Fix for setting rss_size incorrectly (bsc#1104353 ).
- net: hns3: Fix for the null pointer problem occurring when initializing ae_dev failed (bsc#1104353).
- net: hns3: fix for the wrong shift problem in hns3_set_txbd_baseinfo (bsc#1104353).
- net: hns3: fix for updating fc_mode_last_time (bsc#1104353 ).
- net: hns3: fix for use-after-free when setting ring parameter (bsc#1104353).
- net: hns3: Fix for VF mailbox cannot receiving PF response (bsc#1104353).
- net: hns3: Fix for VF mailbox receiving unknown message (bsc#1104353).
- net: hns3: fix for vlan table lost problem when resetting (bsc#1104353).
- net: hns3: Fix for vxlan tx checksum bug (bsc#1104353 ).
- net: hns3: Fix initialization when cmd is not supported (bsc#1104353).
- net: hns3: fix length overflow when CONFIG_ARM64_64K_PAGES (bsc#1104353).
- net: hns3: fix null pointer dereference before null check (bsc#1104353).
- net: hns3: fix return value error of hclge_get_mac_vlan_cmd_status() (bsc#1104353).
- net: hns3: fix rx path skb->truesize reporting bug (bsc#1104353 ).
- net: hns3: Fix setting mac address error (bsc#1104353 ).
- net: hns3: Fix spelling errors (bsc#1104353).
- net: hns3: fix spelling mistake: 'capabilty' -> 'capability' (bsc#1104353).
- net: hns3: fix the bug of hns3_set_txbd_baseinfo (bsc#1104353 ).
- net: hns3: fix the bug when map buffer fail (bsc#1104353 ).
- net: hns3: fix the bug when reuse command description in hclge_add_mac_vlan_tbl (bsc#1104353).
- net: hns3: Fix the missing client list node initialization (bsc#1104353).
- net: hns3: fix the ops check in hns3_get_rxnfc (bsc#1104353 ).
- net: hns3: fix the queue id for tqp enable and reset (bsc#1104353 ).
- net: hns3: fix the ring count for ETHTOOL_GRXRINGS (bsc#1104353 ).
- net: hns3: fix the TX/RX ring.queue_index in hns3_ring_get_cfg (bsc#1104353).
- net: hns3: fix the VF queue reset flow error (bsc#1104353 ).
- net: hns3: fix to correctly fetch l4 protocol outer header (bsc#1104353).
- net: hns3: Fix to support autoneg only for port attached with phy (bsc#1104353).
- net: hns3: Fix typo error for feild in hclge_tm (bsc#1104353 ).
- net: hns3: free the ring_data structrue when change tqps (bsc#1104353).
- net: hns3: get rss_size_max from configuration but not hardcode (bsc#1104353).
- net: hns3: get vf count by pci_sriov_get_totalvfs (bsc#1104353 ).
- net: hns3: hclge_inform_reset_assert_to_vf() can be static (bsc#1104353).
- net: hns3: hns3:fix a bug about statistic counter in reset process (bsc#1104353).
- net: hns3: hns3_get_channels() can be static (bsc#1104353 ).
- net: hns3: Increase the default depth of bucket for TM shaper (bsc#1104353).
- net: hns3: increase the max time for IMP handle command (bsc#1104353).
- net: hns3: make local functions static (bsc#1104353 ).
- net: hns3: Mask the packet statistics query when NIC is down (bsc#1104353).
- net: hns3: Modify the update period of packet statistics (bsc#1104353).
- net: hns3: never send command queue message to IMP when reset (bsc#1104353).
- net: hns3: Optimize PF CMDQ interrupt switching process (bsc#1104353).
- net: hns3: Optimize the PF's process of updating multicast MAC (bsc#1104353).
- net: hns3: Optimize the VF's process of updating multicast MAC (bsc#1104353).
- net: hns3: reallocate tx/rx buffer after changing mtu (bsc#1104353).
- net: hns3: refactor GL update function (bsc#1104353 ).
- net: hns3: refactor interrupt coalescing init function (bsc#1104353).
- net: hns3: Refactor mac_init function (bsc#1104353).
- net: hns3: Refactor of the reset interrupt handling logic (bsc#1104353).
- net: hns3: Refactors the requested reset and pending reset handling code (bsc#1104353).
- net: hns3: refactor the coalesce related struct (bsc#1104353 ).
- net: hns3: refactor the get/put_vector function (bsc#1104353 ).
- net: hns3: refactor the hclge_get/set_rss function (bsc#1104353 ).
- net: hns3: refactor the hclge_get/set_rss_tuple function (bsc#1104353).
- net: hns3: Refactor the initialization of command queue (bsc#1104353).
- net: hns3: refactor the loopback related function (bsc#1104353 ).
- net: hns3: Refactor the mapping of tqp to vport (bsc#1104353 ).
- net: hns3: Refactor the skb receiving and transmitting function (bsc#1104353).
- net: hns3: remove a couple of redundant assignments (bsc#1104353 ).
- net: hns3: remove add/del_tunnel_udp in hns3_enet module (bsc#1104353).
- net: hns3: Remove a useless member of struct hns3_stats (bsc#1104353).
- net: hns3: Remove error log when getting pfc stats fails (bsc#1104353).
- net: hns3: Remove packet statistics in the range of 8192~12287 (bsc#1104353).
- net: hns3: remove redundant memset when alloc buffer (bsc#1104353).
- net: hns3: remove redundant semicolon (bsc#1104353).
- net: hns3: Remove repeat statistic of rx_errors (bsc#1104353 ).
- net: hns3: Removes unnecessary check when clearing TX/RX rings (bsc#1104353).
- net: hns3: remove TSO config command from VF driver (bsc#1104353 ).
- net: hns3: remove unnecessary pci_set_drvdata() and devm_kfree() (bsc#1104353).
- net: hns3: remove unused GL setup function (bsc#1104353 ).
- net: hns3: remove unused hclgevf_cfg_func_mta_filter (bsc#1104353).
- net: hns3: Remove unused led control code (bsc#1104353 ).
- net: hns3: report the function type the same line with hns3_nic_get_stats64 (bsc#1104353).
- net: hns3: set the cmdq out_vld bit to 0 after used (bsc#1104353 ).
- net: hns3: set the max ring num when alloc netdev (bsc#1104353 ).
- net: hns3: Setting for fc_mode and dcb enable flag in TM module (bsc#1104353).
- net: hns3: Support for dynamically assigning tx buffer to TC (bsc#1104353).
- net: hns3: Unified HNS3 {VF|PF} Ethernet Driver for hip08 SoC (bsc#1104353).
- net: hns3: unify the pause params setup function (bsc#1104353 ).
- net: hns3: Unify the strings display of packet statistics (bsc#1104353).
- net: hns3: Updates MSI/MSI-X alloc/free APIs(depricated) to new APIs (bsc#1104353).
- net: hns3: Updates RX packet info fetch in case of multi BD (bsc#1104353).
- net: hns3: Use enums instead of magic number in hclge_is_special_opcode (bsc#1104353).
- net: hns3: VF should get the real rss_size instead of rss_size_max (bsc#1104353).
- net: lan78xx: Fix race in tx pending skb size calculation (bsc#1100132).
- net: lan78xx: fix rx handling before first packet is send (bsc#1100132).
- net: qmi_wwan: add BroadMobi BM806U 2020:2033 (bsc#1087092).
- net: qmi_wwan: Add Netgear Aircard 779S (bsc#1090888).
- net-usb: add qmi_wwan if on lte modem wistron neweb d18q1 (bsc#1087092).
- net: usb: asix: replace mii_nway_restart in resume path (bsc#1100132).
- nohz: Fix local_timer_softirq_pending() (bsc#1051510).
- nvme: ensure forward progress during Admin passthru (git-fixes).
- nvme-fabrics: Ignore nr_io_queues option for discovery controllers (bsc#1102633).
- nvme: fixup crash on failed discovery (bsc#1103920).
- nvme.h: fixup ANA group descriptor format (bsc#1104111).
- nvme: use hw qid in trace events (bsc#1102633).
- orangefs: report attributes_mask and attributes for statx (bsc#1101832).
- orangefs: set i_size on new symlink (bsc#1101845).
- overflow.h: Add allocation size calculation helpers (bsc#1101116,).
- PCI: pciehp: Assume NoCompl+ for Thunderbolt ports (bsc#1051510).
- PCI: pciehp: Request control of native hotplug only if supported (bsc#1051510).
- PCI: Prevent sysfs disable of device while driver is attached (bsc#1051510).
- pinctrl: at91-pio4: add missing of_node_put (bsc#1051510).
- pinctrl: cannonlake: Fix community ordering for H variant (bsc#1051510).
- pinctrl: core: Return selector to the pinctrl driver (bsc#1051510).
- pinctrl: freescale: off by one in imx1_pinconf_group_dbg_show() (bsc#1051510).
- pinctrl: imx: off by one in imx_pinconf_group_dbg_show() (bsc#1051510).
- pinctrl: intel: Add Intel Lewisburg GPIO support ().
- pinctrl: nand: meson-gxl: fix missing data pins (bsc#1051510).
- pinctrl: pinmux: Return selector to the pinctrl driver (bsc#1051510).
- pinctrl: qcom: spmi-gpio: Fix pmic_gpio_config_get() to be compliant (bsc#1051510).
- pinctrl: single: Fix group and function selector use (bsc#1051510).
- PM / devfreq: rk3399_dmc: Fix duplicated opp table on reload (bsc#1051510).
- pmem: only set QUEUE_FLAG_DAX for fsdax mode (bsc#1103917).
- powerpc/64: Add GENERIC_CPU support for little endian ().
- powerpc/fadump: handle crash memory ranges array index overflow (bsc#1103269).
- powerpc/fadump: merge adjacent memory ranges to reduce PT_LOAD segements (bsc#1103269).
- powerpc/pkeys: Deny read/write/execute by default (bsc#1097577).
- powerpc/pkeys: Fix calculation of total pkeys (bsc#1097577).
- powerpc/pkeys: Give all threads control of their key permissions (bsc#1097577).
- powerpc/pkeys: key allocation/deallocation must not change pkey registers (bsc#1097577).
- powerpc/pkeys: make protection key 0 less special (bsc#1097577).
- powerpc/pkeys: Preallocate execute-only key (bsc#1097577).
- powerpc/pkeys: Save the pkey registers before fork (bsc#1097577).
- qed*: Add link change count value to ethtool statistics display (bsc#1086314).
- qed: Add qed APIs for PHY module query (bsc#1086314 ).
- qed: Add srq core support for RoCE and iWARP (bsc#1086314 ).
- qede: Add driver callbacks for eeprom module query (bsc#1086314 ).
- qedf: Add get_generic_tlv_data handler (bsc#1086317).
- qedf: Add support for populating ethernet TLVs (bsc#1086317).
- qed: fix spelling mistake 'successffuly' -> 'successfully' (bsc#1086314).
- qedi: Add get_generic_tlv_data handler (bsc#1086315).
- qedi: Add support for populating ethernet TLVs (bsc#1086315).
- qed: Make some functions static (bsc#1086314).
- qed: remove redundant functions qed_get_cm_pq_idx_rl (bsc#1086314).
- qed: remove redundant functions qed_set_gft_event_id_cm_hdr (bsc#1086314).
- qed: remove redundant pointer 'name' (bsc#1086314).
- qed: use dma_zalloc_coherent instead of allocator/memset (bsc#1086314).
- qed*: Utilize FW 8.37.2.0 (bsc#1086314).
- RDMA/hns: Add 64KB page size support for hip08 (bsc#1104427 ).
- RDMA/hns: Add command queue support for hip08 RoCE driver (bsc#1104427).
- RDMA/hns: Add CQ operations support for hip08 RoCE driver (bsc#1104427).
- RDMA/hns: Add detailed comments for mb() call (bsc#1104427 ).
- RDMA/hns: Add eq support of hip08 (bsc#1104427).
- RDMA/hns: Add gsi qp support for modifying qp in hip08 (bsc#1104427).
- RDMA/hns: Add mailbox's implementation for hip08 RoCE driver (bsc#1104427).
- RDMA/hns: Add modify CQ support for hip08 (bsc#1104427 ).
- RDMA/hns: Add names to function arguments in function pointers (bsc#1104427).
- RDMA/hns: Add profile support for hip08 driver (bsc#1104427 ).
- RDMA/hns: Add QP operations support for hip08 SoC (bsc#1104427 ).
- RDMA/hns: Add releasing resource operation in error branch (bsc#1104427).
- RDMA/hns: Add rereg mr support for hip08 (bsc#1104427 ).
- RDMA/hns: Add reset process for RoCE in hip08 (bsc#1104427 ).
- RDMA/hns: Add return operation when configured global param fail (bsc#1104427).
- RDMA/hns: Add rq inline data support for hip08 RoCE (bsc#1104427 ).
- RDMA/hns: Add rq inline flags judgement (bsc#1104427 ).
- RDMA/hns: Add sq_invld_flg field in QP context (bsc#1104427 ).
- RDMA/hns: Add support for processing send wr and receive wr (bsc#1104427).
- RDMA/hns: Add the interfaces to support multi hop addressing for the contexts in hip08 (bsc#1104427).
- RDMA/hns: Adjust the order of cleanup hem table (bsc#1104427 ).
- RDMA/hns: Assign dest_qp when deregistering mr (bsc#1104427 ).
- RDMA/hns: Assign the correct value for tx_cqn (bsc#1104427 ).
- RDMA/hns: Assign zero for pkey_index of wc in hip08 (bsc#1104427 ).
- RDMA/hns: Avoid NULL pointer exception (bsc#1104427 ).
- RDMA/hns: Bugfix for cq record db for kernel (bsc#1104427 ).
- RDMA/hns: Bugfix for init hem table (bsc#1104427).
- RDMA/hns: Bugfix for rq record db for kernel (bsc#1104427 ).
- RDMA/hns: Check return value of kzalloc (bsc#1104427 ).
- RDMA/hns: Configure BT BA and BT attribute for the contexts in hip08 (bsc#1104427).
- RDMA/hns: Configure fence attribute in hip08 RoCE (bsc#1104427 ).
- RDMA/hns: Configure mac and gid and user access region for hip08 RoCE driver (bsc#1104427).
- RDMA/hns: Configure sgid type for hip08 RoCE (bsc#1104427 ).
- RDMA/hns: Configure the MTPT in hip08 (bsc#1104427).
- RDMA/hns: Configure TRRL field in hip08 RoCE device (bsc#1104427 ).
- RDMA/hns: Create gsi qp in hip08 (bsc#1104427).
- RDMA/hns: Delete the unnecessary initializing enum to zero (bsc#1104427).
- RDMA/hns: Do not unregister a callback we didn't register (bsc#1104427).
- RDMA/hns: Drop local zgid in favor of core defined variable (bsc#1104427).
- RDMA/hns: Enable inner_pa_vld filed of mpt (bsc#1104427 ).
- RDMA/hns: Enable the cqe field of sqwqe of RC (bsc#1104427 ).
- RDMA/hns: ensure for-loop actually iterates and free's buffers (bsc#1104427).
- RDMA/hns: Fill sq wqe context of ud type in hip08 (bsc#1104427 ).
- RDMA/hns: Filter for zero length of sge in hip08 kernel mode (bsc#1104427).
- RDMA/hns: Fix a bug with modifying mac address (bsc#1104427 ).
- RDMA/hns: Fix a couple misspellings (bsc#1104427).
- RDMA/hns: Fix calltrace for sleeping in atomic (bsc#1104427 ).
- RDMA/hns: Fix cqn type and init resp (bsc#1104427).
- RDMA/hns: Fix cq record doorbell enable in kernel (bsc#1104427 ).
- RDMA/hns: Fix endian problems around imm_data and rkey (bsc#1104427).
- RDMA/hns: Fix inconsistent warning (bsc#1104427).
- RDMA/hns: Fix init resp when alloc ucontext (bsc#1104427 ).
- RDMA/hns: Fix misplaced call to hns_roce_cleanup_hem_table (bsc#1104427).
- RDMA/hns: Fix QP state judgement before receiving work requests (bsc#1104427).
- RDMA/hns: Fix QP state judgement before sending work requests (bsc#1104427).
- RDMA/hns: fix spelling mistake: 'Reseved' -> 'Reserved' (bsc#1104427).
- RDMA/hns: Fix the bug with NULL pointer (bsc#1104427 ).
- RDMA/hns: Fix the bug with rq sge (bsc#1104427).
- RDMA/hns: Fix the endian problem for hns (bsc#1104427 ).
- RDMA/hns: Fix the illegal memory operation when cross page (bsc#1104427).
- RDMA/hns: Fix the issue of IOVA not page continuous in hip08 (bsc#1104427).
- RDMA/hns: Fix the qp context state diagram (bsc#1104427 ).
- RDMA/hns: Generate gid type of RoCEv2 (bsc#1104427).
- RDMA/hns: Get rid of page operation after dma_alloc_coherent (bsc#1104427).
- RDMA/hns: Get rid of virt_to_page and vmap calls after dma_alloc_coherent (bsc#1104427).
- RDMA/hns: Implement the disassociate_ucontext API (bsc#1104427 ).
- RDMA/hns: Increase checking CMQ status timeout value (bsc#1104427).
- RDMA/hns: Initialize the PCI device for hip08 RoCE (bsc#1104427 ).
- RDMA/hns: Intercept illegal RDMA operation when use inline data (bsc#1104427).
- RDMA/hns: Load the RoCE dirver automatically (bsc#1104427 ).
- RDMA/hns: make various function static, fixes warnings (bsc#1104427).
- RDMA/hns: Modify assignment device variable to support both PCI device and platform device (bsc#1104427).
- RDMA/hns: Modify the usage of cmd_sn in hip08 (bsc#1104427 ).
- RDMA/hns: Modify the value with rd dest_rd of qp_attr (bsc#1104427).
- RDMA/hns: Modify uar allocation algorithm to avoid bitmap exhaust (bsc#1104427).
- RDMA/hns: Move priv in order to add multiple hns_roce support (bsc#1104427).
- RDMA/hns: Move the location for initializing tmp_len (bsc#1104427).
- RDMA/hns: Not support qp transition from reset to reset for hip06 (bsc#1104427).
- RDMA/hns: Only assign dest_qp if IB_QP_DEST_QPN bit is set (bsc#1104427).
- RDMA/hns: Only assign dqpn if IB_QP_PATH_DEST_QPN bit is set (bsc#1104427).
- RDMA/hns: Only assign mtu if IB_QP_PATH_MTU bit is set (bsc#1104427).
- RDMA/hns: Refactor code for readability (bsc#1104427 ).
- RDMA/hns: Refactor eq code for hip06 (bsc#1104427).
- RDMA/hns: remove redundant assignment to variable j (bsc#1104427 ).
- RDMA/hns: Remove some unnecessary attr_mask judgement (bsc#1104427).
- RDMA/hns: Remove unnecessary operator (bsc#1104427).
- RDMA/hns: Remove unnecessary platform_get_resource() error check (bsc#1104427).
- RDMA/hns: Rename the idx field of db (bsc#1104427).
- RDMA/hns: Replace condition statement using hardware version information (bsc#1104427).
- RDMA/hns: Replace __raw_write*(cpu_to_le*()) with LE write*() (bsc#1104427).
- RDMA/hns: return 0 rather than return a garbage status value (bsc#1104427).
- RDMA/hns_roce: Do not check return value of zap_vma_ptes() (bsc#1104427).
- RDMA/hns: Set access flags of hip08 RoCE (bsc#1104427 ).
- RDMA/hns: Set desc_dma_addr for zero when free cmq desc (bsc#1104427).
- RDMA/hns: Set NULL for __internal_mr (bsc#1104427).
- RDMA/hns: Set rdma_ah_attr type for querying qp (bsc#1104427 ).
- RDMA/hns: Set se attribute of sqwqe in hip08 (bsc#1104427 ).
- RDMA/hns: Set sq_cur_sge_blk_addr field in QPC in hip08 (bsc#1104427).
- RDMA/hns: Set the guid for hip08 RoCE device (bsc#1104427 ).
- RDMA/hns: Set the owner field of SQWQE in hip08 RoCE (bsc#1104427).
- RDMA/hns: Split CQE from MTT in hip08 (bsc#1104427).
- RDMA/hns: Split hw v1 driver from hns roce driver (bsc#1104427 ).
- RDMA/hns: Submit bad wr (bsc#1104427).
- RDMA/hns: Support cq record doorbell for kernel space (bsc#1104427).
- RDMA/hns: Support cq record doorbell for the user space (bsc#1104427).
- RDMA/hns: Support multi hop addressing for PBL in hip08 (bsc#1104427).
- RDMA/hns: Support rq record doorbell for kernel space (bsc#1104427).
- RDMA/hns: Support rq record doorbell for the user space (bsc#1104427).
- RDMA/hns: Support WQE/CQE/PBL page size configurable feature in hip08 (bsc#1104427).
- RDMA/hns: Unify the calculation for hem index in hip08 (bsc#1104427).
- RDMA/hns: Update assignment method for owner field of send wqe (bsc#1104427).
- RDMA/hns: Update calculation of irrl_ba field for hip08 (bsc#1104427).
- RDMA/hns: Update convert function of endian format (bsc#1104427 ).
- RDMA/hns: Update the interfaces for MTT/CQE multi hop addressing in hip08 (bsc#1104427).
- RDMA/hns: Update the IRRL table chunk size in hip08 (bsc#1104427 ).
- RDMA/hns: Update the PD CQE MTT specification in hip08 (bsc#1104427).
- RDMA/hns: Update the usage of ack timeout in hip08 (bsc#1104427 ).
- RDMA/hns: Update the usage of sr_max and rr_max field (bsc#1104427).
- RDMA/hns: Update the verbs of polling for completion (bsc#1104427).
- RDMA/hns: Use free_pages function instead of free_page (bsc#1104427).
- RDMA/hns: Use structs to describe the uABI instead of opencoding (bsc#1104427).
- RDMA/qedr: Fix NULL pointer dereference when running over iWARP without RDMA-CM (bsc#1086314).
- RDMA/qedr: fix spelling mistake: 'adrresses' -> 'addresses' (bsc#1086314).
- RDMA/qedr: fix spelling mistake: 'failes' -> 'fails' (bsc#1086314).
- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bsc#1051510).
- reiserfs: fix buffer overflow with long warning messages (bsc#1101847).
- Revert 'drm/nouveau/drm/therm/fan: add a fallback if no fan control is specified in the vbios' (bsc#1103356).
- rtc: ensure rtc_set_alarm fails when alarms are not supported (bsc#1051510).
- s390/cio: clear timer when terminating driver I/O (bsc#1103421).
- s390/cio: fix return code after missing interrupt (bsc#1103421).
- s390/dasd: configurable IFCC handling (bsc#1097808).
- s390/dasd: fix handling of internal requests (bsc#1103421).
- s390/dasd: fix wrongly assigned configuration data (bsc#1103421).
- s390/dasd: prevent prefix I/O error (bsc#1103421).
- s390/eadm: fix CONFIG_BLOCK include dependency (bsc#1103421).
- s390/ipl: ensure loadparm valid flag is set (bsc#1103421).
- s390/pci: do not require AIS facility (bsc#1103421).
- s390/qdio: do not release memory in qdio_setup_irq() (bsc#1103421).
- sc16is7xx: Check for an error when the clock is enabled (bsc#1051510).
- sched/debug: Reverse the order of printing faults (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Consider RT/IRQ pressure in capacity_spare_wake() (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Fix find_idlest_group() when local group is not allowed (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Fix usage of find_idlest_group() when no groups are allowed (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Fix usage of find_idlest_group() when the local group is idlest (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Move select_task_rq_fair() slow-path into its own function (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Remove impossible condition from find_idlest_group_cpu() (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Remove unnecessary comparison with -1 (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Spare idle load balancing on nohz_full CPUs (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Use 'unsigned long' for utilization, consistently (bnc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Evaluate move once per node (bnc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Modify migrate_swap() to accept additional parameters (bnc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Move task_numa_placement() closer to numa_migrate_preferred() (bnc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Remove redundant field (bnc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Remove redundant field -kabi (bnc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Remove unused task_capacity from 'struct numa_stats' (bnc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Set preferred_node based on best_cpu (bnc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Simplify load_too_imbalanced() (bnc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Skip nodes that are at 'hoplimit' (bnc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Update the scan period without holding the numa_group lock (bnc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Use group_weights to identify if migration degrades locality (bnc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Use task faults only if numa_group is not yet set up (bnc#1101669 optimise numa balancing for fast migrate).
- sched/smt: Update sched_smt_present at runtime (bsc#1089343).
- scsi: ata: enhance the definition of SET MAX feature field value ().
- scsi: hisi_sas: add an mechanism to do reset work synchronously ().
- scsi: hisi_sas: add check of device in hisi_sas_task_exec() ().
- scsi: hisi_sas: add internal abort dev in some places ().
- scsi: hisi_sas: Add LED feature for v3 hw ().
- scsi: hisi_sas: add RAS feature for v3 hw ().
- scsi: hisi_sas: add readl poll timeout helper wrappers ().
- scsi: hisi_sas: Add some checks to avoid free'ing a sas_task twice ().
- scsi: hisi_sas: add some print to enhance debugging ().
- scsi: hisi_sas: Add v2 hw force PHY function for internal ATA command ().
- scsi: hisi_sas: add v2 hw port AXI error handling support ().
- scsi: hisi_sas: add v3 hw MODULE_DEVICE_TABLE() ().
- scsi: hisi_sas: add v3 hw suspend and resume ().
- scsi: hisi_sas: allocate slot buffer earlier ().
- scsi: hisi_sas: Change common allocation mode of device id ().
- scsi: hisi_sas: Change frame type for SET MAX commands ().
- scsi: hisi_sas: change ncq process for v3 hw ().
- scsi: hisi_sas: change slot index allocation mode ().
- scsi: hisi_sas: check host frozen before calling 'done' function ().
- scsi: hisi_sas: check IPTT is valid before using it for v3 hw ().
- scsi: hisi_sas: check sas_dev gone earlier in hisi_sas_abort_task() ().
- scsi: hisi_sas: Code cleanup and minor bug fixes ().
- scsi: hisi_sas: config ATA de-reset as an constrained command for v3 hw ().
- scsi: hisi_sas: consolidate command check in hisi_sas_get_ata_protocol() ().
- scsi: hisi_sas: Create a scsi_host_template per HW module ().
- scsi: hisi_sas: delete timer when removing hisi_sas driver ().
- scsi: hisi_sas: do link reset for some CHL_INT2 ints ().
- scsi: hisi_sas: Do not lock DQ for complete task sending ().
- scsi: hisi_sas: dt-bindings: add an property of signal attenuation ().
- scsi: hisi_sas: fix a bug in hisi_sas_dev_gone() ().
- scsi: hisi_sas: fix a typo in hisi_sas_task_prep() ().
- scsi: hisi_sas: fix dma_unmap_sg() parameter ().
- scsi: hisi_sas: fix PI memory size ().
- scsi: hisi_sas: fix return value of hisi_sas_task_prep() ().
- scsi: hisi_sas: Fix return value when get_free_slot() failed ().
- scsi: hisi_sas: fix SAS_QUEUE_FULL problem while running IO ().
- scsi: hisi_sas: fix the issue of link rate inconsistency ().
- scsi: hisi_sas: fix the issue of setting linkrate register ().
- scsi: hisi_sas: improve int_chnl_int_v2_hw() consistency with v3 hw ().
- scsi: hisi_sas: Include TMF elements in struct hisi_sas_slot ().
- scsi: hisi_sas: increase timer expire of internal abort task ().
- scsi: hisi_sas: Init disks after controller reset ().
- scsi: hisi_sas: initialize dq spinlock before use ().
- scsi: hisi_sas: Introduce hisi_sas_phy_set_linkrate() ().
- scsi: hisi_sas: judge result of internal abort ().
- scsi: hisi_sas: make local symbol host_attrs static ().
- scsi: hisi_sas: make return type of prep functions void ().
- scsi: hisi_sas: make SAS address of SATA disks unique ().
- scsi: hisi_sas: Mark PHY as in reset for nexus reset ().
- scsi: hisi_sas: modify hisi_sas_dev_gone() for reset ().
- scsi: hisi_sas: modify some register config for hip08 ().
- scsi: hisi_sas: optimise port id refresh function ().
- scsi: hisi_sas: optimise the usage of DQ locking ().
- scsi: hisi_sas: print device id for errors ().
- scsi: hisi_sas: re-add the lldd_port_deformed() ().
- scsi: hisi_sas: relocate clearing ITCT and freeing device ().
- scsi: hisi_sas: relocate smp sg map ().
- scsi: hisi_sas: Remove depends on HAS_DMA in case of platform dependency ().
- scsi: hisi_sas: remove redundant handling to event95 for v3 ().
- scsi: hisi_sas: remove some unneeded structure members ().
- scsi: hisi_sas: remove unused variable hisi_sas_devices.running_req ().
- scsi: hisi_sas: Reset disks when discovered ().
- scsi: hisi_sas: some optimizations of host controller reset ().
- scsi: hisi_sas: stop controller timer for reset ().
- scsi: hisi_sas: support the property of signal attenuation for v2 hw ().
- scsi: hisi_sas: Terminate STP reject quickly for v2 hw ().
- scsi: hisi_sas: Try wait commands before before controller reset ().
- scsi: hisi_sas: update PHY linkrate after a controller reset ().
- scsi: hisi_sas: update RAS feature for later revision of v3 HW ().
- scsi: hisi_sas: use an general way to delay PHY work ().
- scsi: hisi_sas: Use device lock to protect slot alloc/free ().
- scsi: hisi_sas: use dma_zalloc_coherent() ().
- scsi: hisi_sas: workaround a v3 hw hilink bug ().
- scsi: libsas: defer ata device eh commands to libata ().
- scsi: lpfc: Add Buffer overflow check, when nvme_info larger than PAGE_SIZE (bsc#1102658).
- scsi: lpfc: Correct LCB ACCept payload (bsc#1102658).
- scsi: lpfc: devloss timeout race condition caused null pointer reference (bsc#1102658).
- scsi: lpfc: Fix abort error path for NVMET (bsc#1102658).
- scsi: lpfc: Fix driver crash when re-registering NVME rports (bsc#1102658).
- scsi: lpfc: Fix driver not setting dpp bits correctly in doorbell word (bsc#1102658).
- scsi: lpfc: Fix ELS abort on SLI-3 adapters (bsc#1102658).
- scsi: lpfc: Fix list corruption on the completion queue (bsc#1102658).
- scsi: lpfc: Fix NVME Target crash in defer rcv logic (bsc#1102658).
- scsi: lpfc: Fix panic if driver unloaded when port is offline (bsc#1102658).
- scsi: lpfc: Fix sysfs Speed value on CNA ports (bsc#1102658).
- scsi: lpfc: Limit tracking of tgt queue depth in fast path (bsc#1102658).
- scsi: lpfc: Make PBDE optimizations configurable (bsc#1102658).
- scsi: lpfc: Remove lpfc_enable_pbde as module parameter (bsc#1102658).
- scsi: lpfc: Revise copyright for new company language (bsc#1102658).
- scsi: lpfc: Support duration field in Link Cable Beacon V1 command (bsc#1102658).
- scsi: lpfc: update driver version to 12.0.0.5 (bsc#1102658).
- scsi: lpfc: update driver version to 12.0.0.6 (bsc#1102658).
- scsi: mpt3sas: Add an I/O barrier (bsc#1086906,).
- scsi: mpt3sas: Added support for SAS Device Discovery Error Event (bsc#1086906,).
- scsi: mpt3sas: Add PCI device ID for Andromeda (bsc#1086906,).
- scsi: mpt3sas: Allow processing of events during driver unload (bsc#1086906,).
- scsi: mpt3sas: As per MPI-spec, use combined reply queue for SAS3.5 controllers when HBA supports more than 16 MSI-x vectors (bsc#1086906,).
- scsi: mpt3sas: Bug fix for big endian systems (bsc#1086906,).
- scsi: mpt3sas: Cache enclosure pages during enclosure add (bsc#1086906,).
- scsi: mpt3sas: clarify mmio pointer types (bsc#1086906,).
- scsi: mpt3sas: Configure reply post queue depth, DMA and sgl tablesize (bsc#1086906,).
- scsi: mpt3sas: Do not abort I/Os issued to NVMe drives while processing Async Broadcast primitive event (bsc#1086906,).
- scsi: mpt3sas: Do not access the structure after decrementing it's instance reference count (bsc#1086906,).
- scsi: mpt3sas: Do not mark fw_event workqueue as WQ_MEM_RECLAIM (bsc#1086906,).
- scsi: mpt3sas: Enhanced handling of Sense Buffer (bsc#1086906,).
- scsi: mpt3sas: Fix, False timeout prints for ioctl and other internal commands during controller reset (bsc#1086906,).
- scsi: mpt3sas: fix possible memory leak (bsc#1086906,).
- scsi: mpt3sas: fix spelling mistake: 'disbale' -> 'disable' (bsc#1086906,).
- scsi: mpt3sas: For NVME device, issue a protocol level reset (bsc#1086906,).
- scsi: mpt3sas: Incorrect command status was set/marked as not used (bsc#1086906,).
- scsi: mpt3sas: Increase event log buffer to support 24 port HBA's (bsc#1086906,).
- scsi: mpt3sas: Introduce API to get BAR0 mapped buffer address (bsc#1086906,).
- scsi: mpt3sas: Introduce Base function for cloning (bsc#1086906,).
- scsi: mpt3sas: Introduce function to clone mpi reply (bsc#1086906,).
- scsi: mpt3sas: Introduce function to clone mpi request (bsc#1086906,).
- scsi: mpt3sas: Lockless access for chain buffers (bsc#1086906,).
- scsi: mpt3sas: Optimize I/O memory consumption in driver (bsc#1086906,).
- scsi: mpt3sas: Pre-allocate RDPQ Array at driver boot time (bsc#1086906,).
- scsi: mpt3sas: Replace PCI pool old API (bsc#1081917).
- scsi: mpt3sas: Report Firmware Package Version from HBA Driver (bsc#1086906,).
- scsi: mpt3sas: Update driver version '25.100.00.00' (bsc#1086906,).
- scsi: mpt3sas: Update driver version '26.100.00.00' (bsc#1086906,).
- scsi: mpt3sas: Update MPI Headers (bsc#1086906,).
- scsi: qedf: Add additional checks when restarting an rport due to ABTS timeout (bsc#1086317).
- scsi: qedf: Add check for offload before flushing I/Os for target (bsc#1086317).
- scsi: qedf: Add dcbx_not_wait module parameter so we won't wait for DCBX convergence to start discovery (bsc#1086317).
- scsi: qedf: Add missing skb frees in error path (bsc#1086317).
- scsi: qedf: Add more defensive checks for concurrent error conditions (bsc#1086317).
- scsi: qedf: Add task id to kref_get_unless_zero() debug messages when flushing requests (bsc#1086317).
- scsi: qedf: Check if link is already up when receiving a link up event from qed (bsc#1086317).
- scsi: qedf: fix LTO-enabled build (bsc#1086317).
- scsi: qedf: Fix VLAN display when printing sent FIP frames (bsc#1086317).
- scsi: qedf: Honor default_prio module parameter even if DCBX does not converge (bsc#1086317).
- scsi: qedf: Honor priority from DCBX FCoE App tag (bsc#1086317).
- scsi: qedf: If qed fails to enable MSI-X fail PCI probe (bsc#1086317).
- scsi: qedf: Improve firmware debug dump handling (bsc#1086317).
- scsi: qedf: Increase the number of default FIP VLAN request retries to 60 (bsc#1086317).
- scsi: qedf: Release RRQ reference correctly when RRQ command times out (bsc#1086317).
- scsi: qedf: remove redundant initialization of 'fcport' (bsc#1086317).
- scsi: qedf: Remove setting DCBX pending during soft context reset (bsc#1086317).
- scsi: qedf: Return request as DID_NO_CONNECT if MSI-X is not enabled (bsc#1086317).
- scsi: qedf: Sanity check FCoE/FIP priority value to make sure it's between 0 and 7 (bsc#1086317).
- scsi: qedf: Send the driver state to MFW (bsc#1086317).
- scsi: qedf: Set the UNLOADING flag when removing a vport (bsc#1086317).
- scsi: qedf: Synchronize rport restarts when multiple ELS commands time out (bsc#1086317).
- scsi: qedf: Update copyright for 2018 (bsc#1086317).
- scsi: qedf: Update version number to 8.33.16.20 (bsc#1086317).
- scsi: qedf: use correct strncpy() size (bsc#1086317).
- scsi: qedi: fix building with LTO (bsc#1086315).
- scsi: qedi: fix build regression (bsc#1086315).
- scsi: qedi: Fix kernel crash during port toggle (bsc#1086315).
- scsi: qedi: Send driver state to MFW (bsc#1086315).
- scsi: qla2xxx: Avoid double completion of abort command (git-fixes).
- scsi: qla2xxx: correctly shift host byte (bsc#1086327,).
- scsi: qla2xxx: Correct setting of SAM_STAT_CHECK_CONDITION (bsc#1086327,).
- scsi: qla2xxx: Fix crash on qla2x00_mailbox_command (bsc#1086327,).
- scsi: qla2xxx: Fix driver unload by shutting down chip (git-fixes).
- scsi: qla2xxx: Fix Inquiry command being dropped in Target mode (bsc#1086327,).
- scsi: qla2xxx: Fix NPIV deletion by calling wait_for_sess_deletion (git-fixes).
- scsi: qla2xxx: Fix NULL pointer dereference for fcport search (git-fixes).
- scsi: qla2xxx: Fix race condition between iocb timeout and initialisation (bsc#1086327,).
- scsi: qla2xxx: Fix Rport and session state getting out of sync (bsc#1086327,).
- scsi: qla2xxx: Fix sending ADISC command for login (bsc#1086327,).
- scsi: qla2xxx: Fix setting lower transfer speed if GPSC fails (bsc#1086327,).
- scsi: qla2xxx: Fix TMF and Multi-Queue config (bsc#1086327,).
- scsi: qla2xxx: Fix unintialized List head crash (git-fixes).
- scsi: qla2xxx: Move GPSC and GFPNID out of session management (bsc#1086327,).
- scsi: qla2xxx: Prevent relogin loop by removing stale code (bsc#1086327,).
- scsi: qla2xxx: Reduce redundant ADISC command for RSCNs (bsc#1086327,).
- scsi: qla2xxx: remove irq save in qla2x00_poll() (bsc#1086327,).
- scsi: qla2xxx: Remove stale debug value for login_retry flag (bsc#1086327,).
- scsi: qla2xxx: Return error when TMF returns (git-fixes).
- scsi: qla2xxx: Update driver version to 10.00.00.07-k (bsc#1086327,).
- scsi: qla2xxx: Use predefined get_datalen_for_atio() inline function (bsc#1086327,).
- scsi: qla4xxx: Move an array from a .h into a .c file (bsc#1086331).
- scsi: qla4xxx: Remove unused symbols (bsc#1086331).
- scsi: qla4xxx: skip error recovery in case of register disconnect (bsc#1086331).
- scsi: qla4xxx: Use dma_pool_zalloc() (bsc#1086331).
- scsi: qla4xxx: Use zeroing allocator rather than allocator/memset (bsc#1086331).
- scsi: smartpqi: add in new supported controllers (bsc#1086274).
- scsi: smartpqi: add inspur advantech ids (bsc#1086274).
- scsi: smartpqi: bump driver version to 1.1.4-130 (bsc#1086274).
- scsi: smartpqi: fix critical ARM issue reading PQI index registers (bsc#1086274).
- scsi: smartpqi: improve error checking for sync requests (bsc#1086274).
- scsi: smartpqi: improve handling for sync requests (bsc#1086274).
- scsi: smartpqi: update driver version (bsc#1086274).
- scsi: smartpqi: workaround fw bug for oq deletion (bsc#1086274).
- sctp: fix the issue that pathmtu may be set lower than MINSEGMENT (git-fixes).
- sctp: introduce sctp_dst_mtu (git-fixes).
- selftests/powerpc: Fix core-pkey for default execute permission change (bsc#1097577).
- selftests/powerpc: Fix ptrace-pkey for default execute permission change (bsc#1097577).
- series.conf: Sort automatic NUMA balancing related patch
- soc: bcm2835: Make !RASPBERRYPI_FIRMWARE dummies return failure (bsc#1051510).
- soc: bcm: raspberrypi-power: Fix use of __packed (bsc#1051510).
- soc: imx: gpc: de-register power domains only if initialized (bsc#1051510).
- soc: imx: gpc: restrict register range for regmap access (bsc#1051510).
- soc: imx: gpcv2: correct PGC offset (bsc#1051510).
- soc: imx: gpcv2: Do not pass static memory as platform data (bsc#1051510).
- soc: imx: gpcv2: fix regulator deferred probe (bsc#1051510).
- soc: mediatek: pwrap: fix compiler errors (bsc#1051510).
- soc: qcom: wcnss_ctrl: Fix increment in NV upload (bsc#1051510).
- soc: rockchip: power-domain: Fix wrong value when power up pd with writemask (bsc#1051510).
- soc/tegra: Fix bad of_node_put() in powergate init (bsc#1051510).
- soc/tegra: flowctrl: Fix error handling (bsc#1051510).
- soc: ti: ti_sci_pm_domains: Populate name for genpd (bsc#1051510).
- soc: zte: Restrict SOC_ZTE to ARCH_ZX or COMPILE_TEST (bsc#1051510).
- spi: bcm2835aux: ensure interrupts are enabled for shared handler (bsc#1051510).
- spi/bcm63xx-hspi: Enable the clock before calling clk_get_rate() (bsc#1051510).
- spi: bcm-qspi: Always read and set BSPI_MAST_N_BOOT_CTRL (bsc#1051510).
- spi: bcm-qspi: Avoid setting MSPI_CDRAM_PCS for spi-nor master (bsc#1051510).
- spi: cadence: Add usleep_range() for cdns_spi_fill_tx_fifo() (bsc#1051510).
- spi: pxa2xx: Allow 64-bit DMA (bsc#1051510).
- spi: pxa2xx: check clk_prepare_enable() return value (bsc#1051510).
- spi: spi-fsl-dspi: Fix imprecise abort on VF500 during probe (bsc#1051510).
- sr: pass down correctly sized SCSI sense buffer (git-fixes).
- staging: ks7010: Use constants from ieee80211_eid instead of literal ints (bsc#1051510).
- staging: speakup: fix wraparound in uaccess length check (bsc#1051510).
- supported.conf: add drivers/md/dm-writecache
- supported.conf: added hns3 modules
- supported.conf: added hns-roce-hw-v1 and hns-roce-hw-v2
- supported.conf: Enable HiSi v3 SAS adapter ()
- sysrq : fix Show Regs call trace on ARM (bsc#1051510).
- TCM_RBD depends on BLK_DEV_RBD ().
- thermal: exynos: fix setting rising_threshold for Exynos5433 (bsc#1051510).
- tty: Fix data race in tty_insert_flip_string_fixed_flag (bsc#1051510).
- typec: tcpm: Fix a msecs vs jiffies bug (bsc#1100132).
- typec: tcpm: fusb302: Resolve out of order messaging events (bsc#1087092).
- udf: Detect incorrect directory size (bsc#1101891).
- udf: Provide saner default for invalid uid / gid (bsc#1101890).
- Update patches.arch/KVM-PPC-Check-if-IOMMU-page-is-contained-in-the-pinn.patch (bsc#1077761, git-fixes, bsc#1103948, bsc#1103949).
- usb: hub: Do not wait for connect state at resume for powered-off ports (bsc#1051510).
- usbip: usbip_detach: Fix memory, udev context and udev leak (bsc#1051510).
- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).
- virtio_balloon: fix another race between migration and ballooning (bsc#1051510).
- wlcore: sdio: check for valid platform device data before suspend (bsc#1051510).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/KVM/VMX: Add module argument for L1TF mitigation.
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- x86: Treat R_X86_64_PLT32 as R_X86_64_PC32 (binutils_2.31).
- x86/xen: init %gs very early to avoid page faults with stack protector (bnc#1104777).
- xen-netback: fix input validation in xenvif_set_hash_mapping() (bnc#1103277).
- xen/netfront: do not cache skb_shinfo() (bnc#1065600).
- xfs: catch inode allocation state mismatch corruption (bsc#1104211).
- xfs: prevent creating negative-sized file via INSERT_RANGE (bsc#1101833).
- xhci: Fix perceived dead host due to runtime suspend race with event handler (bsc#1051510).
Patchnames
SUSE-SLE-Module-Public-Cloud-15-2018-1701
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-5391: A remote attacker even with relatively low bandwidth could\n have caused lots of CPU usage by triggering the worst case scenario during\n fragment reassembly (bsc#1103097)\n- CVE-2018-3620, CVE-2018-3646: Local attackers in virtualized guest systems\n could use speculative code patterns on hyperthreaded processors to read data\n present in the L1 Datacache used by other hyperthreads on the same CPU core,\n potentially leaking sensitive data, even from other virtual machines or the\n host system. (bnc#1089343, bsc#1087081).\n- CVE-2018-10882: A local user could have caused an out-of-bound write, leading\n to denial of service and a system crash by unmounting a crafted ext4 filesystem\n image (bsc#1099849).\n- CVE-2018-10880: Prevent a stack-out-of-bounds write in the ext4 filesystem\n code when mounting and writing crafted ext4 images. An attacker could have used\n this to cause a system crash and a denial of service (bsc#1099845).\n- CVE-2018-10881: A local user could have caused an out-of-bound access and a\n system crash by mounting and operating on a crafted ext4 filesystem image\n (bsc#1099864).\n- CVE-2018-10877: Prevent an out-of-bound access in the ext4_ext_drop_refs()\n function when operating on a crafted ext4 filesystem image (bsc#1099846).\n- CVE-2018-10876: Prevent use-after-free in ext4_ext_remove_space() function\n when mounting and operating a crafted ext4 image (bsc#1099811).\n- CVE-2018-10878: A local user could have caused an out-of-bounds write and a\n denial of service by mounting and operating a crafted ext4 filesystem image\n (bsc#1099813).\n- CVE-2018-10883: A local user could have caused an out-of-bounds write in\n jbd2_journal_dirty_metadata(), a denial of service, and a system crash by\n mounting and operating on a crafted ext4 filesystem image (bsc#1099863).\n- CVE-2018-10879: A local user could have caused a use-after-free in\n ext4_xattr_set_entry function and a denial of service or unspecified other\n impact may occur by renaming a file in a crafted ext4 filesystem image\n (bsc#1099844).\n- CVE-2018-10853: A flaw was found in Linux Kernel KVM. In which certain\n instructions such as sgdt/sidt call segmented_write_std doesn't propagate\n access correctly. As such, during userspace induced exception, the\n guest can incorrectly assume that the exception happened in the kernel\n and panic. (bnc#1097104).\n\nThe following non-security bugs were fixed:\n\n- apci / lpss: Only call pwm_add_table() for Bay Trail PWM if PMIC HRV is 2 (bsc#1051510).\n- acpi / pci: Bail early in acpi_pci_add_bus() if there is no ACPI handle (bsc#1051510).\n- af_key: Always verify length of provided sadb_key (bsc#1051510).\n- af_key: fix buffer overread in parse_exthdrs() (bsc#1051510).\n- af_key: fix buffer overread in verify_address_len() (bsc#1051510).\n- afs: Fix directory permissions check (bsc#1101828).\n- agp: uninorth: make two functions static (bsc#1051510).\n- alsa: emu10k1: add error handling for snd_ctl_add (bsc#1051510).\n- alsa: emu10k1: Rate-limit error messages about page errors (bsc#1051510).\n- alsa: fm801: add error handling for snd_ctl_add (bsc#1051510).\n- alsa: snd-aoa: add of_node_put() in error path (bsc#1051510).\n- alsa: usb-audio: Apply rate limit to warning messages in URB complete callback (bsc#1051510).\n- arm64: Correct type for PUD macros (bsc#1103723).\n- arm64: Disable unhandled signal log messages by default (bsc#1103724).\n- arm64: KVM: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1103725).\n- arm64: mm: Fix set_memory_valid() declaration (bsc#1103726).\n- arm64: perf: correct PMUVer probing (bsc#1103727).\n- arm64: ptrace: Avoid setting compat FPR to garbage if get_user fails (bsc#1103728).\n- arm64: spinlock: Fix theoretical trylock() A-B-A with LSE atomics (bsc#1103729).\n- arm64: vdso: fix clock_getres for 4GiB-aligned res (bsc#1103730).\n- arm: 8715/1: add a private asm/unaligned.h (bsc#1051510).\n- arm: 8720/1: ensure dump_instr() checks addr_limit (bsc#1051510).\n- arm: 8721/1: mm: dump: check hardware RO bit for LPAE (bsc#1051510).\n- arm: 8722/1: mm: make STRICT_KERNEL_RWX effective for LPAE (bsc#1051510).\n- arm: 8731/1: Fix csum_partial_copy_from_user() stack mismatch (bsc#1051510).\n- arm: 8743/1: bL_switcher: add MODULE_LICENSE tag (bsc#1051510).\n- arm: 8746/1: vfp: Go back to clearing vfp_current_hw_state[] (bsc#1051510).\n- arm: 8748/1: mm: Define vdso_start, vdso_end as array (bsc#1051510).\n- arm: 8753/1: decompressor: add a missing parameter to the addruart macro (bsc#1051510).\n- arm: 8758/1: decompressor: restore r1 and r2 just before jumping to the kernel (bsc#1051510).\n- arm: 8764/1: kgdb: fix NUMREGBYTES so that gdb_regs[] is the correct size (bsc#1051510).\n- arm: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed (bsc#1051510).\n- arm: 8770/1: kprobes: Prohibit probing on optimized_callback (bsc#1051510).\n- arm: 8771/1: kprobes: Prohibit kprobes on do_undefinstr (bsc#1051510).\n- arm: 8772/1: kprobes: Prohibit kprobes on get_user functions (bsc#1051510).\n- arm: AM33xx: PRM: Remove am33xx_pwrdm_read_prev_pwrst function (bsc#1051510).\n- arm: amba: Fix race condition with driver_override (bsc#1051510).\n- arm: amba: Fix wrong indentation in driver_override_store() (bsc#1051510).\n- arm: amba: Make driver_override output consistent with other buses (bsc#1051510).\n- arm: at91: do not select CONFIG_ARM_CPU_SUSPEND for old platforms (bsc#1051510).\n- arm: avoid faulting on qemu (bsc#1051510).\n- arm: BUG if jumping to usermode address in kernel mode (bsc#1051510).\n- arm-ccn: perf: Prevent module unload while PMU is in use (bsc#1051510).\n- arm: davinci: Add dma_mask to dm365's eDMA device (bsc#1051510).\n- arm: davinci: board-da830-evm: fix GPIO lookup for MMC/SD (bsc#1051510).\n- arm: davinci: board-da850-evm: fix GPIO lookup for MMC/SD (bsc#1051510).\n- arm: davinci: board-da850-evm: fix WP pin polarity for MMC/SD (bsc#1051510).\n- arm: davinci: board-dm355-evm: fix broken networking (bsc#1051510).\n- arm: davinci: board-dm646x-evm: pass correct I2C adapter id for VPIF (bsc#1051510).\n- arm: davinci: board-dm646x-evm: set VPIF capture card name (bsc#1051510).\n- arm: davinci: board-omapl138-hawk: fix GPIO numbers for MMC/SD lookup (bsc#1051510).\n- arm: davinci: dm646x: fix timer interrupt generation (bsc#1051510).\n- arm: davinci: fix mmc entries in dm365's dma_slave_map (bsc#1051510).\n- arm: davinci: fix the GPIO lookup for omapl138-hawk (bsc#1051510).\n- arm: davinci: Use platform_device_register_full() to create pdev for dm365's eDMA (bsc#1051510).\n- arm: DRA722: remove redundant definition of 1.0 device (bsc#1051510).\n- arm: fix return value of parse_cpu_capacity (bsc#1051510).\n- arm: kexec: fix failure to boot crash kernel (bsc#1051510).\n- arm: kexec: fix kdump register saving on panic() (bsc#1051510).\n- arm: keystone: fix platform_domain_notifier array overrun (bsc#1051510).\n- arm: kvm: fix building with gcc-8 (bsc#1051510).\n- arm: multi_v7_defconfig: Replace DRM_RCAR_HDMI by generic bridge options (bsc#1051510).\n- arm: multi_v7_defconfig: Replace SND_SOC_RSRC_CARD by SND_SIMPLE_SCU_CARD (bsc#1051510).\n- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bsc#1051510).\n- arm: OMAP1: clock: Fix debugfs_create_*() usage (bsc#1051510).\n- arm: OMAP2+: Fix SRAM virt to phys translation for save_secure_ram_context (bsc#1051510).\n- arm: omap2: hide omap3_save_secure_ram on non-OMAP3 builds (bsc#1051510).\n- arm: OMAP2+: omap_device: drop broken RPM status update from suspend_noirq (bsc#1051510).\n- arm: OMAP2+: powerdomain: use raw_smp_processor_id() for trace (bsc#1051510).\n- arm: OMAP2+: timer: fix a kmemleak caused in omap_get_timer_dt (bsc#1051510).\n- arm: OMAP3: Fix prm wake interrupt for resume (bsc#1051510).\n- arm: OMAP3: hwmod_data: add missing module_offs for MMC3 (bsc#1051510).\n- arm: OMAP3+: PRM: fix of_irq_get() result check (bsc#1051510).\n- arm: OMAP4+: PRM: fix of_irq_get() result checks (bsc#1051510).\n- arm: OMAP: Fix dmtimer init for omap1 (bsc#1051510).\n- arm: OMAP: Fix SRAM W+X mapping (bsc#1051510).\n- arm: orion5x: Revert commit 4904dbda41c8 (bsc#1051510).\n- arm: orion: fix orion_ge00_switch_board_info initialization (bsc#1051510).\n- arm: pxa: select both FB and FB_W100 for eseries (bsc#1051510).\n- arm: pxa/tosa-bt: add MODULE_LICENSE tag (bsc#1051510).\n- arm: remove wrong CONFIG_PROC_SYSCTL ifdef (bsc#1051510).\n- arm: s3c24xx: Fix NAND ECC mode for mini2440 board (bsc#1051510).\n- arm: shmobile: defconfig: Enable missing PCIE_RCAR dependency (bsc#1051510).\n- arm: shmobile: defconfig: Replace DRM_RCAR_HDMI by generic bridge options (bsc#1051510).\n- arm: shmobile: defconfig: Replace SND_SOC_RSRC_CARD by SND_SIMPLE_SCU_CARD (bsc#1051510).\n- arm: shmobile: defconfig: Replace USB_XHCI_RCAR by USB_XHCI_PLATFORM (bsc#1051510).\n- arm: shmobile: rcar-gen2: Fix deadlock in regulator quirk (bsc#1051510).\n- arm: socfpga_defconfig: Remove QSPI Sector 4K size force (bsc#1051510).\n- arm: spear13xx: Fix dmas cells (bsc#1051510).\n- arm: sunxi_defconfig: Enable CMA (bsc#1051510).\n- arm: sunxi: fix the core number of V3s in sunxi README (bsc#1051510).\n- asoc: dpcm: do not merge format from invalid codec dai (bsc#1051510).\n- ASoC: dpcm: fix BE dai not hw_free and shutdown (bsc#1051510).\n- asoc: es7134: remove 64kHz rate from the supported rates (bsc#1051510).\n- asoc: rsnd: cmd: Add missing newline to debug message (bsc#1051510).\n- asoc: sirf: Fix potential NULL pointer dereference (bsc#1051510).\n- asoc: topology: Add missing clock gating parameter when parsing hw_configs (bsc#1051510).\n- asoc: topology: Fix bclk and fsync inversion in set_link_hw_format() (bsc#1051510).\n- asoc: zte: Fix incorrect PCM format bit usages (bsc#1051510).\n- ata: do not schedule hot plug if it is a sas host ().\n- ath: Add regulatory mapping for APL13_WORLD (bsc#1051510).\n- ath: Add regulatory mapping for APL2_FCCA (bsc#1051510).\n- ath: Add regulatory mapping for Bahamas (bsc#1051510).\n- ath: Add regulatory mapping for Bermuda (bsc#1051510).\n- ath: Add regulatory mapping for ETSI8_WORLD (bsc#1051510).\n- ath: Add regulatory mapping for FCC3_ETSIC (bsc#1051510).\n- ath: Add regulatory mapping for Serbia (bsc#1051510).\n- ath: Add regulatory mapping for Tanzania (bsc#1051510).\n- ath: Add regulatory mapping for Uganda (bsc#1051510).\n- audit: fix potential null dereference 'context->module.name' (bsc#1051510).\n- backlight: pwm_bl: Do not use GPIOF_* with gpiod_get_direction (bsc#1051510).\n- bdi: Move cgroup bdi_writeback to a dedicated low concurrency workqueue (bsc#1101867).\n- be2net: gather debug info and reset adapter (only for Lancer) on a tx-timeout (bsc#1086288).\n- be2net: Update the driver version to 12.0.0.0 (bsc#1086288 ).\n- befs_lookup(): use d_splice_alias() (bsc#1101844).\n- block: Fix transfer when chunk sectors exceeds max (bsc#1101874).\n- Bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bsc#1051510).\n- Bluetooth: btusb: add ID for LiteOn 04ca:301a (bsc#1051510).\n- Bluetooth: hci_qca: Fix 'Sleep inside atomic section' warning (bsc#1051510).\n- bpf, ppc64: fix unexpected r0=0 exit path inside bpf_xadd (bsc#1083647).\n- branch-check: fix long->int truncation when profiling branches (bsc#1101116,).\n- brcmfmac: Add support for bcm43364 wireless chipset (bsc#1051510).\n- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).\n- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).\n- cachefiles: Wait rather than BUG'ing on 'Unexpected object collision' (bsc#1099858).\n- can: dev: increase bus-off message severity (bsc#1051510).\n- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bsc#1051510).\n- can: m_can: change comparison to bitshift when dealing with a mask (bsc#1051510).\n- cdrom: do not call check_disk_change() inside cdrom_open() (bsc#1101872).\n- clk: at91: fix clk-generated compilation (bsc#1051510).\n- clk: renesas: cpg-mssr: Stop using printk format %pCr (bsc#1051510).\n- coccinelle: fix parallel build with CHECK=scripts/coccicheck (bsc#1051510).\n- compiler.h: enable builtin overflow checkers and add fallback code (bsc#1101116,).\n- cpufreq: intel_pstate: Limit the scope of HWP dynamic boost platforms (bsc#1066110).\n- cpu/hotplug: Make bringup/teardown of smp threads symmetric (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- crypto: authenc - do not leak pointers to authenc keys (bsc#1051510).\n- crypto: authencesn - do not leak pointers to authenc keys (bsc#1051510).\n- crypto: padlock-aes - Fix Nano workaround data corruption (bsc#1051510).\n- delayacct: fix crash in delayacct_blkio_end() after delayacct init failure (bsc#1104066).\n- Delete patches.suse/0201-dax-dm-allow-device-mapper-to-operate-without-dax-su.patch (bsc#1103917).\n- disable PINCTRL_LEWISBURG\n- dm: add writecache target (bsc#1101116,).\n- dm: prevent DAX mounts if not supported (bsc#1103917).\n- dm writecache: support optional offset for start of device (bsc#1101116,).\n- dm writecache: use 2-factor allocator arguments (bsc#1101116,).\n- doc: Add vendor prefix for Kieback and Peter GmbH (bsc#1051510).\n- docs: zh_CN: fix location of oops-tracing.txt (bsc#1051510).\n- drivers: soc: sunxi: fix error processing on base address when claiming (bsc#1051510).\n- drm: Add DP PSR2 sink enable bit (bsc#1051510).\n- drm/amdgpu: Remove VRAM from shared bo domains (bsc#1051510).\n- drm/atomic: Check old_plane_state->crtc in drm_atomic_helper_async_check() (bsc#1051510).\n- drm/atomic: Handling the case when setting old crtc for plane (bsc#1051510).\n- drm/atomic-helper: Drop plane->fb references only for drm_atomic_helper_shutdown() (bsc#1051510).\n- drm/atomic: Initialize variables in drm_atomic_helper_async_check() to make gcc happy (bsc#1051510).\n- drm/atomic: Make async plane update checks work as intended, v2 (bsc#1051510).\n- drm/atomic: Make atomic helper track newly assigned planes correctly, v2 (bsc#1051510).\n- drm/atomic: Make atomic iterators less surprising (bsc#1051510).\n- drm/cirrus: Use drm_framebuffer_put to avoid kernel oops in clean-up (bsc#1101822).\n- drm/dp/mst: Fix off-by-one typo when dump payload table (bsc#1051510).\n- drm/gma500: fix psb_intel_lvds_mode_valid()'s return type (bsc#1051510).\n- drm/nouveau/fifo/gk104-: poll for runlist update completion (bsc#1051510).\n- drm/radeon: fix mode_valid's return type (bsc#1051510).\n- drm: re-enable error handling (bsc#1051510).\n- drm/vc4: Reset ->{x, y}_scaling[1] when dealing with uniplanar formats (bsc#1051510).\n- edac: Add missing MEM_LRDDR4 entry in edac_mem_types[] (bsc#1103886).\n- edac, altera: Fix ARM64 build warning (bsc#1051510).\n- edac: Drop duplicated array of strings for memory type names (bsc#1103886).\n- edac, mv64x60: Fix an error handling path (bsc#1051510).\n- edac, octeon: Fix an uninitialized variable warning (bsc#1051510).\n- edac, sb_edac: Fix missing break in switch (bsc#1051510).\n- ext2: fix a block leak (bsc#1101875).\n- ext4: add more mount time checks of the superblock (bsc#1101900).\n- ext4: bubble errors from ext4_find_inline_data_nolock() up to ext4_iget() (bsc#1101896).\n- ext4: check for allocation block validity with block group locked (bsc#1104495).\n- ext4: check superblock mapped prior to committing (bsc#1101902).\n- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).\n- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).\n- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).\n- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).\n- ext4: fix fencepost error in check for inode count overflow during resize (bsc#1101853).\n- ext4: fix inline data updates with checksums enabled (bsc#1104494).\n- ext4: include the illegal physical block in the bad map ext4_error msg (bsc#1101903).\n- ext4: report delalloc reserve as non-free in statfs for project quota (bsc#1101843).\n- ext4: update mtime in ext4_punch_hole even if no blocks are released (bsc#1101895).\n- f2fs: call unlock_new_inode() before d_instantiate() (bsc#1101837).\n- fix io_destroy()/aio_complete() race (bsc#1101852).\n- Force log to disk before reading the AGF during a fstrim (bsc#1101893).\n- fs: allow per-device dax status checking for filesystems (bsc#1103917).\n- fscache: Allow cancelled operations to be enqueued (bsc#1099858).\n- fscache: Fix hanging wait on page discarded by writeback (bsc#1101885).\n- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).\n- fs: clear writeback errors in inode_init_always (bsc#1101882).\n- fs: do not scan the inode cache before SB_BORN is set (bsc#1101883).\n- geneve: update skb dst pmtu on tx path (bsc#1051510).\n- genirq: Check __free_irq() return value for NULL (bsc#1103517).\n- genirq: Fix editing error in a comment (bsc#1051510).\n- genirq: Make force irq threading setup more robust (bsc#1051510).\n- gtp: Initialize 64-bit per-cpu stats correctly (bsc#1051510).\n- HID: hid-plantronics: Re-resend Update to map button for PTT products (bsc#1051510).\n- HID: i2c-hid: check if device is there before really probing (bsc#1051510).\n- hippi: Fix a Fix a possible sleep-in-atomic bug in rr_close (bsc#1051510).\n- hns3: fix unused function warning (bsc#1104353).\n- hns3pf: do not check handle during mqprio offload (bsc#1104353 ).\n- hns3pf: fix hns3_del_tunnel_port() (bsc#1104353).\n- hns3pf: Fix some harmless copy and paste bugs (bsc#1104353 ).\n- hv_netvsc: Ensure correct teardown message sequence order ().\n- hv/netvsc: fix handling of fallback to single queue mode ().\n- hv_netvsc: Fix napi reschedule while receive completion is busy.\n- hv_netvsc: Fix net device attach on older Windows hosts ().\n- hv/netvsc: Fix NULL dereference at single queue mode fallback (bsc#1104708).\n- hv_netvsc: set master device (bsc#1051979).\n- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() ().\n- hv_netvsc: split sub-channel setup into async and sync ().\n- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown ().\n- hwmon: (asus_atk0110) Replace deprecated device register call (bsc#1103363).\n- i2c: imx: Fix reinit_completion() use (bsc#1051510).\n- IB/hns: Annotate iomem pointers correctly (bsc#1104427 ).\n- IB/hns: Avoid compile test under non 64bit environments (bsc#1104427).\n- IB/hns: Declare local functions 'static' (bsc#1104427 ).\n- IB/hns: fix boolreturn.cocci warnings (bsc#1104427).\n- IB/hns: Fix for checkpatch.pl comment style warnings (bsc#1104427).\n- IB/hns: fix memory leak on ah on error return path (bsc#1104427 ).\n- IB/hns: fix returnvar.cocci warnings (bsc#1104427).\n- IB/hns: fix semicolon.cocci warnings (bsc#1104427).\n- IB/hns: Fix the bug of polling cq failed for loopback Qps (bsc#1104427). \n- IB/hns: Fix the bug with modifying the MAC address without removing the driver (bsc#1104427).\n- IB/hns: Fix the bug with rdma operation (bsc#1104427 ).\n- IB/hns: Fix the bug with wild pointer when destroy rc qp (bsc#1104427).\n- IB/hns: include linux/interrupt.h (bsc#1104427).\n- IB/hns: Support compile test for hns RoCE driver (bsc#1104427 ).\n- IB/hns: Use zeroing memory allocator instead of allocator/memset (bsc#1104427).\n- ibmasm: do not write out of bounds in read handler (bsc#1051510).\n- ibmvnic: Remove code to request error information (bsc#1104174).\n- ibmvnic: Revise RX/TX queue error messages (bsc#1101331).\n- ibmvnic: Update firmware error reporting with cause string (bsc#1104174).\n- init: rename and re-order boot_cpu_state_init() (bsc#1104365).\n- Input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bsc#1051510).\n- Input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bsc#1051510).\n- Input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bsc#1051510).\n- irqchip: brcmstb-l2: Define an irq_pm_shutdown function (bsc#1051510).\n- irqchip/gic: Take lock when updating irq type (bsc#1051510).\n- irqchip/gic-v3: Change pr_debug message to pr_devel (bsc#1051510).\n- irqchip/gic-v3: Fix the driver probe() fail due to disabled GICC entry (bsc#1051510).\n- irqchip/gic-v3: Ignore disabled ITS nodes (bsc#1051510).\n- irqchip/gic-v3: Use wmb() instead of smb_wmb() in gic_raise_softirq() (bsc#1051510).\n- irqchip/qcom: Fix check for spurious interrupts (bsc#1051510).\n- irqchip/qcom: Fix u32 comparison with value less than zero (bsc#1051510).\n- isofs: fix potential memory leak in mount option parsing (bsc#1101887).\n- iwlwifi: add more card IDs for 9000 series (bsc#1051510).\n- iwlwifi: pcie: fix race in Rx buffer allocator (bsc#1051510).\n- jump_label: Fix concurrent static_key_enable/disable() (bsc#1089343).\n- jump_label: Provide hotplug context variants (bsc#1089343).\n- jump_label: Reorder hotplug lock and jump_label_lock (bsc#1089343).\n- kabi protect bdev_dax_supported (bsc#1103917).\n- kabi protect struct ccw_device_private (bsc#1103421).\n- KABI protect structy ata_host (git-fixes).\n- kabi/severities: Allow kABI changes for kvm/x86 (except for kvm_x86_ops)\n- kabi/severities: do not complain on hisi_sas internal changes ().\n- kabi/severities: ignore qla2xxx as all symbols are internal\n- kabi/severities: ignore x86_kvm_ops; lttng-modules would have to be adjusted in case they depend on this particular change\n- kbuild: add '-fno-stack-check' to kernel build options (bsc#1051510).\n- kbuild: Handle builtin dtb file names containing hyphens (bsc#1051510).\n- kbuild: pkg: use --transform option to prefix paths in tar (bsc#1051510).\n- kconfig: display recursive dependency resolution hint just once (bsc#1051510).\n- kmemleak: add scheduling point to kmemleak_scan() (bsc#1051510).\n- kthread, tracing: Do not expose half-written comm when creating kthreads (bsc#1104897).\n- KVM: SVM: Add pause filter threshold ().\n- KVM: SVM: Implement pause loop exit logic in SVM ().\n- KVM: VMX: Bring the common code to header file ().\n- KVM: VMX: Fix the module parameters for vmx ().\n- KVM: VMX: Remove ple_window_actual_max ().\n- libata: add refcounting to ata_host (git-fixes).\n- libata: ensure host is free'd on error exit paths (git-fixes).\n- libnvdimm, dimm: fix dpa reservation vs uninitialized label area (git-fixes).\n- linvdimm, pmem: Preserve read-only setting for pmem devices (git-fixes).\n- MAINTAINERS: review Renesas DT bindings as well (bsc#1051510).\n- media: media-device: fix ioctl function types (bsc#1051510).\n- media: omap3isp: fix unbalanced dma_iommu_mapping (bsc#1051510).\n- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bsc#1051510).\n- media: rc: oops in ir_timer_keyup after device unplug (bsc#1090888).\n- media: saa7164: Fix driver name in debug output (bsc#1051510).\n- media: si470x: fix __be16 annotations (bsc#1051510).\n- media: siano: get rid of __le32/__le16 cast warnings (bsc#1051510).\n- media: tw686x: Fix incorrect vb2_mem_ops GFP flags (bsc#1051510).\n- media: videobuf2-core: do not call memop 'finish' when queueing (bsc#1051510).\n- mfd: cros_ec: Fail early if we cannot identify the EC (bsc#1051510).\n- mfd: fsl-imx25: Clean up irq settings during removal (bsc#1051510).\n- mfd: mxs-lradc: Fix error handling in mxs_lradc_probe() (bsc#1051510).\n- misc: pci_endpoint_test: Avoid triggering a BUG() (bsc#1051510).\n- mmc: dw_mmc: update actual clock for mmc debugfs (bsc#1051510).\n- mmc: pwrseq: Use kmalloc_array instead of stack VLA (bsc#1051510).\n- mm: fix __gup_device_huge vs unmap (bsc#1101839).\n- mm/kmemleak.c: make cond_resched() rate-limiting more efficient (bsc#1051510).\n- mwifiex: correct histogram data with appropriate index (bsc#1051510).\n- mwifiex: handle race during mwifiex_usb_disconnect (bsc#1051510).\n- net: hns3: Add a check for client instance init state (bsc#1104353).\n- net: hns3: add a mask initialization for mac_vlan table (bsc#1104353).\n- net: hns3: Add *Asserting Reset* mailbox message and handling in VF (bsc#1104353).\n- net: hns3: add Asym Pause support to phy default features (bsc#1104353).\n- net: hns3: Add dcb netlink interface for the support of DCB feature (bsc#1104353).\n- net: hns3: Add DCB support when interacting with network stack (bsc#1104353).\n- net: hns3: Add ethtool interface for vlan filter (bsc#1104353 ).\n- net: hns3: add ethtool_ops.get_channels support for VF (bsc#1104353).\n- net: hns3: add ethtool_ops.get_coalesce support to PF (bsc#1104353).\n- net: hns3: add ethtool_ops.set_coalesce support to PF (bsc#1104353).\n- net: hns3: add ethtool -p support for fiber port (bsc#1104353 ).\n- net: hns3: add ethtool related offload command (bsc#1104353 ).\n- net: hns3: Add Ethtool support to HNS3 driver (bsc#1104353 ).\n- net: hns3: add existence checking before adding unicast mac address (bsc#1104353).\n- net: hns3: add existence check when remove old uc mac address (bsc#1104353).\n- net: hns3: add feature check when feature changed (bsc#1104353 ).\n- net: hns3: add get_link support to VF (bsc#1104353).\n- net: hns3: add get/set_coalesce support to VF (bsc#1104353 ).\n- net: hns3: add handling vlan tag offload in bd (bsc#1104353 ).\n- net: hns3: Add hclge_dcb module for the support of DCB feature (bsc#1104353).\n- net: hns3: Add HNS3 Acceleration Engine and Compatibility Layer Support (bsc#1104353).\n- net: hns3: Add HNS3 driver to kernel build framework and MAINTAINERS (bsc#1104353).\n- net: hns3: Add hns3_get_handle macro in hns3 driver (bsc#1104353 ).\n- net: hns3: Add HNS3 IMP(Integrated Mgmt Proc) Cmd Interface Support (bsc#1104353).\n- net: hns3: Add HNS3 VF driver to kernel build framework (bsc#1104353).\n- net: hns3: Add HNS3 VF HCL(Hardware Compatibility Layer) Support (bsc#1104353).\n- net: hns3: Add HNS3 VF IMP(Integrated Management Proc) cmd interface (bsc#1104353).\n- net: hns3: add int_gl_idx setup for TX and RX queues (bsc#1104353).\n- net: hns3: add int_gl_idx setup for VF (bsc#1104353 ).\n- net: hns3: Add mac loopback selftest support in hns3 driver (bsc#1104353).\n- net: hns3: Add mailbox interrupt handling to PF driver (bsc#1104353).\n- net: hns3: Add mailbox support to PF driver (bsc#1104353 ).\n- net: hns3: Add mailbox support to VF driver (bsc#1104353 ).\n- net: hns3: add manager table initialization for hardware (bsc#1104353).\n- net: hns3: Add MDIO support to HNS3 Ethernet driver for hip08 SoC (bsc#1104353).\n- net: hns3: Add missing break in misc_irq_handle (bsc#1104353 ).\n- net: hns3: Add more packet size statisctics (bsc#1104353 ).\n- net: hns3: add MTU initialization for hardware (bsc#1104353 ).\n- net: hns3: add net status led support for fiber port (bsc#1104353).\n- net: hns3: add nic_client check when initialize roce base information (bsc#1104353).\n- net: hns3: add querying speed and duplex support to VF (bsc#1104353).\n- net: hns3: Add repeat address checking for setting mac address (bsc#1104353).\n- net: hns3: Add reset interface implementation in client (bsc#1104353).\n- net: hns3: Add reset process in hclge_main (bsc#1104353 ).\n- net: hns3: Add reset service task for handling reset requests (bsc#1104353).\n- net: hns3: add result checking for VF when modify unicast mac address (bsc#1104353).\n- net: hns3: Add some interface for the support of DCB feature (bsc#1104353).\n- net: hns3: Adds support for led locate command for copper port (bsc#1104353).\n- net: hns3: Add STRP_TAGP field support for hardware revision 0x21 (bsc#1104353).\n- net: hns3: Add support for dynamically buffer reallocation (bsc#1104353).\n- net: hns3: add support for ETHTOOL_GRXFH (bsc#1104353 ).\n- net: hns3: add support for get_regs (bsc#1104353).\n- net: hns3: Add support for IFF_ALLMULTI flag (bsc#1104353 ).\n- net: hns3: Add support for misc interrupt (bsc#1104353 ).\n- net: hns3: add support for nway_reset (bsc#1104353).\n- net: hns3: Add support for PFC setting in TM module (bsc#1104353 ).\n- net: hns3: Add support for port shaper setting in TM module (bsc#1104353).\n- net: hns3: add support for querying advertised pause frame by ethtool ethx (bsc#1104353).\n- net: hns3: add support for querying pfc puase packets statistic (bsc#1104353).\n- net: hns3: add support for set_link_ksettings (bsc#1104353 ).\n- net: hns3: add support for set_pauseparam (bsc#1104353 ).\n- net: hns3: add support for set_ringparam (bsc#1104353 ).\n- net: hns3: add support for set_rxnfc (bsc#1104353).\n- net: hns3: Add support for tx_accept_tag2 and tx_accept_untag2 config (bsc#1104353).\n- net: hns3: add support for VF driver inner interface hclgevf_ops.get_tqps_and_rss_info (bsc#1104353).\n- net: hns3: Add support of hardware rx-vlan-offload to HNS3 VF driver (bsc#1104353).\n- net: hns3: Add support of HNS3 Ethernet Driver for hip08 SoC (bsc#1104353).\n- net: hns3: Add support of .sriov_configure in HNS3 driver (bsc#1104353).\n- net: hns3: Add support of the HNAE3 framework (bsc#1104353 ).\n- net: hns3: Add support of TX Scheduler and Shaper to HNS3 driver (bsc#1104353).\n- net: hns3: Add support to change MTU in HNS3 hardware (bsc#1104353).\n- net: hns3: Add support to enable TX/RX promisc mode for H/W rev(0x21) (bsc#1104353).\n- net: hns3: add support to modify tqps number (bsc#1104353 ).\n- net: hns3: add support to query tqps number (bsc#1104353 ).\n- net: hns3: Add support to re-initialize the hclge device (bsc#1104353).\n- net: hns3: Add support to request VF Reset to PF (bsc#1104353 ).\n- net: hns3: Add support to reset the enet/ring mgmt layer (bsc#1104353).\n- net: hns3: add support to update flow control settings after autoneg (bsc#1104353).\n- net: hns3: Add tc-based TM support for sriov enabled port (bsc#1104353).\n- net: hns3: Add timeout process in hns3_enet (bsc#1104353 ).\n- net: hns3: Add VF Reset device state and its handling (bsc#1104353).\n- net: hns3: Add VF Reset Service Task to support event handling (bsc#1104353).\n- net: hns3: add vlan offload config command (bsc#1104353 ).\n- net: hns3: change GL update rate (bsc#1104353).\n- net: hns3: Change PF to add ring-vect binding and resetQ to mailbox (bsc#1104353).\n- net: hns3: Change return type of hnae3_register_ae_algo (bsc#1104353).\n- net: hns3: Change return type of hnae3_register_ae_dev (bsc#1104353).\n- net: hns3: Change return value in hnae3_register_client (bsc#1104353).\n- net: hns3: Changes required in PF mailbox to support VF reset (bsc#1104353).\n- net: hns3: Changes to make enet watchdog timeout func common for PF/VF (bsc#1104353).\n- net: hns3: Changes to support ARQ(Asynchronous Receive Queue) (bsc#1104353).\n- net: hns3: change the returned tqp number by ethtool -x (bsc#1104353).\n- net: hns3: change the time interval of int_gl calculating (bsc#1104353).\n- net: hns3: change the unit of GL value macro (bsc#1104353 ).\n- net: hns3: change TM sched mode to TC-based mode when SRIOV enabled (bsc#1104353).\n- net: hns3: check for NULL function pointer in hns3_nic_set_features (bsc#1104353).\n- net: hns3: Cleanup for endian issue in hns3 driver (bsc#1104353 ).\n- net: hns3: Cleanup for non-static function in hns3 driver (bsc#1104353).\n- net: hns3: Cleanup for ROCE capability flag in ae_dev (bsc#1104353).\n- net: hns3: Cleanup for shifting true in hns3 driver (bsc#1104353 ).\n- net: hns3: Cleanup for struct that used to send cmd to firmware (bsc#1104353).\n- net: hns3: Cleanup indentation for Kconfig in the the hisilicon folder (bsc#1104353).\n- net: hns3: cleanup mac auto-negotiation state query (bsc#1104353 ).\n- net: hns3: cleanup mac auto-negotiation state query in hclge_update_speed_duplex (bsc#1104353).\n- net: hns3: cleanup of return values in hclge_init_client_instance() (bsc#1104353).\n- net: hns3: Clear TX/RX rings when stopping port and un-initializing client (bsc#1104353).\n- net: hns3: Consistently using GENMASK in hns3 driver (bsc#1104353).\n- net: hns3: converting spaces into tabs to avoid checkpatch.pl warning (bsc#1104353).\n- net: hns3: Disable VFs change rxvlan offload status (bsc#1104353 ).\n- net: hns3: Disable vf vlan filter when vf vlan table is full (bsc#1104353).\n- net: hns3: ensure media_type is unitialized (bsc#1104353 ).\n- net: hns3: export pci table of hclge and hclgevf to userspace (bsc#1104353).\n- net: hns3: fix a bug about hns3_clean_tx_ring (bsc#1104353 ).\n- net: hns3: fix a bug for phy supported feature initialization (bsc#1104353).\n- net: hns3: fix a bug in hclge_uninit_client_instance (bsc#1104353).\n- net: hns3: fix a bug in hns3_driv_to_eth_caps (bsc#1104353 ).\n- net: hns3: fix a bug when alloc new buffer (bsc#1104353 ).\n- net: hns3: fix a bug when getting phy address from NCL_config file (bsc#1104353).\n- net: hns3: fix a dead loop in hclge_cmd_csq_clean (bsc#1104353 ).\n- net: hns3: fix a handful of spelling mistakes (bsc#1104353 ).\n- net: hns3: Fix a loop index error of tqp statistics query (bsc#1104353).\n- net: hns3: Fix a misuse to devm_free_irq (bsc#1104353 ).\n- net: hns3: Fix an error handling path in 'hclge_rss_init_hw()' (bsc#1104353).\n- net: hns3: Fix an error macro definition of HNS3_TQP_STAT (bsc#1104353).\n- net: hns3: Fix an error of total drop packet statistics (bsc#1104353).\n- net: hns3: Fix a response data read error of tqp statistics query (bsc#1104353).\n- net: hns3: fix endian issue when PF get mbx message flag (bsc#1104353).\n- net: hns3: fix error type definition of return value (bsc#1104353).\n- net: hns3: Fixes API to fetch ethernet header length with kernel default (bsc#1104353).\n- net: hns3: Fixes error reported by Kbuild and internal review (bsc#1104353).\n- net: hns3: Fixes initalization of RoCE handle and makes it conditional (bsc#1104353).\n- net: hns3: Fixes initialization of phy address from firmware (bsc#1104353).\n- net: hns3: Fixes kernel panic issue during rmmod hns3 driver (bsc#1104353).\n- net: hns3: Fixes ring-to-vector map-and-unmap command (bsc#1104353).\n- net: hns3: Fixes the back pressure setting when sriov is enabled (bsc#1104353).\n- net: hns3: Fixes the command used to unmap ring from vector (bsc#1104353).\n- net: hns3: Fixes the default VLAN-id of PF (bsc#1104353 ).\n- net: hns3: Fixes the error legs in hclge_init_ae_dev function (bsc#1104353).\n- net: hns3: Fixes the ether address copy with appropriate API (bsc#1104353).\n- net: hns3: Fixes the initialization of MAC address in hardware (bsc#1104353).\n- net: hns3: Fixes the init of the VALID BD info in the descriptor (bsc#1104353).\n- net: hns3: Fixes the missing PCI iounmap for various legs (bsc#1104353).\n- net: hns3: Fixes the missing u64_stats_fetch_begin_irq in 64-bit stats fetch (bsc#1104353).\n- net: hns3: Fixes the out of bounds access in hclge_map_tqp (bsc#1104353).\n- net: hns3: Fixes the premature exit of loop when matching clients (bsc#1104353).\n- net: hns3: fixes the ring index in hns3_fini_ring (bsc#1104353 ).\n- net: hns3: Fixes the state to indicate client-type initialization (bsc#1104353).\n- net: hns3: Fixes the static checker error warning in hns3_get_link_ksettings() (bsc#1104353).\n- net: hns3: Fixes the static check warning due to missing unsupp L3 proto check (bsc#1104353).\n- net: hns3: Fixes the wrong IS_ERR check on the returned phydev value (bsc#1104353).\n- net: hns3: fix for buffer overflow smatch warning (bsc#1104353 ).\n- net: hns3: fix for changing MTU (bsc#1104353).\n- net: hns3: fix for cleaning ring problem (bsc#1104353 ).\n- net: hns3: Fix for CMDQ and Misc. interrupt init order problem (bsc#1104353).\n- net: hns3: fix for coal configuation lost when setting the channel (bsc#1104353).\n- net: hns3: fix for coalesce configuration lost during reset (bsc#1104353).\n- net: hns3: Fix for deadlock problem occurring when unregistering ae_algo (bsc#1104353).\n- net: hns3: Fix for DEFAULT_DV when dev does not support DCB (bsc#1104353).\n- net: hns3: Fix for fiber link up problem (bsc#1104353 ).\n- net: hns3: fix for getting advertised_caps in hns3_get_link_ksettings (bsc#1104353).\n- net: hns3: fix for getting autoneg in hns3_get_link_ksettings (bsc#1104353).\n- net: hns3: fix for getting auto-negotiation state in hclge_get_autoneg (bsc#1104353).\n- net: hns3: fix for getting wrong link mode problem (bsc#1104353 ).\n- net: hns3: Fix for hclge_reset running repeatly problem (bsc#1104353).\n- net: hns3: Fix for hns3 module is loaded multiple times problem (bsc#1104353).\n- net: hns3: fix for ipv6 address loss problem after setting channels (bsc#1104353).\n- net: hns3: fix for loopback failure when vlan filter is enable (bsc#1104353).\n- net: hns3: fix for netdev not running problem after calling net_stop and net_open (bsc#1104353).\n- net: hns3: Fix for netdev not running problem after calling net_stop and net_open (bsc#1104353).\n- net: hns3: fix for not initializing VF rss_hash_key problem (bsc#1104353).\n- net: hns3: fix for not returning problem in get_link_ksettings when phy exists (bsc#1104353).\n- net: hns3: fix for not setting pause parameters (bsc#1104353 ).\n- net: hns3: Fix for not setting rx private buffer size to zero (bsc#1104353).\n- net: hns3: Fix for packet loss due wrong filter config in VLAN tbls (bsc#1104353).\n- net: hns3: fix for pause configuration lost during reset (bsc#1104353).\n- net: hns3: Fix for PF mailbox receving unknown message (bsc#1104353).\n- net: hns3: fix for phy_addr error in hclge_mac_mdio_config (bsc#1104353).\n- net: hns3: Fix for phy not link up problem after resetting (bsc#1104353).\n- net: hns3: Fix for pri to tc mapping in TM (bsc#1104353 ).\n- net: hns3: fix for returning wrong value problem in hns3_get_rss_indir_size (bsc#1104353).\n- net: hns3: fix for returning wrong value problem in hns3_get_rss_key_size (bsc#1104353).\n- net: hns3: fix for RSS configuration loss problem during reset (bsc#1104353).\n- net: hns3: Fix for rx priv buf allocation when DCB is not supported (bsc#1104353).\n- net: hns3: Fix for rx_priv_buf_alloc not setting rx shared buffer (bsc#1104353).\n- net: hns3: Fix for service_task not running problem after resetting (bsc#1104353).\n- net: hns3: Fix for setting mac address when resetting (bsc#1104353).\n- net: hns3: fix for setting MTU (bsc#1104353).\n- net: hns3: Fix for setting rss_size incorrectly (bsc#1104353 ).\n- net: hns3: Fix for the null pointer problem occurring when initializing ae_dev failed (bsc#1104353).\n- net: hns3: fix for the wrong shift problem in hns3_set_txbd_baseinfo (bsc#1104353).\n- net: hns3: fix for updating fc_mode_last_time (bsc#1104353 ).\n- net: hns3: fix for use-after-free when setting ring parameter (bsc#1104353).\n- net: hns3: Fix for VF mailbox cannot receiving PF response (bsc#1104353).\n- net: hns3: Fix for VF mailbox receiving unknown message (bsc#1104353).\n- net: hns3: fix for vlan table lost problem when resetting (bsc#1104353).\n- net: hns3: Fix for vxlan tx checksum bug (bsc#1104353 ).\n- net: hns3: Fix initialization when cmd is not supported (bsc#1104353).\n- net: hns3: fix length overflow when CONFIG_ARM64_64K_PAGES (bsc#1104353).\n- net: hns3: fix null pointer dereference before null check (bsc#1104353).\n- net: hns3: fix return value error of hclge_get_mac_vlan_cmd_status() (bsc#1104353).\n- net: hns3: fix rx path skb->truesize reporting bug (bsc#1104353 ).\n- net: hns3: Fix setting mac address error (bsc#1104353 ).\n- net: hns3: Fix spelling errors (bsc#1104353).\n- net: hns3: fix spelling mistake: 'capabilty' -> 'capability' (bsc#1104353).\n- net: hns3: fix the bug of hns3_set_txbd_baseinfo (bsc#1104353 ).\n- net: hns3: fix the bug when map buffer fail (bsc#1104353 ).\n- net: hns3: fix the bug when reuse command description in hclge_add_mac_vlan_tbl (bsc#1104353).\n- net: hns3: Fix the missing client list node initialization (bsc#1104353).\n- net: hns3: fix the ops check in hns3_get_rxnfc (bsc#1104353 ).\n- net: hns3: fix the queue id for tqp enable and reset (bsc#1104353 ).\n- net: hns3: fix the ring count for ETHTOOL_GRXRINGS (bsc#1104353 ).\n- net: hns3: fix the TX/RX ring.queue_index in hns3_ring_get_cfg (bsc#1104353).\n- net: hns3: fix the VF queue reset flow error (bsc#1104353 ).\n- net: hns3: fix to correctly fetch l4 protocol outer header (bsc#1104353).\n- net: hns3: Fix to support autoneg only for port attached with phy (bsc#1104353).\n- net: hns3: Fix typo error for feild in hclge_tm (bsc#1104353 ).\n- net: hns3: free the ring_data structrue when change tqps (bsc#1104353).\n- net: hns3: get rss_size_max from configuration but not hardcode (bsc#1104353).\n- net: hns3: get vf count by pci_sriov_get_totalvfs (bsc#1104353 ).\n- net: hns3: hclge_inform_reset_assert_to_vf() can be static (bsc#1104353).\n- net: hns3: hns3:fix a bug about statistic counter in reset process (bsc#1104353).\n- net: hns3: hns3_get_channels() can be static (bsc#1104353 ).\n- net: hns3: Increase the default depth of bucket for TM shaper (bsc#1104353).\n- net: hns3: increase the max time for IMP handle command (bsc#1104353).\n- net: hns3: make local functions static (bsc#1104353 ).\n- net: hns3: Mask the packet statistics query when NIC is down (bsc#1104353).\n- net: hns3: Modify the update period of packet statistics (bsc#1104353).\n- net: hns3: never send command queue message to IMP when reset (bsc#1104353).\n- net: hns3: Optimize PF CMDQ interrupt switching process (bsc#1104353).\n- net: hns3: Optimize the PF's process of updating multicast MAC (bsc#1104353).\n- net: hns3: Optimize the VF's process of updating multicast MAC (bsc#1104353).\n- net: hns3: reallocate tx/rx buffer after changing mtu (bsc#1104353).\n- net: hns3: refactor GL update function (bsc#1104353 ).\n- net: hns3: refactor interrupt coalescing init function (bsc#1104353).\n- net: hns3: Refactor mac_init function (bsc#1104353).\n- net: hns3: Refactor of the reset interrupt handling logic (bsc#1104353).\n- net: hns3: Refactors the requested reset and pending reset handling code (bsc#1104353).\n- net: hns3: refactor the coalesce related struct (bsc#1104353 ).\n- net: hns3: refactor the get/put_vector function (bsc#1104353 ).\n- net: hns3: refactor the hclge_get/set_rss function (bsc#1104353 ).\n- net: hns3: refactor the hclge_get/set_rss_tuple function (bsc#1104353).\n- net: hns3: Refactor the initialization of command queue (bsc#1104353).\n- net: hns3: refactor the loopback related function (bsc#1104353 ).\n- net: hns3: Refactor the mapping of tqp to vport (bsc#1104353 ).\n- net: hns3: Refactor the skb receiving and transmitting function (bsc#1104353).\n- net: hns3: remove a couple of redundant assignments (bsc#1104353 ).\n- net: hns3: remove add/del_tunnel_udp in hns3_enet module (bsc#1104353).\n- net: hns3: Remove a useless member of struct hns3_stats (bsc#1104353).\n- net: hns3: Remove error log when getting pfc stats fails (bsc#1104353).\n- net: hns3: Remove packet statistics in the range of 8192~12287 (bsc#1104353).\n- net: hns3: remove redundant memset when alloc buffer (bsc#1104353).\n- net: hns3: remove redundant semicolon (bsc#1104353).\n- net: hns3: Remove repeat statistic of rx_errors (bsc#1104353 ).\n- net: hns3: Removes unnecessary check when clearing TX/RX rings (bsc#1104353).\n- net: hns3: remove TSO config command from VF driver (bsc#1104353 ).\n- net: hns3: remove unnecessary pci_set_drvdata() and devm_kfree() (bsc#1104353).\n- net: hns3: remove unused GL setup function (bsc#1104353 ).\n- net: hns3: remove unused hclgevf_cfg_func_mta_filter (bsc#1104353).\n- net: hns3: Remove unused led control code (bsc#1104353 ).\n- net: hns3: report the function type the same line with hns3_nic_get_stats64 (bsc#1104353).\n- net: hns3: set the cmdq out_vld bit to 0 after used (bsc#1104353 ).\n- net: hns3: set the max ring num when alloc netdev (bsc#1104353 ).\n- net: hns3: Setting for fc_mode and dcb enable flag in TM module (bsc#1104353).\n- net: hns3: Support for dynamically assigning tx buffer to TC (bsc#1104353).\n- net: hns3: Unified HNS3 {VF|PF} Ethernet Driver for hip08 SoC (bsc#1104353).\n- net: hns3: unify the pause params setup function (bsc#1104353 ).\n- net: hns3: Unify the strings display of packet statistics (bsc#1104353).\n- net: hns3: Updates MSI/MSI-X alloc/free APIs(depricated) to new APIs (bsc#1104353).\n- net: hns3: Updates RX packet info fetch in case of multi BD (bsc#1104353).\n- net: hns3: Use enums instead of magic number in hclge_is_special_opcode (bsc#1104353).\n- net: hns3: VF should get the real rss_size instead of rss_size_max (bsc#1104353).\n- net: lan78xx: Fix race in tx pending skb size calculation (bsc#1100132).\n- net: lan78xx: fix rx handling before first packet is send (bsc#1100132).\n- net: qmi_wwan: add BroadMobi BM806U 2020:2033 (bsc#1087092).\n- net: qmi_wwan: Add Netgear Aircard 779S (bsc#1090888).\n- net-usb: add qmi_wwan if on lte modem wistron neweb d18q1 (bsc#1087092).\n- net: usb: asix: replace mii_nway_restart in resume path (bsc#1100132).\n- nohz: Fix local_timer_softirq_pending() (bsc#1051510).\n- nvme: ensure forward progress during Admin passthru (git-fixes).\n- nvme-fabrics: Ignore nr_io_queues option for discovery controllers (bsc#1102633).\n- nvme: fixup crash on failed discovery (bsc#1103920).\n- nvme.h: fixup ANA group descriptor format (bsc#1104111).\n- nvme: use hw qid in trace events (bsc#1102633).\n- orangefs: report attributes_mask and attributes for statx (bsc#1101832).\n- orangefs: set i_size on new symlink (bsc#1101845).\n- overflow.h: Add allocation size calculation helpers (bsc#1101116,).\n- PCI: pciehp: Assume NoCompl+ for Thunderbolt ports (bsc#1051510).\n- PCI: pciehp: Request control of native hotplug only if supported (bsc#1051510).\n- PCI: Prevent sysfs disable of device while driver is attached (bsc#1051510).\n- pinctrl: at91-pio4: add missing of_node_put (bsc#1051510).\n- pinctrl: cannonlake: Fix community ordering for H variant (bsc#1051510).\n- pinctrl: core: Return selector to the pinctrl driver (bsc#1051510).\n- pinctrl: freescale: off by one in imx1_pinconf_group_dbg_show() (bsc#1051510).\n- pinctrl: imx: off by one in imx_pinconf_group_dbg_show() (bsc#1051510).\n- pinctrl: intel: Add Intel Lewisburg GPIO support ().\n- pinctrl: nand: meson-gxl: fix missing data pins (bsc#1051510).\n- pinctrl: pinmux: Return selector to the pinctrl driver (bsc#1051510).\n- pinctrl: qcom: spmi-gpio: Fix pmic_gpio_config_get() to be compliant (bsc#1051510).\n- pinctrl: single: Fix group and function selector use (bsc#1051510).\n- PM / devfreq: rk3399_dmc: Fix duplicated opp table on reload (bsc#1051510).\n- pmem: only set QUEUE_FLAG_DAX for fsdax mode (bsc#1103917).\n- powerpc/64: Add GENERIC_CPU support for little endian ().\n- powerpc/fadump: handle crash memory ranges array index overflow (bsc#1103269).\n- powerpc/fadump: merge adjacent memory ranges to reduce PT_LOAD segements (bsc#1103269).\n- powerpc/pkeys: Deny read/write/execute by default (bsc#1097577).\n- powerpc/pkeys: Fix calculation of total pkeys (bsc#1097577).\n- powerpc/pkeys: Give all threads control of their key permissions (bsc#1097577).\n- powerpc/pkeys: key allocation/deallocation must not change pkey registers (bsc#1097577).\n- powerpc/pkeys: make protection key 0 less special (bsc#1097577).\n- powerpc/pkeys: Preallocate execute-only key (bsc#1097577).\n- powerpc/pkeys: Save the pkey registers before fork (bsc#1097577).\n- qed*: Add link change count value to ethtool statistics display (bsc#1086314).\n- qed: Add qed APIs for PHY module query (bsc#1086314 ).\n- qed: Add srq core support for RoCE and iWARP (bsc#1086314 ).\n- qede: Add driver callbacks for eeprom module query (bsc#1086314 ).\n- qedf: Add get_generic_tlv_data handler (bsc#1086317).\n- qedf: Add support for populating ethernet TLVs (bsc#1086317).\n- qed: fix spelling mistake 'successffuly' -> 'successfully' (bsc#1086314).\n- qedi: Add get_generic_tlv_data handler (bsc#1086315).\n- qedi: Add support for populating ethernet TLVs (bsc#1086315).\n- qed: Make some functions static (bsc#1086314).\n- qed: remove redundant functions qed_get_cm_pq_idx_rl (bsc#1086314).\n- qed: remove redundant functions qed_set_gft_event_id_cm_hdr (bsc#1086314).\n- qed: remove redundant pointer 'name' (bsc#1086314).\n- qed: use dma_zalloc_coherent instead of allocator/memset (bsc#1086314).\n- qed*: Utilize FW 8.37.2.0 (bsc#1086314).\n- RDMA/hns: Add 64KB page size support for hip08 (bsc#1104427 ).\n- RDMA/hns: Add command queue support for hip08 RoCE driver (bsc#1104427).\n- RDMA/hns: Add CQ operations support for hip08 RoCE driver (bsc#1104427).\n- RDMA/hns: Add detailed comments for mb() call (bsc#1104427 ).\n- RDMA/hns: Add eq support of hip08 (bsc#1104427).\n- RDMA/hns: Add gsi qp support for modifying qp in hip08 (bsc#1104427).\n- RDMA/hns: Add mailbox's implementation for hip08 RoCE driver (bsc#1104427).\n- RDMA/hns: Add modify CQ support for hip08 (bsc#1104427 ).\n- RDMA/hns: Add names to function arguments in function pointers (bsc#1104427).\n- RDMA/hns: Add profile support for hip08 driver (bsc#1104427 ).\n- RDMA/hns: Add QP operations support for hip08 SoC (bsc#1104427 ).\n- RDMA/hns: Add releasing resource operation in error branch (bsc#1104427).\n- RDMA/hns: Add rereg mr support for hip08 (bsc#1104427 ).\n- RDMA/hns: Add reset process for RoCE in hip08 (bsc#1104427 ).\n- RDMA/hns: Add return operation when configured global param fail (bsc#1104427).\n- RDMA/hns: Add rq inline data support for hip08 RoCE (bsc#1104427 ).\n- RDMA/hns: Add rq inline flags judgement (bsc#1104427 ).\n- RDMA/hns: Add sq_invld_flg field in QP context (bsc#1104427 ).\n- RDMA/hns: Add support for processing send wr and receive wr (bsc#1104427).\n- RDMA/hns: Add the interfaces to support multi hop addressing for the contexts in hip08 (bsc#1104427).\n- RDMA/hns: Adjust the order of cleanup hem table (bsc#1104427 ).\n- RDMA/hns: Assign dest_qp when deregistering mr (bsc#1104427 ).\n- RDMA/hns: Assign the correct value for tx_cqn (bsc#1104427 ).\n- RDMA/hns: Assign zero for pkey_index of wc in hip08 (bsc#1104427 ).\n- RDMA/hns: Avoid NULL pointer exception (bsc#1104427 ).\n- RDMA/hns: Bugfix for cq record db for kernel (bsc#1104427 ).\n- RDMA/hns: Bugfix for init hem table (bsc#1104427).\n- RDMA/hns: Bugfix for rq record db for kernel (bsc#1104427 ).\n- RDMA/hns: Check return value of kzalloc (bsc#1104427 ).\n- RDMA/hns: Configure BT BA and BT attribute for the contexts in hip08 (bsc#1104427).\n- RDMA/hns: Configure fence attribute in hip08 RoCE (bsc#1104427 ).\n- RDMA/hns: Configure mac and gid and user access region for hip08 RoCE driver (bsc#1104427).\n- RDMA/hns: Configure sgid type for hip08 RoCE (bsc#1104427 ).\n- RDMA/hns: Configure the MTPT in hip08 (bsc#1104427).\n- RDMA/hns: Configure TRRL field in hip08 RoCE device (bsc#1104427 ).\n- RDMA/hns: Create gsi qp in hip08 (bsc#1104427).\n- RDMA/hns: Delete the unnecessary initializing enum to zero (bsc#1104427).\n- RDMA/hns: Do not unregister a callback we didn't register (bsc#1104427).\n- RDMA/hns: Drop local zgid in favor of core defined variable (bsc#1104427).\n- RDMA/hns: Enable inner_pa_vld filed of mpt (bsc#1104427 ).\n- RDMA/hns: Enable the cqe field of sqwqe of RC (bsc#1104427 ).\n- RDMA/hns: ensure for-loop actually iterates and free's buffers (bsc#1104427).\n- RDMA/hns: Fill sq wqe context of ud type in hip08 (bsc#1104427 ).\n- RDMA/hns: Filter for zero length of sge in hip08 kernel mode (bsc#1104427).\n- RDMA/hns: Fix a bug with modifying mac address (bsc#1104427 ).\n- RDMA/hns: Fix a couple misspellings (bsc#1104427).\n- RDMA/hns: Fix calltrace for sleeping in atomic (bsc#1104427 ).\n- RDMA/hns: Fix cqn type and init resp (bsc#1104427).\n- RDMA/hns: Fix cq record doorbell enable in kernel (bsc#1104427 ).\n- RDMA/hns: Fix endian problems around imm_data and rkey (bsc#1104427).\n- RDMA/hns: Fix inconsistent warning (bsc#1104427).\n- RDMA/hns: Fix init resp when alloc ucontext (bsc#1104427 ).\n- RDMA/hns: Fix misplaced call to hns_roce_cleanup_hem_table (bsc#1104427).\n- RDMA/hns: Fix QP state judgement before receiving work requests (bsc#1104427).\n- RDMA/hns: Fix QP state judgement before sending work requests (bsc#1104427).\n- RDMA/hns: fix spelling mistake: 'Reseved' -> 'Reserved' (bsc#1104427).\n- RDMA/hns: Fix the bug with NULL pointer (bsc#1104427 ).\n- RDMA/hns: Fix the bug with rq sge (bsc#1104427).\n- RDMA/hns: Fix the endian problem for hns (bsc#1104427 ).\n- RDMA/hns: Fix the illegal memory operation when cross page (bsc#1104427).\n- RDMA/hns: Fix the issue of IOVA not page continuous in hip08 (bsc#1104427).\n- RDMA/hns: Fix the qp context state diagram (bsc#1104427 ).\n- RDMA/hns: Generate gid type of RoCEv2 (bsc#1104427).\n- RDMA/hns: Get rid of page operation after dma_alloc_coherent (bsc#1104427).\n- RDMA/hns: Get rid of virt_to_page and vmap calls after dma_alloc_coherent (bsc#1104427).\n- RDMA/hns: Implement the disassociate_ucontext API (bsc#1104427 ).\n- RDMA/hns: Increase checking CMQ status timeout value (bsc#1104427).\n- RDMA/hns: Initialize the PCI device for hip08 RoCE (bsc#1104427 ).\n- RDMA/hns: Intercept illegal RDMA operation when use inline data (bsc#1104427).\n- RDMA/hns: Load the RoCE dirver automatically (bsc#1104427 ).\n- RDMA/hns: make various function static, fixes warnings (bsc#1104427).\n- RDMA/hns: Modify assignment device variable to support both PCI device and platform device (bsc#1104427).\n- RDMA/hns: Modify the usage of cmd_sn in hip08 (bsc#1104427 ).\n- RDMA/hns: Modify the value with rd dest_rd of qp_attr (bsc#1104427).\n- RDMA/hns: Modify uar allocation algorithm to avoid bitmap exhaust (bsc#1104427).\n- RDMA/hns: Move priv in order to add multiple hns_roce support (bsc#1104427).\n- RDMA/hns: Move the location for initializing tmp_len (bsc#1104427).\n- RDMA/hns: Not support qp transition from reset to reset for hip06 (bsc#1104427).\n- RDMA/hns: Only assign dest_qp if IB_QP_DEST_QPN bit is set (bsc#1104427).\n- RDMA/hns: Only assign dqpn if IB_QP_PATH_DEST_QPN bit is set (bsc#1104427).\n- RDMA/hns: Only assign mtu if IB_QP_PATH_MTU bit is set (bsc#1104427).\n- RDMA/hns: Refactor code for readability (bsc#1104427 ).\n- RDMA/hns: Refactor eq code for hip06 (bsc#1104427).\n- RDMA/hns: remove redundant assignment to variable j (bsc#1104427 ).\n- RDMA/hns: Remove some unnecessary attr_mask judgement (bsc#1104427).\n- RDMA/hns: Remove unnecessary operator (bsc#1104427).\n- RDMA/hns: Remove unnecessary platform_get_resource() error check (bsc#1104427).\n- RDMA/hns: Rename the idx field of db (bsc#1104427).\n- RDMA/hns: Replace condition statement using hardware version information (bsc#1104427).\n- RDMA/hns: Replace __raw_write*(cpu_to_le*()) with LE write*() (bsc#1104427).\n- RDMA/hns: return 0 rather than return a garbage status value (bsc#1104427).\n- RDMA/hns_roce: Do not check return value of zap_vma_ptes() (bsc#1104427).\n- RDMA/hns: Set access flags of hip08 RoCE (bsc#1104427 ).\n- RDMA/hns: Set desc_dma_addr for zero when free cmq desc (bsc#1104427).\n- RDMA/hns: Set NULL for __internal_mr (bsc#1104427).\n- RDMA/hns: Set rdma_ah_attr type for querying qp (bsc#1104427 ).\n- RDMA/hns: Set se attribute of sqwqe in hip08 (bsc#1104427 ).\n- RDMA/hns: Set sq_cur_sge_blk_addr field in QPC in hip08 (bsc#1104427).\n- RDMA/hns: Set the guid for hip08 RoCE device (bsc#1104427 ).\n- RDMA/hns: Set the owner field of SQWQE in hip08 RoCE (bsc#1104427).\n- RDMA/hns: Split CQE from MTT in hip08 (bsc#1104427).\n- RDMA/hns: Split hw v1 driver from hns roce driver (bsc#1104427 ).\n- RDMA/hns: Submit bad wr (bsc#1104427).\n- RDMA/hns: Support cq record doorbell for kernel space (bsc#1104427).\n- RDMA/hns: Support cq record doorbell for the user space (bsc#1104427).\n- RDMA/hns: Support multi hop addressing for PBL in hip08 (bsc#1104427).\n- RDMA/hns: Support rq record doorbell for kernel space (bsc#1104427).\n- RDMA/hns: Support rq record doorbell for the user space (bsc#1104427).\n- RDMA/hns: Support WQE/CQE/PBL page size configurable feature in hip08 (bsc#1104427).\n- RDMA/hns: Unify the calculation for hem index in hip08 (bsc#1104427).\n- RDMA/hns: Update assignment method for owner field of send wqe (bsc#1104427).\n- RDMA/hns: Update calculation of irrl_ba field for hip08 (bsc#1104427).\n- RDMA/hns: Update convert function of endian format (bsc#1104427 ).\n- RDMA/hns: Update the interfaces for MTT/CQE multi hop addressing in hip08 (bsc#1104427).\n- RDMA/hns: Update the IRRL table chunk size in hip08 (bsc#1104427 ).\n- RDMA/hns: Update the PD CQE MTT specification in hip08 (bsc#1104427).\n- RDMA/hns: Update the usage of ack timeout in hip08 (bsc#1104427 ).\n- RDMA/hns: Update the usage of sr_max and rr_max field (bsc#1104427).\n- RDMA/hns: Update the verbs of polling for completion (bsc#1104427).\n- RDMA/hns: Use free_pages function instead of free_page (bsc#1104427).\n- RDMA/hns: Use structs to describe the uABI instead of opencoding (bsc#1104427).\n- RDMA/qedr: Fix NULL pointer dereference when running over iWARP without RDMA-CM (bsc#1086314).\n- RDMA/qedr: fix spelling mistake: 'adrresses' -> 'addresses' (bsc#1086314).\n- RDMA/qedr: fix spelling mistake: 'failes' -> 'fails' (bsc#1086314).\n- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bsc#1051510).\n- reiserfs: fix buffer overflow with long warning messages (bsc#1101847).\n- Revert 'drm/nouveau/drm/therm/fan: add a fallback if no fan control is specified in the vbios' (bsc#1103356).\n- rtc: ensure rtc_set_alarm fails when alarms are not supported (bsc#1051510).\n- s390/cio: clear timer when terminating driver I/O (bsc#1103421).\n- s390/cio: fix return code after missing interrupt (bsc#1103421).\n- s390/dasd: configurable IFCC handling (bsc#1097808).\n- s390/dasd: fix handling of internal requests (bsc#1103421).\n- s390/dasd: fix wrongly assigned configuration data (bsc#1103421).\n- s390/dasd: prevent prefix I/O error (bsc#1103421).\n- s390/eadm: fix CONFIG_BLOCK include dependency (bsc#1103421).\n- s390/ipl: ensure loadparm valid flag is set (bsc#1103421).\n- s390/pci: do not require AIS facility (bsc#1103421).\n- s390/qdio: do not release memory in qdio_setup_irq() (bsc#1103421).\n- sc16is7xx: Check for an error when the clock is enabled (bsc#1051510).\n- sched/debug: Reverse the order of printing faults (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Consider RT/IRQ pressure in capacity_spare_wake() (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Fix find_idlest_group() when local group is not allowed (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Fix usage of find_idlest_group() when no groups are allowed (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Fix usage of find_idlest_group() when the local group is idlest (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Move select_task_rq_fair() slow-path into its own function (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Remove impossible condition from find_idlest_group_cpu() (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Remove unnecessary comparison with -1 (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Spare idle load balancing on nohz_full CPUs (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Use 'unsigned long' for utilization, consistently (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Evaluate move once per node (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Modify migrate_swap() to accept additional parameters (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Move task_numa_placement() closer to numa_migrate_preferred() (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Remove redundant field (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Remove redundant field -kabi (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Remove unused task_capacity from 'struct numa_stats' (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Set preferred_node based on best_cpu (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Simplify load_too_imbalanced() (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Skip nodes that are at 'hoplimit' (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Update the scan period without holding the numa_group lock (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Use group_weights to identify if migration degrades locality (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Use task faults only if numa_group is not yet set up (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/smt: Update sched_smt_present at runtime (bsc#1089343).\n- scsi: ata: enhance the definition of SET MAX feature field value ().\n- scsi: hisi_sas: add an mechanism to do reset work synchronously ().\n- scsi: hisi_sas: add check of device in hisi_sas_task_exec() ().\n- scsi: hisi_sas: add internal abort dev in some places ().\n- scsi: hisi_sas: Add LED feature for v3 hw ().\n- scsi: hisi_sas: add RAS feature for v3 hw ().\n- scsi: hisi_sas: add readl poll timeout helper wrappers ().\n- scsi: hisi_sas: Add some checks to avoid free'ing a sas_task twice ().\n- scsi: hisi_sas: add some print to enhance debugging ().\n- scsi: hisi_sas: Add v2 hw force PHY function for internal ATA command ().\n- scsi: hisi_sas: add v2 hw port AXI error handling support ().\n- scsi: hisi_sas: add v3 hw MODULE_DEVICE_TABLE() ().\n- scsi: hisi_sas: add v3 hw suspend and resume ().\n- scsi: hisi_sas: allocate slot buffer earlier ().\n- scsi: hisi_sas: Change common allocation mode of device id ().\n- scsi: hisi_sas: Change frame type for SET MAX commands ().\n- scsi: hisi_sas: change ncq process for v3 hw ().\n- scsi: hisi_sas: change slot index allocation mode ().\n- scsi: hisi_sas: check host frozen before calling 'done' function ().\n- scsi: hisi_sas: check IPTT is valid before using it for v3 hw ().\n- scsi: hisi_sas: check sas_dev gone earlier in hisi_sas_abort_task() ().\n- scsi: hisi_sas: Code cleanup and minor bug fixes ().\n- scsi: hisi_sas: config ATA de-reset as an constrained command for v3 hw ().\n- scsi: hisi_sas: consolidate command check in hisi_sas_get_ata_protocol() ().\n- scsi: hisi_sas: Create a scsi_host_template per HW module ().\n- scsi: hisi_sas: delete timer when removing hisi_sas driver ().\n- scsi: hisi_sas: do link reset for some CHL_INT2 ints ().\n- scsi: hisi_sas: Do not lock DQ for complete task sending ().\n- scsi: hisi_sas: dt-bindings: add an property of signal attenuation ().\n- scsi: hisi_sas: fix a bug in hisi_sas_dev_gone() ().\n- scsi: hisi_sas: fix a typo in hisi_sas_task_prep() ().\n- scsi: hisi_sas: fix dma_unmap_sg() parameter ().\n- scsi: hisi_sas: fix PI memory size ().\n- scsi: hisi_sas: fix return value of hisi_sas_task_prep() ().\n- scsi: hisi_sas: Fix return value when get_free_slot() failed ().\n- scsi: hisi_sas: fix SAS_QUEUE_FULL problem while running IO ().\n- scsi: hisi_sas: fix the issue of link rate inconsistency ().\n- scsi: hisi_sas: fix the issue of setting linkrate register ().\n- scsi: hisi_sas: improve int_chnl_int_v2_hw() consistency with v3 hw ().\n- scsi: hisi_sas: Include TMF elements in struct hisi_sas_slot ().\n- scsi: hisi_sas: increase timer expire of internal abort task ().\n- scsi: hisi_sas: Init disks after controller reset ().\n- scsi: hisi_sas: initialize dq spinlock before use ().\n- scsi: hisi_sas: Introduce hisi_sas_phy_set_linkrate() ().\n- scsi: hisi_sas: judge result of internal abort ().\n- scsi: hisi_sas: make local symbol host_attrs static ().\n- scsi: hisi_sas: make return type of prep functions void ().\n- scsi: hisi_sas: make SAS address of SATA disks unique ().\n- scsi: hisi_sas: Mark PHY as in reset for nexus reset ().\n- scsi: hisi_sas: modify hisi_sas_dev_gone() for reset ().\n- scsi: hisi_sas: modify some register config for hip08 ().\n- scsi: hisi_sas: optimise port id refresh function ().\n- scsi: hisi_sas: optimise the usage of DQ locking ().\n- scsi: hisi_sas: print device id for errors ().\n- scsi: hisi_sas: re-add the lldd_port_deformed() ().\n- scsi: hisi_sas: relocate clearing ITCT and freeing device ().\n- scsi: hisi_sas: relocate smp sg map ().\n- scsi: hisi_sas: Remove depends on HAS_DMA in case of platform dependency ().\n- scsi: hisi_sas: remove redundant handling to event95 for v3 ().\n- scsi: hisi_sas: remove some unneeded structure members ().\n- scsi: hisi_sas: remove unused variable hisi_sas_devices.running_req ().\n- scsi: hisi_sas: Reset disks when discovered ().\n- scsi: hisi_sas: some optimizations of host controller reset ().\n- scsi: hisi_sas: stop controller timer for reset ().\n- scsi: hisi_sas: support the property of signal attenuation for v2 hw ().\n- scsi: hisi_sas: Terminate STP reject quickly for v2 hw ().\n- scsi: hisi_sas: Try wait commands before before controller reset ().\n- scsi: hisi_sas: update PHY linkrate after a controller reset ().\n- scsi: hisi_sas: update RAS feature for later revision of v3 HW ().\n- scsi: hisi_sas: use an general way to delay PHY work ().\n- scsi: hisi_sas: Use device lock to protect slot alloc/free ().\n- scsi: hisi_sas: use dma_zalloc_coherent() ().\n- scsi: hisi_sas: workaround a v3 hw hilink bug ().\n- scsi: libsas: defer ata device eh commands to libata ().\n- scsi: lpfc: Add Buffer overflow check, when nvme_info larger than PAGE_SIZE (bsc#1102658).\n- scsi: lpfc: Correct LCB ACCept payload (bsc#1102658).\n- scsi: lpfc: devloss timeout race condition caused null pointer reference (bsc#1102658).\n- scsi: lpfc: Fix abort error path for NVMET (bsc#1102658).\n- scsi: lpfc: Fix driver crash when re-registering NVME rports (bsc#1102658).\n- scsi: lpfc: Fix driver not setting dpp bits correctly in doorbell word (bsc#1102658).\n- scsi: lpfc: Fix ELS abort on SLI-3 adapters (bsc#1102658).\n- scsi: lpfc: Fix list corruption on the completion queue (bsc#1102658).\n- scsi: lpfc: Fix NVME Target crash in defer rcv logic (bsc#1102658).\n- scsi: lpfc: Fix panic if driver unloaded when port is offline (bsc#1102658).\n- scsi: lpfc: Fix sysfs Speed value on CNA ports (bsc#1102658).\n- scsi: lpfc: Limit tracking of tgt queue depth in fast path (bsc#1102658).\n- scsi: lpfc: Make PBDE optimizations configurable (bsc#1102658).\n- scsi: lpfc: Remove lpfc_enable_pbde as module parameter (bsc#1102658).\n- scsi: lpfc: Revise copyright for new company language (bsc#1102658).\n- scsi: lpfc: Support duration field in Link Cable Beacon V1 command (bsc#1102658).\n- scsi: lpfc: update driver version to 12.0.0.5 (bsc#1102658).\n- scsi: lpfc: update driver version to 12.0.0.6 (bsc#1102658).\n- scsi: mpt3sas: Add an I/O barrier (bsc#1086906,).\n- scsi: mpt3sas: Added support for SAS Device Discovery Error Event (bsc#1086906,).\n- scsi: mpt3sas: Add PCI device ID for Andromeda (bsc#1086906,).\n- scsi: mpt3sas: Allow processing of events during driver unload (bsc#1086906,).\n- scsi: mpt3sas: As per MPI-spec, use combined reply queue for SAS3.5 controllers when HBA supports more than 16 MSI-x vectors (bsc#1086906,).\n- scsi: mpt3sas: Bug fix for big endian systems (bsc#1086906,).\n- scsi: mpt3sas: Cache enclosure pages during enclosure add (bsc#1086906,).\n- scsi: mpt3sas: clarify mmio pointer types (bsc#1086906,).\n- scsi: mpt3sas: Configure reply post queue depth, DMA and sgl tablesize (bsc#1086906,).\n- scsi: mpt3sas: Do not abort I/Os issued to NVMe drives while processing Async Broadcast primitive event (bsc#1086906,).\n- scsi: mpt3sas: Do not access the structure after decrementing it's instance reference count (bsc#1086906,).\n- scsi: mpt3sas: Do not mark fw_event workqueue as WQ_MEM_RECLAIM (bsc#1086906,).\n- scsi: mpt3sas: Enhanced handling of Sense Buffer (bsc#1086906,).\n- scsi: mpt3sas: Fix, False timeout prints for ioctl and other internal commands during controller reset (bsc#1086906,).\n- scsi: mpt3sas: fix possible memory leak (bsc#1086906,).\n- scsi: mpt3sas: fix spelling mistake: 'disbale' -> 'disable' (bsc#1086906,).\n- scsi: mpt3sas: For NVME device, issue a protocol level reset (bsc#1086906,).\n- scsi: mpt3sas: Incorrect command status was set/marked as not used (bsc#1086906,).\n- scsi: mpt3sas: Increase event log buffer to support 24 port HBA's (bsc#1086906,).\n- scsi: mpt3sas: Introduce API to get BAR0 mapped buffer address (bsc#1086906,).\n- scsi: mpt3sas: Introduce Base function for cloning (bsc#1086906,).\n- scsi: mpt3sas: Introduce function to clone mpi reply (bsc#1086906,).\n- scsi: mpt3sas: Introduce function to clone mpi request (bsc#1086906,).\n- scsi: mpt3sas: Lockless access for chain buffers (bsc#1086906,).\n- scsi: mpt3sas: Optimize I/O memory consumption in driver (bsc#1086906,).\n- scsi: mpt3sas: Pre-allocate RDPQ Array at driver boot time (bsc#1086906,).\n- scsi: mpt3sas: Replace PCI pool old API (bsc#1081917). \n- scsi: mpt3sas: Report Firmware Package Version from HBA Driver (bsc#1086906,).\n- scsi: mpt3sas: Update driver version '25.100.00.00' (bsc#1086906,).\n- scsi: mpt3sas: Update driver version '26.100.00.00' (bsc#1086906,).\n- scsi: mpt3sas: Update MPI Headers (bsc#1086906,).\n- scsi: qedf: Add additional checks when restarting an rport due to ABTS timeout (bsc#1086317).\n- scsi: qedf: Add check for offload before flushing I/Os for target (bsc#1086317).\n- scsi: qedf: Add dcbx_not_wait module parameter so we won't wait for DCBX convergence to start discovery (bsc#1086317).\n- scsi: qedf: Add missing skb frees in error path (bsc#1086317).\n- scsi: qedf: Add more defensive checks for concurrent error conditions (bsc#1086317).\n- scsi: qedf: Add task id to kref_get_unless_zero() debug messages when flushing requests (bsc#1086317).\n- scsi: qedf: Check if link is already up when receiving a link up event from qed (bsc#1086317).\n- scsi: qedf: fix LTO-enabled build (bsc#1086317).\n- scsi: qedf: Fix VLAN display when printing sent FIP frames (bsc#1086317).\n- scsi: qedf: Honor default_prio module parameter even if DCBX does not converge (bsc#1086317).\n- scsi: qedf: Honor priority from DCBX FCoE App tag (bsc#1086317).\n- scsi: qedf: If qed fails to enable MSI-X fail PCI probe (bsc#1086317).\n- scsi: qedf: Improve firmware debug dump handling (bsc#1086317).\n- scsi: qedf: Increase the number of default FIP VLAN request retries to 60 (bsc#1086317).\n- scsi: qedf: Release RRQ reference correctly when RRQ command times out (bsc#1086317).\n- scsi: qedf: remove redundant initialization of 'fcport' (bsc#1086317).\n- scsi: qedf: Remove setting DCBX pending during soft context reset (bsc#1086317).\n- scsi: qedf: Return request as DID_NO_CONNECT if MSI-X is not enabled (bsc#1086317).\n- scsi: qedf: Sanity check FCoE/FIP priority value to make sure it's between 0 and 7 (bsc#1086317).\n- scsi: qedf: Send the driver state to MFW (bsc#1086317).\n- scsi: qedf: Set the UNLOADING flag when removing a vport (bsc#1086317).\n- scsi: qedf: Synchronize rport restarts when multiple ELS commands time out (bsc#1086317).\n- scsi: qedf: Update copyright for 2018 (bsc#1086317).\n- scsi: qedf: Update version number to 8.33.16.20 (bsc#1086317).\n- scsi: qedf: use correct strncpy() size (bsc#1086317).\n- scsi: qedi: fix building with LTO (bsc#1086315).\n- scsi: qedi: fix build regression (bsc#1086315).\n- scsi: qedi: Fix kernel crash during port toggle (bsc#1086315).\n- scsi: qedi: Send driver state to MFW (bsc#1086315).\n- scsi: qla2xxx: Avoid double completion of abort command (git-fixes).\n- scsi: qla2xxx: correctly shift host byte (bsc#1086327,).\n- scsi: qla2xxx: Correct setting of SAM_STAT_CHECK_CONDITION (bsc#1086327,).\n- scsi: qla2xxx: Fix crash on qla2x00_mailbox_command (bsc#1086327,).\n- scsi: qla2xxx: Fix driver unload by shutting down chip (git-fixes).\n- scsi: qla2xxx: Fix Inquiry command being dropped in Target mode (bsc#1086327,).\n- scsi: qla2xxx: Fix NPIV deletion by calling wait_for_sess_deletion (git-fixes).\n- scsi: qla2xxx: Fix NULL pointer dereference for fcport search (git-fixes).\n- scsi: qla2xxx: Fix race condition between iocb timeout and initialisation (bsc#1086327,).\n- scsi: qla2xxx: Fix Rport and session state getting out of sync (bsc#1086327,).\n- scsi: qla2xxx: Fix sending ADISC command for login (bsc#1086327,).\n- scsi: qla2xxx: Fix setting lower transfer speed if GPSC fails (bsc#1086327,).\n- scsi: qla2xxx: Fix TMF and Multi-Queue config (bsc#1086327,).\n- scsi: qla2xxx: Fix unintialized List head crash (git-fixes).\n- scsi: qla2xxx: Move GPSC and GFPNID out of session management (bsc#1086327,).\n- scsi: qla2xxx: Prevent relogin loop by removing stale code (bsc#1086327,).\n- scsi: qla2xxx: Reduce redundant ADISC command for RSCNs (bsc#1086327,).\n- scsi: qla2xxx: remove irq save in qla2x00_poll() (bsc#1086327,).\n- scsi: qla2xxx: Remove stale debug value for login_retry flag (bsc#1086327,).\n- scsi: qla2xxx: Return error when TMF returns (git-fixes).\n- scsi: qla2xxx: Update driver version to 10.00.00.07-k (bsc#1086327,).\n- scsi: qla2xxx: Use predefined get_datalen_for_atio() inline function (bsc#1086327,).\n- scsi: qla4xxx: Move an array from a .h into a .c file (bsc#1086331).\n- scsi: qla4xxx: Remove unused symbols (bsc#1086331).\n- scsi: qla4xxx: skip error recovery in case of register disconnect (bsc#1086331).\n- scsi: qla4xxx: Use dma_pool_zalloc() (bsc#1086331).\n- scsi: qla4xxx: Use zeroing allocator rather than allocator/memset (bsc#1086331).\n- scsi: smartpqi: add in new supported controllers (bsc#1086274).\n- scsi: smartpqi: add inspur advantech ids (bsc#1086274).\n- scsi: smartpqi: bump driver version to 1.1.4-130 (bsc#1086274).\n- scsi: smartpqi: fix critical ARM issue reading PQI index registers (bsc#1086274).\n- scsi: smartpqi: improve error checking for sync requests (bsc#1086274).\n- scsi: smartpqi: improve handling for sync requests (bsc#1086274).\n- scsi: smartpqi: update driver version (bsc#1086274).\n- scsi: smartpqi: workaround fw bug for oq deletion (bsc#1086274).\n- sctp: fix the issue that pathmtu may be set lower than MINSEGMENT (git-fixes).\n- sctp: introduce sctp_dst_mtu (git-fixes).\n- selftests/powerpc: Fix core-pkey for default execute permission change (bsc#1097577).\n- selftests/powerpc: Fix ptrace-pkey for default execute permission change (bsc#1097577).\n- series.conf: Sort automatic NUMA balancing related patch\n- soc: bcm2835: Make !RASPBERRYPI_FIRMWARE dummies return failure (bsc#1051510).\n- soc: bcm: raspberrypi-power: Fix use of __packed (bsc#1051510).\n- soc: imx: gpc: de-register power domains only if initialized (bsc#1051510).\n- soc: imx: gpc: restrict register range for regmap access (bsc#1051510).\n- soc: imx: gpcv2: correct PGC offset (bsc#1051510).\n- soc: imx: gpcv2: Do not pass static memory as platform data (bsc#1051510).\n- soc: imx: gpcv2: fix regulator deferred probe (bsc#1051510).\n- soc: mediatek: pwrap: fix compiler errors (bsc#1051510).\n- soc: qcom: wcnss_ctrl: Fix increment in NV upload (bsc#1051510).\n- soc: rockchip: power-domain: Fix wrong value when power up pd with writemask (bsc#1051510).\n- soc/tegra: Fix bad of_node_put() in powergate init (bsc#1051510).\n- soc/tegra: flowctrl: Fix error handling (bsc#1051510).\n- soc: ti: ti_sci_pm_domains: Populate name for genpd (bsc#1051510).\n- soc: zte: Restrict SOC_ZTE to ARCH_ZX or COMPILE_TEST (bsc#1051510).\n- spi: bcm2835aux: ensure interrupts are enabled for shared handler (bsc#1051510).\n- spi/bcm63xx-hspi: Enable the clock before calling clk_get_rate() (bsc#1051510).\n- spi: bcm-qspi: Always read and set BSPI_MAST_N_BOOT_CTRL (bsc#1051510).\n- spi: bcm-qspi: Avoid setting MSPI_CDRAM_PCS for spi-nor master (bsc#1051510).\n- spi: cadence: Add usleep_range() for cdns_spi_fill_tx_fifo() (bsc#1051510).\n- spi: pxa2xx: Allow 64-bit DMA (bsc#1051510).\n- spi: pxa2xx: check clk_prepare_enable() return value (bsc#1051510).\n- spi: spi-fsl-dspi: Fix imprecise abort on VF500 during probe (bsc#1051510).\n- sr: pass down correctly sized SCSI sense buffer (git-fixes).\n- staging: ks7010: Use constants from ieee80211_eid instead of literal ints (bsc#1051510).\n- staging: speakup: fix wraparound in uaccess length check (bsc#1051510).\n- supported.conf: add drivers/md/dm-writecache\n- supported.conf: added hns3 modules\n- supported.conf: added hns-roce-hw-v1 and hns-roce-hw-v2\n- supported.conf: Enable HiSi v3 SAS adapter ()\n- sysrq : fix Show Regs call trace on ARM (bsc#1051510).\n- TCM_RBD depends on BLK_DEV_RBD ().\n- thermal: exynos: fix setting rising_threshold for Exynos5433 (bsc#1051510).\n- tty: Fix data race in tty_insert_flip_string_fixed_flag (bsc#1051510).\n- typec: tcpm: Fix a msecs vs jiffies bug (bsc#1100132).\n- typec: tcpm: fusb302: Resolve out of order messaging events (bsc#1087092).\n- udf: Detect incorrect directory size (bsc#1101891).\n- udf: Provide saner default for invalid uid / gid (bsc#1101890).\n- Update patches.arch/KVM-PPC-Check-if-IOMMU-page-is-contained-in-the-pinn.patch (bsc#1077761, git-fixes, bsc#1103948, bsc#1103949).\n- usb: hub: Do not wait for connect state at resume for powered-off ports (bsc#1051510).\n- usbip: usbip_detach: Fix memory, udev context and udev leak (bsc#1051510).\n- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).\n- virtio_balloon: fix another race between migration and ballooning (bsc#1051510).\n- wlcore: sdio: check for valid platform device data before suspend (bsc#1051510).\n- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).\n- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/KVM/VMX: Add module argument for L1TF mitigation.\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- x86: Treat R_X86_64_PLT32 as R_X86_64_PC32 (binutils_2.31).\n- x86/xen: init %gs very early to avoid page faults with stack protector (bnc#1104777).\n- xen-netback: fix input validation in xenvif_set_hash_mapping() (bnc#1103277).\n- xen/netfront: do not cache skb_shinfo() (bnc#1065600).\n- xfs: catch inode allocation state mismatch corruption (bsc#1104211).\n- xfs: prevent creating negative-sized file via INSERT_RANGE (bsc#1101833).\n- xhci: Fix perceived dead host due to runtime suspend race with event handler (bsc#1051510).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-Module-Public-Cloud-15-2018-1701", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2450-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:2450-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20182450-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:2450-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html", }, { category: "self", summary: "SUSE Bug 1051510", url: "https://bugzilla.suse.com/1051510", }, { category: "self", summary: "SUSE Bug 1051979", url: "https://bugzilla.suse.com/1051979", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1066110", url: "https://bugzilla.suse.com/1066110", }, { category: "self", summary: "SUSE Bug 1077761", url: "https://bugzilla.suse.com/1077761", }, { category: "self", summary: "SUSE Bug 1081917", url: "https://bugzilla.suse.com/1081917", }, { category: "self", summary: "SUSE Bug 1083647", url: "https://bugzilla.suse.com/1083647", }, { category: "self", summary: "SUSE Bug 1086274", url: "https://bugzilla.suse.com/1086274", }, { category: "self", summary: "SUSE Bug 1086288", url: "https://bugzilla.suse.com/1086288", }, { category: "self", summary: "SUSE Bug 1086314", url: "https://bugzilla.suse.com/1086314", }, { category: "self", summary: "SUSE Bug 1086315", url: "https://bugzilla.suse.com/1086315", }, { category: "self", summary: "SUSE Bug 1086317", url: "https://bugzilla.suse.com/1086317", }, { category: "self", summary: "SUSE Bug 1086327", url: "https://bugzilla.suse.com/1086327", }, { category: "self", summary: "SUSE Bug 1086331", url: "https://bugzilla.suse.com/1086331", }, { category: "self", summary: "SUSE Bug 1086906", url: "https://bugzilla.suse.com/1086906", }, { category: "self", summary: "SUSE Bug 1087081", url: "https://bugzilla.suse.com/1087081", }, { category: "self", summary: "SUSE Bug 1087092", url: "https://bugzilla.suse.com/1087092", }, { category: "self", summary: "SUSE Bug 1089343", url: "https://bugzilla.suse.com/1089343", }, { category: "self", summary: "SUSE Bug 1090888", url: "https://bugzilla.suse.com/1090888", }, { category: "self", summary: "SUSE Bug 1097104", url: "https://bugzilla.suse.com/1097104", }, { category: "self", summary: "SUSE Bug 1097577", url: "https://bugzilla.suse.com/1097577", }, { category: "self", summary: "SUSE Bug 1097808", url: "https://bugzilla.suse.com/1097808", }, { category: "self", summary: "SUSE Bug 1099811", url: "https://bugzilla.suse.com/1099811", }, { category: "self", summary: "SUSE Bug 1099813", url: "https://bugzilla.suse.com/1099813", }, { category: "self", summary: "SUSE Bug 1099844", url: "https://bugzilla.suse.com/1099844", }, { category: "self", summary: "SUSE Bug 1099845", url: "https://bugzilla.suse.com/1099845", }, { category: "self", summary: "SUSE Bug 1099846", url: "https://bugzilla.suse.com/1099846", }, { category: "self", summary: "SUSE Bug 1099849", url: "https://bugzilla.suse.com/1099849", }, { category: "self", summary: "SUSE Bug 1099858", url: "https://bugzilla.suse.com/1099858", }, { category: "self", summary: "SUSE Bug 1099863", url: "https://bugzilla.suse.com/1099863", }, { category: "self", summary: "SUSE Bug 1099864", url: "https://bugzilla.suse.com/1099864", }, { category: "self", summary: "SUSE Bug 1100132", url: "https://bugzilla.suse.com/1100132", }, { category: "self", summary: "SUSE Bug 1101116", url: "https://bugzilla.suse.com/1101116", }, { category: "self", summary: "SUSE Bug 1101331", url: "https://bugzilla.suse.com/1101331", }, { category: "self", summary: "SUSE Bug 1101669", url: "https://bugzilla.suse.com/1101669", }, { category: "self", summary: "SUSE Bug 1101822", url: "https://bugzilla.suse.com/1101822", }, { category: "self", summary: "SUSE Bug 1101828", url: "https://bugzilla.suse.com/1101828", }, { category: "self", summary: "SUSE Bug 1101832", url: "https://bugzilla.suse.com/1101832", }, { category: "self", summary: "SUSE Bug 1101833", url: "https://bugzilla.suse.com/1101833", }, { category: "self", summary: "SUSE Bug 1101837", url: "https://bugzilla.suse.com/1101837", }, { category: "self", summary: "SUSE Bug 1101839", url: "https://bugzilla.suse.com/1101839", }, { category: "self", summary: "SUSE Bug 1101841", url: "https://bugzilla.suse.com/1101841", }, { category: "self", summary: "SUSE Bug 1101843", url: "https://bugzilla.suse.com/1101843", }, { category: "self", summary: "SUSE Bug 1101844", url: "https://bugzilla.suse.com/1101844", }, { category: "self", summary: "SUSE Bug 1101845", url: "https://bugzilla.suse.com/1101845", }, { category: "self", summary: "SUSE Bug 1101847", url: "https://bugzilla.suse.com/1101847", }, { category: "self", summary: "SUSE Bug 1101852", url: "https://bugzilla.suse.com/1101852", }, { category: "self", summary: "SUSE Bug 1101853", url: "https://bugzilla.suse.com/1101853", }, { category: "self", summary: "SUSE Bug 1101867", url: "https://bugzilla.suse.com/1101867", }, { category: "self", summary: "SUSE Bug 1101872", url: "https://bugzilla.suse.com/1101872", }, { category: "self", summary: "SUSE Bug 1101874", url: "https://bugzilla.suse.com/1101874", }, { category: "self", summary: "SUSE Bug 1101875", url: "https://bugzilla.suse.com/1101875", }, { category: "self", summary: "SUSE Bug 1101882", url: "https://bugzilla.suse.com/1101882", }, { category: "self", summary: "SUSE Bug 1101883", url: "https://bugzilla.suse.com/1101883", }, { category: "self", summary: "SUSE Bug 1101885", url: "https://bugzilla.suse.com/1101885", }, { category: "self", summary: "SUSE Bug 1101887", url: "https://bugzilla.suse.com/1101887", }, { category: "self", summary: "SUSE Bug 1101890", url: "https://bugzilla.suse.com/1101890", }, { category: "self", summary: "SUSE Bug 1101891", url: "https://bugzilla.suse.com/1101891", }, { category: "self", summary: "SUSE Bug 1101893", url: "https://bugzilla.suse.com/1101893", }, { category: "self", summary: "SUSE Bug 1101895", url: "https://bugzilla.suse.com/1101895", }, { category: "self", summary: "SUSE Bug 1101896", url: "https://bugzilla.suse.com/1101896", }, { category: "self", summary: "SUSE Bug 1101900", url: "https://bugzilla.suse.com/1101900", }, { category: "self", summary: "SUSE Bug 1101902", url: "https://bugzilla.suse.com/1101902", }, { category: "self", summary: "SUSE Bug 1101903", url: "https://bugzilla.suse.com/1101903", }, { category: "self", summary: "SUSE Bug 1102633", url: "https://bugzilla.suse.com/1102633", }, { category: "self", summary: "SUSE Bug 1102658", url: "https://bugzilla.suse.com/1102658", }, { category: "self", summary: "SUSE Bug 1103097", url: "https://bugzilla.suse.com/1103097", }, { category: "self", summary: "SUSE Bug 1103269", url: "https://bugzilla.suse.com/1103269", }, { category: "self", summary: "SUSE Bug 1103277", url: "https://bugzilla.suse.com/1103277", }, { category: "self", summary: "SUSE Bug 1103356", url: "https://bugzilla.suse.com/1103356", }, { category: "self", summary: "SUSE Bug 1103363", url: "https://bugzilla.suse.com/1103363", }, { category: "self", summary: "SUSE Bug 1103421", url: "https://bugzilla.suse.com/1103421", }, { category: "self", summary: "SUSE Bug 1103445", url: "https://bugzilla.suse.com/1103445", }, { category: "self", summary: "SUSE Bug 1103517", url: "https://bugzilla.suse.com/1103517", }, { category: "self", summary: "SUSE Bug 1103723", url: "https://bugzilla.suse.com/1103723", }, { category: "self", summary: "SUSE Bug 1103724", url: "https://bugzilla.suse.com/1103724", }, { category: "self", summary: "SUSE Bug 1103725", url: "https://bugzilla.suse.com/1103725", }, { category: "self", summary: "SUSE Bug 1103726", url: "https://bugzilla.suse.com/1103726", }, { category: "self", summary: "SUSE Bug 1103727", url: "https://bugzilla.suse.com/1103727", }, { category: "self", summary: "SUSE Bug 1103728", url: "https://bugzilla.suse.com/1103728", }, { category: "self", summary: "SUSE Bug 1103729", url: "https://bugzilla.suse.com/1103729", }, { category: "self", summary: "SUSE Bug 1103730", url: "https://bugzilla.suse.com/1103730", }, { category: "self", summary: "SUSE Bug 1103886", url: "https://bugzilla.suse.com/1103886", }, { category: "self", summary: "SUSE Bug 1103917", url: "https://bugzilla.suse.com/1103917", }, { category: "self", summary: "SUSE Bug 1103920", url: "https://bugzilla.suse.com/1103920", }, { category: "self", summary: "SUSE Bug 1103948", url: "https://bugzilla.suse.com/1103948", }, { category: "self", summary: "SUSE Bug 1103949", url: "https://bugzilla.suse.com/1103949", }, { category: "self", summary: "SUSE Bug 1104066", url: "https://bugzilla.suse.com/1104066", }, { category: "self", summary: "SUSE Bug 1104111", url: "https://bugzilla.suse.com/1104111", }, { category: "self", summary: "SUSE Bug 1104174", url: "https://bugzilla.suse.com/1104174", }, { category: "self", summary: "SUSE Bug 1104211", url: "https://bugzilla.suse.com/1104211", }, { category: "self", summary: "SUSE Bug 1104319", url: "https://bugzilla.suse.com/1104319", }, { category: "self", summary: "SUSE Bug 1104353", url: "https://bugzilla.suse.com/1104353", }, { category: "self", summary: "SUSE Bug 1104365", url: "https://bugzilla.suse.com/1104365", }, { category: "self", summary: "SUSE Bug 1104427", url: "https://bugzilla.suse.com/1104427", }, { category: "self", summary: "SUSE Bug 1104494", url: "https://bugzilla.suse.com/1104494", }, { category: "self", summary: "SUSE Bug 1104495", url: "https://bugzilla.suse.com/1104495", }, { category: "self", summary: "SUSE Bug 1104708", url: "https://bugzilla.suse.com/1104708", }, { category: "self", summary: "SUSE Bug 1104777", url: "https://bugzilla.suse.com/1104777", }, { category: "self", summary: "SUSE Bug 1104897", url: "https://bugzilla.suse.com/1104897", }, { category: "self", summary: "SUSE CVE CVE-2018-10853 page", url: "https://www.suse.com/security/cve/CVE-2018-10853/", }, { category: "self", summary: "SUSE CVE CVE-2018-10876 page", url: "https://www.suse.com/security/cve/CVE-2018-10876/", }, { category: "self", summary: "SUSE CVE CVE-2018-10877 page", url: "https://www.suse.com/security/cve/CVE-2018-10877/", }, { category: "self", summary: "SUSE CVE CVE-2018-10878 page", url: "https://www.suse.com/security/cve/CVE-2018-10878/", }, { category: "self", summary: "SUSE CVE CVE-2018-10879 page", url: "https://www.suse.com/security/cve/CVE-2018-10879/", }, { category: "self", summary: "SUSE CVE CVE-2018-10880 page", url: "https://www.suse.com/security/cve/CVE-2018-10880/", }, { category: "self", summary: "SUSE CVE CVE-2018-10881 page", url: "https://www.suse.com/security/cve/CVE-2018-10881/", }, { category: "self", summary: "SUSE CVE CVE-2018-10882 page", url: "https://www.suse.com/security/cve/CVE-2018-10882/", }, { category: "self", summary: "SUSE CVE CVE-2018-10883 page", url: "https://www.suse.com/security/cve/CVE-2018-10883/", }, { category: "self", summary: "SUSE CVE CVE-2018-3620 page", url: "https://www.suse.com/security/cve/CVE-2018-3620/", }, { category: "self", summary: "SUSE CVE CVE-2018-3646 page", url: "https://www.suse.com/security/cve/CVE-2018-3646/", }, { category: "self", summary: "SUSE CVE CVE-2018-5391 page", url: "https://www.suse.com/security/cve/CVE-2018-5391/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2018-08-20T08:36:21Z", generator: { date: "2018-08-20T08:36:21Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:2450-1", initial_release_date: "2018-08-20T08:36:21Z", revision_history: [ { date: "2018-08-20T08:36:21Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-azure-4.12.14-5.13.1.noarch", product: { name: "kernel-devel-azure-4.12.14-5.13.1.noarch", product_id: "kernel-devel-azure-4.12.14-5.13.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-4.12.14-5.13.1.noarch", product: { name: "kernel-source-azure-4.12.14-5.13.1.noarch", product_id: "kernel-source-azure-4.12.14-5.13.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-azure-4.12.14-5.13.1.x86_64", product: { name: "kernel-azure-4.12.14-5.13.1.x86_64", product_id: "kernel-azure-4.12.14-5.13.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-base-4.12.14-5.13.1.x86_64", product: { name: "kernel-azure-base-4.12.14-5.13.1.x86_64", product_id: "kernel-azure-base-4.12.14-5.13.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-4.12.14-5.13.1.x86_64", product: { name: "kernel-azure-devel-4.12.14-5.13.1.x86_64", product_id: "kernel-azure-devel-4.12.14-5.13.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-4.12.14-5.13.1.x86_64", product: { name: "kernel-syms-azure-4.12.14-5.13.1.x86_64", product_id: "kernel-syms-azure-4.12.14-5.13.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 15", product: { name: "SUSE Linux Enterprise Module for Public Cloud 15", product_id: "SUSE Linux Enterprise Module for Public Cloud 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:15", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-4.12.14-5.13.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", product_id: "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", }, product_reference: "kernel-azure-4.12.14-5.13.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-base-4.12.14-5.13.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", product_id: "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", }, product_reference: "kernel-azure-base-4.12.14-5.13.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-4.12.14-5.13.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", product_id: "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", }, product_reference: "kernel-azure-devel-4.12.14-5.13.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-4.12.14-5.13.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15", product_id: "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", }, product_reference: "kernel-devel-azure-4.12.14-5.13.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-4.12.14-5.13.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15", product_id: "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", }, product_reference: "kernel-source-azure-4.12.14-5.13.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-4.12.14-5.13.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", product_id: "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", }, product_reference: "kernel-syms-azure-4.12.14-5.13.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15", }, ], }, vulnerabilities: [ { cve: "CVE-2018-10853", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10853", }, ], notes: [ { category: "general", text: "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10853", url: "https://www.suse.com/security/cve/CVE-2018-10853", }, { category: "external", summary: "SUSE Bug 1097104 for CVE-2018-10853", url: "https://bugzilla.suse.com/1097104", }, { category: "external", summary: "SUSE Bug 1097108 for CVE-2018-10853", url: "https://bugzilla.suse.com/1097108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-20T08:36:21Z", details: "important", }, ], title: "CVE-2018-10853", }, { cve: "CVE-2018-10876", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10876", }, ], notes: [ { category: "general", text: "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10876", url: "https://www.suse.com/security/cve/CVE-2018-10876", }, { category: "external", summary: "SUSE Bug 1099811 for CVE-2018-10876", url: "https://bugzilla.suse.com/1099811", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-20T08:36:21Z", details: "low", }, ], title: "CVE-2018-10876", }, { cve: "CVE-2018-10877", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10877", }, ], notes: [ { category: "general", text: "Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10877", url: "https://www.suse.com/security/cve/CVE-2018-10877", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10877", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099846 for CVE-2018-10877", url: "https://bugzilla.suse.com/1099846", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-20T08:36:21Z", details: "low", }, ], title: "CVE-2018-10877", }, { cve: "CVE-2018-10878", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10878", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10878", url: "https://www.suse.com/security/cve/CVE-2018-10878", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10878", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099813 for CVE-2018-10878", url: "https://bugzilla.suse.com/1099813", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-20T08:36:21Z", details: "moderate", }, ], title: "CVE-2018-10878", }, { cve: "CVE-2018-10879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10879", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10879", url: "https://www.suse.com/security/cve/CVE-2018-10879", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10879", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099844 for CVE-2018-10879", url: "https://bugzilla.suse.com/1099844", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-20T08:36:21Z", details: "moderate", }, ], title: "CVE-2018-10879", }, { cve: "CVE-2018-10880", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10880", }, ], notes: [ { category: "general", text: "Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10880", url: "https://www.suse.com/security/cve/CVE-2018-10880", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10880", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099845 for CVE-2018-10880", url: "https://bugzilla.suse.com/1099845", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-20T08:36:21Z", details: "moderate", }, ], title: "CVE-2018-10880", }, { cve: "CVE-2018-10881", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10881", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10881", url: "https://www.suse.com/security/cve/CVE-2018-10881", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10881", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099864 for CVE-2018-10881", url: "https://bugzilla.suse.com/1099864", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-20T08:36:21Z", details: "moderate", }, ], title: "CVE-2018-10881", }, { cve: "CVE-2018-10882", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10882", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10882", url: "https://www.suse.com/security/cve/CVE-2018-10882", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10882", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099849 for CVE-2018-10882", url: "https://bugzilla.suse.com/1099849", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-20T08:36:21Z", details: "moderate", }, ], title: "CVE-2018-10882", }, { cve: "CVE-2018-10883", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10883", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10883", url: "https://www.suse.com/security/cve/CVE-2018-10883", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10883", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099863 for CVE-2018-10883", url: "https://bugzilla.suse.com/1099863", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-20T08:36:21Z", details: "moderate", }, ], title: "CVE-2018-10883", }, { cve: "CVE-2018-3620", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3620", }, ], notes: [ { category: "general", text: "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3620", url: "https://www.suse.com/security/cve/CVE-2018-3620", }, { category: "external", summary: "SUSE Bug 1087078 for CVE-2018-3620", url: "https://bugzilla.suse.com/1087078", }, { category: "external", summary: "SUSE Bug 1087081 for CVE-2018-3620", url: "https://bugzilla.suse.com/1087081", }, { category: "external", summary: "SUSE Bug 1089343 for CVE-2018-3620", url: "https://bugzilla.suse.com/1089343", }, { category: "external", summary: "SUSE Bug 1090340 for CVE-2018-3620", url: "https://bugzilla.suse.com/1090340", }, { category: "external", summary: "SUSE Bug 1091107 for CVE-2018-3620", url: "https://bugzilla.suse.com/1091107", }, { category: "external", summary: "SUSE Bug 1099306 for CVE-2018-3620", url: "https://bugzilla.suse.com/1099306", }, { category: "external", summary: "SUSE Bug 1104894 for CVE-2018-3620", url: "https://bugzilla.suse.com/1104894", }, { category: "external", summary: "SUSE Bug 1136865 for CVE-2018-3620", url: "https://bugzilla.suse.com/1136865", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2018-3620", url: "https://bugzilla.suse.com/1201877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-20T08:36:21Z", details: "moderate", }, ], title: "CVE-2018-3620", }, { cve: "CVE-2018-3646", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3646", }, ], notes: [ { category: "general", text: "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3646", url: "https://www.suse.com/security/cve/CVE-2018-3646", }, { category: "external", summary: "SUSE Bug 1087078 for CVE-2018-3646", url: "https://bugzilla.suse.com/1087078", }, { category: "external", summary: "SUSE Bug 1087081 for CVE-2018-3646", url: "https://bugzilla.suse.com/1087081", }, { category: "external", summary: "SUSE Bug 1089343 for CVE-2018-3646", url: "https://bugzilla.suse.com/1089343", }, { category: "external", summary: "SUSE Bug 1091107 for CVE-2018-3646", url: "https://bugzilla.suse.com/1091107", }, { category: "external", summary: "SUSE Bug 1099306 for CVE-2018-3646", url: "https://bugzilla.suse.com/1099306", }, { category: "external", summary: "SUSE Bug 1104365 for CVE-2018-3646", url: "https://bugzilla.suse.com/1104365", }, { category: "external", summary: "SUSE Bug 1104894 for CVE-2018-3646", url: "https://bugzilla.suse.com/1104894", }, { category: "external", summary: "SUSE Bug 1106548 for CVE-2018-3646", url: "https://bugzilla.suse.com/1106548", }, { category: "external", summary: "SUSE Bug 1113534 for CVE-2018-3646", url: "https://bugzilla.suse.com/1113534", }, { category: "external", summary: "SUSE Bug 1136865 for CVE-2018-3646", url: "https://bugzilla.suse.com/1136865", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2018-3646", url: "https://bugzilla.suse.com/1178658", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2018-3646", url: "https://bugzilla.suse.com/1201877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-20T08:36:21Z", details: "important", }, ], title: "CVE-2018-3646", }, { cve: "CVE-2018-5391", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-5391", }, ], notes: [ { category: "general", text: "The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-5391", url: "https://www.suse.com/security/cve/CVE-2018-5391", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-5391", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1102340 for CVE-2018-5391", url: "https://bugzilla.suse.com/1102340", }, { category: "external", summary: "SUSE Bug 1103097 for CVE-2018-5391", url: "https://bugzilla.suse.com/1103097", }, { category: "external", summary: "SUSE Bug 1103098 for CVE-2018-5391", url: "https://bugzilla.suse.com/1103098", }, { category: "external", summary: "SUSE Bug 1108654 for CVE-2018-5391", url: "https://bugzilla.suse.com/1108654", }, { category: "external", summary: "SUSE Bug 1114071 for CVE-2018-5391", url: "https://bugzilla.suse.com/1114071", }, { category: "external", summary: "SUSE Bug 1121102 for CVE-2018-5391", url: "https://bugzilla.suse.com/1121102", }, { category: "external", summary: "SUSE Bug 1134140 for CVE-2018-5391", url: "https://bugzilla.suse.com/1134140", }, { category: "external", summary: "SUSE Bug 1181460 for CVE-2018-5391", url: "https://bugzilla.suse.com/1181460", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-08-20T08:36:21Z", details: "important", }, ], title: "CVE-2018-5391", }, ], }
suse-su-2018:3083-1
Vulnerability from csaf_suse
Published
2018-10-09 11:15
Modified
2018-10-09 11:15
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a
local attacker to exploit this vulnerability via a SUID-root binary and obtain
full root privileges (bsc#1108912)
- CVE-2018-14617: Prevent NULL pointer dereference and panic in
hfsplus_lookup() when opening a file (that is purportedly a hard link) in an
hfs+ filesystem that has malformed catalog data, and is mounted read-only
without a metadata directory (bsc#1102870)
- CVE-2018-16276: Incorrect bounds checking in the yurex USB driver in
yurex_read allowed local attackers to use user access read/writes to crash the
kernel or potentially escalate privileges (bsc#1106095)
- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was
caused by the way the overrun accounting works. Depending on interval and
expiry time values, the overrun can be larger than INT_MAX, but the accounting
is int based. This basically made the accounting values, which are visible to
user space via timer_getoverrun(2) and siginfo::si_overrun, random. This
allowed a local user to cause a denial of service (signed integer overflow) via
crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922)
- CVE-2018-13093: Prevent NULL pointer dereference and panic in lookup_slow()
on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image.
This occured because of a lack of proper validation that cached inodes are free
during allocation (bnc#1100001)
- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local
attackers to use a incorrect bounds check in the CDROM driver
CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that
could have been used by local attackers to read kernel memory (bnc#1107689)
- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a
denial of service (ias_object use-after-free and system crash) or possibly have
unspecified other impact via an AF_IRDA socket (bnc#1106511)
- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed
local users to cause a denial of service (memory consumption) by repeatedly
binding an AF_IRDA socket (bnc#1106509)
- CVE-2018-10853: The KVM hypervisor did not check current privilege(CPL) level
while emulating unprivileged instructions. An unprivileged guest user/process
could have used this flaw to potentially escalate privileges inside guest
(bsc#1097104)
- CVE-2018-10902: Protect against concurrent access to prevent double realloc
(double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A
malicious local attacker could have used this for privilege escalation
(bnc#1105322).
- CVE-2018-10879: A local user could have caused a use-after-free in
ext4_xattr_set_entry function and a denial of service or unspecified other
impact by renaming a file in a crafted ext4 filesystem image (bsc#1099844)
- CVE-2018-10883: A local user could have caused an out-of-bounds write in
jbd2_journal_dirty_metadata(), a denial of service, and a system crash by
mounting and operating on a crafted ext4 filesystem image (bsc#1099863)
- CVE-2018-10880: Prevent stack-out-of-bounds write in the ext4 filesystem code
when mounting and writing to a crafted ext4 image in ext4_update_inline_data().
An attacker could have used this to cause a system crash and a denial of
service (bsc#1099845)
- CVE-2018-10882: A local user could have caused an out-of-bound write, a
denial of service, and a system crash by unmounting a crafted ext4 filesystem
image (bsc#1099849)
- CVE-2018-10881: A local user could have caused an out-of-bound access in
ext4_get_group_info function, a denial of service, and a system crash by
mounting and operating on a crafted ext4 filesystem image (bsc#1099864)
- CVE-2018-10877: Prevent out-of-bound access in the ext4_ext_drop_refs()
function when operating on a crafted ext4 filesystem image (bsc#1099846)
- CVE-2018-10876: A use-after-free was possible in ext4_ext_remove_space()
function when mounting and operating a crafted ext4 image (bsc#1099811)
- CVE-2018-10878: A local user could have caused an out-of-bounds write and a
denial of service or unspecified other impact by mounting and operating a
crafted ext4 filesystem image (bsc#1099813)
- CVE-2018-17182: An issue was discovered in the Linux kernel The
vmacache_flush_all function in mm/vmacache.c mishandled sequence number
overflows. An attacker can trigger a use-after-free (and possibly gain
privileges) via certain thread creation, map, unmap, invalidation,
and dereference operations (bnc#1108399).
The following non-security bugs were fixed:
- bcache: avoid unncessary cache prefetch bch_btree_node_get().
- bcache: calculate the number of incremental GC nodes according to the total of btree nodes.
- bcache: display rate debug parameters to 0 when writeback is not running.
- bcache: do not check return value of debugfs_create_dir().
- bcache: finish incremental GC.
- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064232).
- bcache: fix I/O significant decline while backend devices registering.
- bcache: free heap cache_set->flush_btree in bch_journal_free.
- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section.
- bcache: release dc->writeback_lock properly in bch_writeback_thread().
- bcache: set max writeback rate when I/O request is idle (bsc#1064232).
- bcache: simplify the calculation of the total amount of flash dirty data.
- Do not report CPU affected by L1TF when ARCH_CAP_RDCL_NO bit is set (bsc#1104906).
- ext4: check for allocation block validity with block group locked (bsc#1104495).
- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).
- kABI: protect struct x86_emulate_ops (kabi).
- KEYS: prevent creating a different user's keyrings (bnc#1065999).
- KVM: MMU: always terminate page walks at level 1 (bsc#1062604).
- KVM: MMU: simplify last_pte_bitmap (bsc#1062604).
- KVM: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).
- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- updated sssbd handling (bsc#1093215, bsc#1105412).
- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).
- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).
- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).
Patchnames
SUSE-SLE-Module-Public-Cloud-12-2018-2185,SUSE-SLE-SERVER-12-2018-2185
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 12 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a\n local attacker to exploit this vulnerability via a SUID-root binary and obtain\n full root privileges (bsc#1108912)\n- CVE-2018-14617: Prevent NULL pointer dereference and panic in\n hfsplus_lookup() when opening a file (that is purportedly a hard link) in an\n hfs+ filesystem that has malformed catalog data, and is mounted read-only\n without a metadata directory (bsc#1102870)\n- CVE-2018-16276: Incorrect bounds checking in the yurex USB driver in\n yurex_read allowed local attackers to use user access read/writes to crash the\n kernel or potentially escalate privileges (bsc#1106095)\n- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was\n caused by the way the overrun accounting works. Depending on interval and\n expiry time values, the overrun can be larger than INT_MAX, but the accounting\n is int based. This basically made the accounting values, which are visible to\n user space via timer_getoverrun(2) and siginfo::si_overrun, random. This\n allowed a local user to cause a denial of service (signed integer overflow) via\n crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922)\n- CVE-2018-13093: Prevent NULL pointer dereference and panic in lookup_slow()\n on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image.\n This occured because of a lack of proper validation that cached inodes are free\n during allocation (bnc#1100001)\n- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local\n attackers to use a incorrect bounds check in the CDROM driver\n CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)\n- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that\n could have been used by local attackers to read kernel memory (bnc#1107689)\n- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a\n denial of service (ias_object use-after-free and system crash) or possibly have\n unspecified other impact via an AF_IRDA socket (bnc#1106511)\n- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed\n local users to cause a denial of service (memory consumption) by repeatedly\n binding an AF_IRDA socket (bnc#1106509)\n- CVE-2018-10853: The KVM hypervisor did not check current privilege(CPL) level\n while emulating unprivileged instructions. An unprivileged guest user/process\n could have used this flaw to potentially escalate privileges inside guest\n (bsc#1097104)\n- CVE-2018-10902: Protect against concurrent access to prevent double realloc\n (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A\n malicious local attacker could have used this for privilege escalation\n (bnc#1105322).\n- CVE-2018-10879: A local user could have caused a use-after-free in\n ext4_xattr_set_entry function and a denial of service or unspecified other\n impact by renaming a file in a crafted ext4 filesystem image (bsc#1099844)\n- CVE-2018-10883: A local user could have caused an out-of-bounds write in\n jbd2_journal_dirty_metadata(), a denial of service, and a system crash by\n mounting and operating on a crafted ext4 filesystem image (bsc#1099863)\n- CVE-2018-10880: Prevent stack-out-of-bounds write in the ext4 filesystem code\n when mounting and writing to a crafted ext4 image in ext4_update_inline_data().\n An attacker could have used this to cause a system crash and a denial of\n service (bsc#1099845)\n- CVE-2018-10882: A local user could have caused an out-of-bound write, a\n denial of service, and a system crash by unmounting a crafted ext4 filesystem\n image (bsc#1099849)\n- CVE-2018-10881: A local user could have caused an out-of-bound access in\n ext4_get_group_info function, a denial of service, and a system crash by\n mounting and operating on a crafted ext4 filesystem image (bsc#1099864)\n- CVE-2018-10877: Prevent out-of-bound access in the ext4_ext_drop_refs()\n function when operating on a crafted ext4 filesystem image (bsc#1099846)\n- CVE-2018-10876: A use-after-free was possible in ext4_ext_remove_space()\n function when mounting and operating a crafted ext4 image (bsc#1099811)\n- CVE-2018-10878: A local user could have caused an out-of-bounds write and a\n denial of service or unspecified other impact by mounting and operating a\n crafted ext4 filesystem image (bsc#1099813)\n- CVE-2018-17182: An issue was discovered in the Linux kernel The\n vmacache_flush_all function in mm/vmacache.c mishandled sequence number\n overflows. An attacker can trigger a use-after-free (and possibly gain\n privileges) via certain thread creation, map, unmap, invalidation,\n and dereference operations (bnc#1108399).\n\nThe following non-security bugs were fixed:\n\n- bcache: avoid unncessary cache prefetch bch_btree_node_get().\n- bcache: calculate the number of incremental GC nodes according to the total of btree nodes.\n- bcache: display rate debug parameters to 0 when writeback is not running.\n- bcache: do not check return value of debugfs_create_dir().\n- bcache: finish incremental GC.\n- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064232).\n- bcache: fix I/O significant decline while backend devices registering.\n- bcache: free heap cache_set->flush_btree in bch_journal_free.\n- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section.\n- bcache: release dc->writeback_lock properly in bch_writeback_thread().\n- bcache: set max writeback rate when I/O request is idle (bsc#1064232).\n- bcache: simplify the calculation of the total amount of flash dirty data.\n- Do not report CPU affected by L1TF when ARCH_CAP_RDCL_NO bit is set (bsc#1104906).\n- ext4: check for allocation block validity with block group locked (bsc#1104495).\n- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).\n- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).\n- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).\n- kABI: protect struct x86_emulate_ops (kabi).\n- KEYS: prevent creating a different user's keyrings (bnc#1065999).\n- KVM: MMU: always terminate page walks at level 1 (bsc#1062604).\n- KVM: MMU: simplify last_pte_bitmap (bsc#1062604).\n- KVM: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).\n- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).\n- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).\n- updated sssbd handling (bsc#1093215, bsc#1105412).\n- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).\n- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).\n- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-Module-Public-Cloud-12-2018-2185,SUSE-SLE-SERVER-12-2018-2185", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3083-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:3083-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183083-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:3083-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html", }, { category: "self", summary: "SUSE Bug 1012382", url: "https://bugzilla.suse.com/1012382", }, { category: "self", summary: "SUSE Bug 1062604", url: "https://bugzilla.suse.com/1062604", }, { category: "self", summary: "SUSE Bug 1064232", url: "https://bugzilla.suse.com/1064232", }, { category: "self", summary: "SUSE Bug 1065999", url: "https://bugzilla.suse.com/1065999", }, { category: "self", summary: "SUSE Bug 1092903", url: "https://bugzilla.suse.com/1092903", }, { category: "self", summary: "SUSE Bug 1093215", url: "https://bugzilla.suse.com/1093215", }, { category: "self", summary: "SUSE Bug 1096547", url: "https://bugzilla.suse.com/1096547", }, { category: "self", summary: "SUSE Bug 1097104", url: "https://bugzilla.suse.com/1097104", }, { category: "self", summary: "SUSE Bug 1099811", url: "https://bugzilla.suse.com/1099811", }, { category: "self", summary: "SUSE Bug 1099813", url: "https://bugzilla.suse.com/1099813", }, { category: "self", summary: "SUSE Bug 1099844", url: "https://bugzilla.suse.com/1099844", }, { category: "self", summary: "SUSE Bug 1099845", url: "https://bugzilla.suse.com/1099845", }, { category: "self", summary: "SUSE Bug 1099846", url: "https://bugzilla.suse.com/1099846", }, { category: "self", summary: "SUSE Bug 1099849", url: "https://bugzilla.suse.com/1099849", }, { category: "self", summary: "SUSE Bug 1099863", url: "https://bugzilla.suse.com/1099863", }, { category: "self", summary: "SUSE Bug 1099864", url: "https://bugzilla.suse.com/1099864", }, { category: "self", summary: "SUSE Bug 1099922", url: "https://bugzilla.suse.com/1099922", }, { category: "self", summary: "SUSE Bug 1100001", url: "https://bugzilla.suse.com/1100001", }, { category: "self", summary: "SUSE Bug 1100089", url: "https://bugzilla.suse.com/1100089", }, { category: "self", summary: "SUSE Bug 1102870", url: "https://bugzilla.suse.com/1102870", }, { category: "self", summary: "SUSE Bug 1103445", url: "https://bugzilla.suse.com/1103445", }, { category: "self", summary: "SUSE Bug 1104319", url: "https://bugzilla.suse.com/1104319", }, { category: "self", summary: "SUSE Bug 1104495", url: "https://bugzilla.suse.com/1104495", }, { category: "self", summary: "SUSE Bug 1104906", url: "https://bugzilla.suse.com/1104906", }, { category: "self", summary: "SUSE Bug 1105322", url: "https://bugzilla.suse.com/1105322", }, { category: "self", summary: "SUSE Bug 1105412", url: "https://bugzilla.suse.com/1105412", }, { category: "self", summary: "SUSE Bug 1106095", url: "https://bugzilla.suse.com/1106095", }, { category: "self", summary: "SUSE Bug 1106369", url: "https://bugzilla.suse.com/1106369", }, { category: "self", summary: "SUSE Bug 1106509", url: "https://bugzilla.suse.com/1106509", }, { category: "self", summary: "SUSE Bug 1106511", url: "https://bugzilla.suse.com/1106511", }, { category: "self", summary: "SUSE Bug 1107689", url: "https://bugzilla.suse.com/1107689", }, { category: "self", summary: "SUSE Bug 1108399", url: "https://bugzilla.suse.com/1108399", }, { category: "self", summary: "SUSE Bug 1108912", url: "https://bugzilla.suse.com/1108912", }, { category: "self", summary: "SUSE CVE CVE-2018-10853 page", url: "https://www.suse.com/security/cve/CVE-2018-10853/", }, { category: "self", summary: "SUSE CVE CVE-2018-10876 page", url: "https://www.suse.com/security/cve/CVE-2018-10876/", }, { category: "self", summary: "SUSE CVE CVE-2018-10877 page", url: "https://www.suse.com/security/cve/CVE-2018-10877/", }, { category: "self", summary: "SUSE CVE CVE-2018-10878 page", url: "https://www.suse.com/security/cve/CVE-2018-10878/", }, { category: "self", summary: "SUSE CVE CVE-2018-10879 page", url: "https://www.suse.com/security/cve/CVE-2018-10879/", }, { category: "self", summary: "SUSE CVE CVE-2018-10880 page", url: "https://www.suse.com/security/cve/CVE-2018-10880/", }, { category: "self", summary: "SUSE CVE CVE-2018-10881 page", url: "https://www.suse.com/security/cve/CVE-2018-10881/", }, { category: "self", summary: "SUSE CVE CVE-2018-10882 page", url: "https://www.suse.com/security/cve/CVE-2018-10882/", }, { category: "self", summary: "SUSE CVE CVE-2018-10883 page", url: "https://www.suse.com/security/cve/CVE-2018-10883/", }, { category: "self", summary: "SUSE CVE CVE-2018-10902 page", url: "https://www.suse.com/security/cve/CVE-2018-10902/", }, { category: "self", summary: "SUSE CVE CVE-2018-10940 page", url: "https://www.suse.com/security/cve/CVE-2018-10940/", }, { category: "self", summary: "SUSE CVE CVE-2018-12896 page", url: "https://www.suse.com/security/cve/CVE-2018-12896/", }, { category: "self", summary: "SUSE CVE CVE-2018-13093 page", url: "https://www.suse.com/security/cve/CVE-2018-13093/", }, { category: "self", summary: "SUSE CVE CVE-2018-14617 page", url: "https://www.suse.com/security/cve/CVE-2018-14617/", }, { category: "self", summary: "SUSE CVE CVE-2018-14634 page", url: "https://www.suse.com/security/cve/CVE-2018-14634/", }, { category: "self", summary: "SUSE CVE CVE-2018-16276 page", url: "https://www.suse.com/security/cve/CVE-2018-16276/", }, { category: "self", summary: "SUSE CVE CVE-2018-16658 page", url: "https://www.suse.com/security/cve/CVE-2018-16658/", }, { category: "self", summary: "SUSE CVE CVE-2018-17182 page", url: "https://www.suse.com/security/cve/CVE-2018-17182/", }, { category: "self", summary: "SUSE CVE CVE-2018-6554 page", url: "https://www.suse.com/security/cve/CVE-2018-6554/", }, { category: "self", summary: "SUSE CVE CVE-2018-6555 page", url: "https://www.suse.com/security/cve/CVE-2018-6555/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2018-10-09T11:15:29Z", generator: { date: "2018-10-09T11:15:29Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:3083-1", initial_release_date: "2018-10-09T11:15:29Z", revision_history: [ { date: "2018-10-09T11:15:29Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-3.12.61-52.146.1.noarch", product: { name: "kernel-devel-3.12.61-52.146.1.noarch", product_id: "kernel-devel-3.12.61-52.146.1.noarch", }, }, { category: "product_version", name: "kernel-macros-3.12.61-52.146.1.noarch", product: { name: "kernel-macros-3.12.61-52.146.1.noarch", product_id: "kernel-macros-3.12.61-52.146.1.noarch", }, }, { category: "product_version", name: "kernel-source-3.12.61-52.146.1.noarch", product: { name: "kernel-source-3.12.61-52.146.1.noarch", product_id: "kernel-source-3.12.61-52.146.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-default-3.12.61-52.146.1.ppc64le", product: { name: "kernel-default-3.12.61-52.146.1.ppc64le", product_id: "kernel-default-3.12.61-52.146.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-3.12.61-52.146.1.ppc64le", product: { name: "kernel-default-base-3.12.61-52.146.1.ppc64le", product_id: "kernel-default-base-3.12.61-52.146.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-3.12.61-52.146.1.ppc64le", product: { name: "kernel-default-devel-3.12.61-52.146.1.ppc64le", product_id: "kernel-default-devel-3.12.61-52.146.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-3.12.61-52.146.1.ppc64le", product: { name: "kernel-syms-3.12.61-52.146.1.ppc64le", product_id: "kernel-syms-3.12.61-52.146.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-default-3.12.61-52.146.1.s390x", product: { name: "kernel-default-3.12.61-52.146.1.s390x", product_id: "kernel-default-3.12.61-52.146.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-3.12.61-52.146.1.s390x", product: { name: "kernel-default-base-3.12.61-52.146.1.s390x", product_id: "kernel-default-base-3.12.61-52.146.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-3.12.61-52.146.1.s390x", product: { name: "kernel-default-devel-3.12.61-52.146.1.s390x", product_id: "kernel-default-devel-3.12.61-52.146.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-3.12.61-52.146.1.s390x", product: { name: "kernel-default-man-3.12.61-52.146.1.s390x", product_id: "kernel-default-man-3.12.61-52.146.1.s390x", }, }, { category: "product_version", name: "kernel-syms-3.12.61-52.146.1.s390x", product: { name: "kernel-syms-3.12.61-52.146.1.s390x", product_id: "kernel-syms-3.12.61-52.146.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-ec2-3.12.61-52.146.1.x86_64", product: { name: "kernel-ec2-3.12.61-52.146.1.x86_64", product_id: "kernel-ec2-3.12.61-52.146.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-devel-3.12.61-52.146.1.x86_64", product: { name: "kernel-ec2-devel-3.12.61-52.146.1.x86_64", product_id: "kernel-ec2-devel-3.12.61-52.146.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-extra-3.12.61-52.146.1.x86_64", product: { name: "kernel-ec2-extra-3.12.61-52.146.1.x86_64", product_id: "kernel-ec2-extra-3.12.61-52.146.1.x86_64", }, }, { category: "product_version", name: "kernel-default-3.12.61-52.146.1.x86_64", product: { name: "kernel-default-3.12.61-52.146.1.x86_64", product_id: "kernel-default-3.12.61-52.146.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-3.12.61-52.146.1.x86_64", product: { name: "kernel-default-base-3.12.61-52.146.1.x86_64", product_id: "kernel-default-base-3.12.61-52.146.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-3.12.61-52.146.1.x86_64", product: { name: "kernel-default-devel-3.12.61-52.146.1.x86_64", product_id: "kernel-default-devel-3.12.61-52.146.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-3.12.61-52.146.1.x86_64", product: { name: "kernel-syms-3.12.61-52.146.1.x86_64", product_id: "kernel-syms-3.12.61-52.146.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-3.12.61-52.146.1.x86_64", product: { name: "kernel-xen-3.12.61-52.146.1.x86_64", product_id: "kernel-xen-3.12.61-52.146.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-base-3.12.61-52.146.1.x86_64", product: { name: "kernel-xen-base-3.12.61-52.146.1.x86_64", product_id: "kernel-xen-base-3.12.61-52.146.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-devel-3.12.61-52.146.1.x86_64", product: { name: "kernel-xen-devel-3.12.61-52.146.1.x86_64", product_id: "kernel-xen-devel-3.12.61-52.146.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", product: { name: "kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", product_id: "kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", product: { name: "kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", product_id: "kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 12", product: { name: "SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:12", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12-LTSS", product: { name: "SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.12.61-52.146.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", }, product_reference: "kernel-ec2-3.12.61-52.146.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 12", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.12.61-52.146.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", }, product_reference: "kernel-ec2-devel-3.12.61-52.146.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 12", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-extra-3.12.61-52.146.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", }, product_reference: "kernel-ec2-extra-3.12.61-52.146.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.61-52.146.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", }, product_reference: "kernel-default-3.12.61-52.146.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.61-52.146.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", }, product_reference: "kernel-default-3.12.61-52.146.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.61-52.146.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", }, product_reference: "kernel-default-3.12.61-52.146.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.61-52.146.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", }, product_reference: "kernel-default-base-3.12.61-52.146.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.61-52.146.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", }, product_reference: "kernel-default-base-3.12.61-52.146.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.61-52.146.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", }, product_reference: "kernel-default-base-3.12.61-52.146.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.61-52.146.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", }, product_reference: "kernel-default-devel-3.12.61-52.146.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.61-52.146.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", }, product_reference: "kernel-default-devel-3.12.61-52.146.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.61-52.146.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", }, product_reference: "kernel-default-devel-3.12.61-52.146.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-3.12.61-52.146.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", }, product_reference: "kernel-default-man-3.12.61-52.146.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-3.12.61-52.146.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", }, product_reference: "kernel-devel-3.12.61-52.146.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-3.12.61-52.146.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", }, product_reference: "kernel-macros-3.12.61-52.146.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.12.61-52.146.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", }, product_reference: "kernel-source-3.12.61-52.146.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.61-52.146.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", }, product_reference: "kernel-syms-3.12.61-52.146.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.61-52.146.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", }, product_reference: "kernel-syms-3.12.61-52.146.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.61-52.146.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", }, product_reference: "kernel-syms-3.12.61-52.146.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.12.61-52.146.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", }, product_reference: "kernel-xen-3.12.61-52.146.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.12.61-52.146.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", }, product_reference: "kernel-xen-base-3.12.61-52.146.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.12.61-52.146.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", }, product_reference: "kernel-xen-devel-3.12.61-52.146.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", }, product_reference: "kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", }, product_reference: "kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2018-10853", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10853", }, ], notes: [ { category: "general", text: "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10853", url: "https://www.suse.com/security/cve/CVE-2018-10853", }, { category: "external", summary: "SUSE Bug 1097104 for CVE-2018-10853", url: "https://bugzilla.suse.com/1097104", }, { category: "external", summary: "SUSE Bug 1097108 for CVE-2018-10853", url: "https://bugzilla.suse.com/1097108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T11:15:29Z", details: "important", }, ], title: "CVE-2018-10853", }, { cve: "CVE-2018-10876", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10876", }, ], notes: [ { category: "general", text: "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10876", url: "https://www.suse.com/security/cve/CVE-2018-10876", }, { category: "external", summary: "SUSE Bug 1099811 for CVE-2018-10876", url: "https://bugzilla.suse.com/1099811", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T11:15:29Z", details: "low", }, ], title: "CVE-2018-10876", }, { cve: "CVE-2018-10877", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10877", }, ], notes: [ { category: "general", text: "Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10877", url: "https://www.suse.com/security/cve/CVE-2018-10877", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10877", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099846 for CVE-2018-10877", url: "https://bugzilla.suse.com/1099846", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T11:15:29Z", details: "low", }, ], title: "CVE-2018-10877", }, { cve: "CVE-2018-10878", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10878", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10878", url: "https://www.suse.com/security/cve/CVE-2018-10878", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10878", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099813 for CVE-2018-10878", url: "https://bugzilla.suse.com/1099813", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T11:15:29Z", details: "moderate", }, ], title: "CVE-2018-10878", }, { cve: "CVE-2018-10879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10879", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10879", url: "https://www.suse.com/security/cve/CVE-2018-10879", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10879", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099844 for CVE-2018-10879", url: "https://bugzilla.suse.com/1099844", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T11:15:29Z", details: "moderate", }, ], title: "CVE-2018-10879", }, { cve: "CVE-2018-10880", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10880", }, ], notes: [ { category: "general", text: "Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10880", url: "https://www.suse.com/security/cve/CVE-2018-10880", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10880", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099845 for CVE-2018-10880", url: "https://bugzilla.suse.com/1099845", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T11:15:29Z", details: "moderate", }, ], title: "CVE-2018-10880", }, { cve: "CVE-2018-10881", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10881", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10881", url: "https://www.suse.com/security/cve/CVE-2018-10881", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10881", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099864 for CVE-2018-10881", url: "https://bugzilla.suse.com/1099864", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T11:15:29Z", details: "moderate", }, ], title: "CVE-2018-10881", }, { cve: "CVE-2018-10882", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10882", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10882", url: "https://www.suse.com/security/cve/CVE-2018-10882", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10882", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099849 for CVE-2018-10882", url: "https://bugzilla.suse.com/1099849", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T11:15:29Z", details: "moderate", }, ], title: "CVE-2018-10882", }, { cve: "CVE-2018-10883", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10883", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10883", url: "https://www.suse.com/security/cve/CVE-2018-10883", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10883", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099863 for CVE-2018-10883", url: "https://bugzilla.suse.com/1099863", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T11:15:29Z", details: "moderate", }, ], title: "CVE-2018-10883", }, { cve: "CVE-2018-10902", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10902", }, ], notes: [ { category: "general", text: "It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10902", url: "https://www.suse.com/security/cve/CVE-2018-10902", }, { category: "external", summary: "SUSE Bug 1105322 for CVE-2018-10902", url: "https://bugzilla.suse.com/1105322", }, { category: "external", summary: "SUSE Bug 1105323 for CVE-2018-10902", url: "https://bugzilla.suse.com/1105323", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T11:15:29Z", details: "moderate", }, ], title: "CVE-2018-10902", }, { cve: "CVE-2018-10940", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10940", }, ], notes: [ { category: "general", text: "The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c in the Linux kernel before 4.16.6 allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10940", url: "https://www.suse.com/security/cve/CVE-2018-10940", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10940", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092903 for CVE-2018-10940", url: "https://bugzilla.suse.com/1092903", }, { category: "external", summary: "SUSE Bug 1107689 for CVE-2018-10940", url: "https://bugzilla.suse.com/1107689", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-10940", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T11:15:29Z", details: "moderate", }, ], title: "CVE-2018-10940", }, { cve: "CVE-2018-12896", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12896", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12896", url: "https://www.suse.com/security/cve/CVE-2018-12896", }, { category: "external", summary: "SUSE Bug 1099922 for CVE-2018-12896", url: "https://bugzilla.suse.com/1099922", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T11:15:29Z", details: "low", }, ], title: "CVE-2018-12896", }, { cve: "CVE-2018-13093", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-13093", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/xfs/xfs_icache.c in the Linux kernel through 4.17.3. There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-13093", url: "https://www.suse.com/security/cve/CVE-2018-13093", }, { category: "external", summary: "SUSE Bug 1100001 for CVE-2018-13093", url: "https://bugzilla.suse.com/1100001", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T11:15:29Z", details: "moderate", }, ], title: "CVE-2018-13093", }, { cve: "CVE-2018-14617", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14617", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14617", url: "https://www.suse.com/security/cve/CVE-2018-14617", }, { category: "external", summary: "SUSE Bug 1102870 for CVE-2018-14617", url: "https://bugzilla.suse.com/1102870", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T11:15:29Z", details: "moderate", }, ], title: "CVE-2018-14617", }, { cve: "CVE-2018-14634", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14634", }, ], notes: [ { category: "general", text: "An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14634", url: "https://www.suse.com/security/cve/CVE-2018-14634", }, { category: "external", summary: "SUSE Bug 1108912 for CVE-2018-14634", url: "https://bugzilla.suse.com/1108912", }, { category: "external", summary: "SUSE Bug 1108963 for CVE-2018-14634", url: "https://bugzilla.suse.com/1108963", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2018-14634", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 1120323 for CVE-2018-14634", url: "https://bugzilla.suse.com/1120323", }, { category: "external", summary: "SUSE Bug 1122265 for CVE-2018-14634", url: "https://bugzilla.suse.com/1122265", }, { category: "external", summary: "SUSE Bug 1188063 for CVE-2018-14634", url: "https://bugzilla.suse.com/1188063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T11:15:29Z", details: "important", }, ], title: "CVE-2018-14634", }, { cve: "CVE-2018-16276", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16276", }, ], notes: [ { category: "general", text: "An issue was discovered in yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7. Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16276", url: "https://www.suse.com/security/cve/CVE-2018-16276", }, { category: "external", summary: "SUSE Bug 1106095 for CVE-2018-16276", url: "https://bugzilla.suse.com/1106095", }, { category: "external", summary: "SUSE Bug 1115593 for CVE-2018-16276", url: "https://bugzilla.suse.com/1115593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T11:15:29Z", details: "important", }, ], title: "CVE-2018-16276", }, { cve: "CVE-2018-16658", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16658", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16658", url: "https://www.suse.com/security/cve/CVE-2018-16658", }, { category: "external", summary: "SUSE Bug 1092903 for CVE-2018-16658", url: "https://bugzilla.suse.com/1092903", }, { category: "external", summary: "SUSE Bug 1107689 for CVE-2018-16658", url: "https://bugzilla.suse.com/1107689", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-16658", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T11:15:29Z", details: "low", }, ], title: "CVE-2018-16658", }, { cve: "CVE-2018-17182", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17182", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17182", url: "https://www.suse.com/security/cve/CVE-2018-17182", }, { category: "external", summary: "SUSE Bug 1108399 for CVE-2018-17182", url: "https://bugzilla.suse.com/1108399", }, { category: "external", summary: "SUSE Bug 1110233 for CVE-2018-17182", url: "https://bugzilla.suse.com/1110233", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T11:15:29Z", details: "moderate", }, ], title: "CVE-2018-17182", }, { cve: "CVE-2018-6554", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6554", }, ], notes: [ { category: "general", text: "Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6554", url: "https://www.suse.com/security/cve/CVE-2018-6554", }, { category: "external", summary: "SUSE Bug 1106509 for CVE-2018-6554", url: "https://bugzilla.suse.com/1106509", }, { category: "external", summary: "SUSE Bug 1106511 for CVE-2018-6554", url: "https://bugzilla.suse.com/1106511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T11:15:29Z", details: "low", }, ], title: "CVE-2018-6554", }, { cve: "CVE-2018-6555", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6555", }, ], notes: [ { category: "general", text: "The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6555", url: "https://www.suse.com/security/cve/CVE-2018-6555", }, { category: "external", summary: "SUSE Bug 1106509 for CVE-2018-6555", url: "https://bugzilla.suse.com/1106509", }, { category: "external", summary: "SUSE Bug 1106511 for CVE-2018-6555", url: "https://bugzilla.suse.com/1106511", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2018-6555", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.146.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.146.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-1-1.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-09T11:15:29Z", details: "moderate", }, ], title: "CVE-2018-6555", }, ], }
suse-su-2018:2596-1
Vulnerability from csaf_suse
Published
2018-09-03 15:29
Modified
2018-09-03 15:29
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 RT kernel was updated to 4.4.147 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent->sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 bsc#1103580).
- CVE-2018-10876: A flaw was found in the ext4 filesystem code. A use-after-free was possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image. (bnc#1099811)
- CVE-2018-10877: The ext4 filesystem was vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image. (bnc#1099846)
- CVE-2018-10878: A flaw was found in the ext4 filesystem. A local user could cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image. (bnc#1099813)
- CVE-2018-10879: A flaw was found in the ext4 filesystem. A local user could cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image. (bnc#1099844)
- CVE-2018-10880: Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service. (bnc#1099845)
- CVE-2018-10881: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099864)
- CVE-2018-10882: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image. (bnc#1099849)
- CVE-2018-10883: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099863)
- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).
- CVE-2018-3620: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis (bnc#1087081).
- CVE-2018-3646: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis (bnc#1089343 bnc#1104365).
- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).
- CVE-2018-5391 aka 'FragmentSmack': A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).
- CVE-2018-9363: A buffer overflow in bluetooth HID report processing could be used by malicious bluetooth devices to crash the kernel or potentially execute code (bnc#1105292).
The following non-security bugs were fixed:
- acpi / pci: Bail early in acpi_pci_add_bus() if there is no ACPI handle (bnc#1012382).
- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)
- ahci: Disable LPM on Lenovo 50 series laptops with a too old BIOS (bnc#1012382).
- alsa: emu10k1: add error handling for snd_ctl_add (bnc#1012382).
- alsa: emu10k1: Rate-limit error messages about page errors (bnc#1012382).
- alsa: fm801: add error handling for snd_ctl_add (bnc#1012382).
- alsa: hda/ca0132: fix build failure when a local macro is defined (bnc#1012382).
- alsa: rawmidi: Change resized buffers atomically (bnc#1012382).
- alsa: usb-audio: Apply rate limit to warning messages in URB complete callback (bnc#1012382).
- arc: Fix CONFIG_SWAP (bnc#1012382).
- arc: mm: allow mprotect to make stack mappings executable (bnc#1012382).
- arm64: do not open code page table entry creation (bsc#1102197).
- arm64: kpti: Use early_param for kpti= command-line option (bsc#1102188).
- arm64: Make sure permission updates happen for pmd/pud (bsc#1102197).
- arm: dts: imx6q: Use correct SDMA script for SPI5 core (bnc#1012382).
- arm: fix put_user() for gcc-8 (bnc#1012382).
- asoc: dpcm: fix BE dai not hw_free and shutdown (bnc#1012382).
- asoc: pxa: Fix module autoload for platform drivers (bnc#1012382).
- ath10k: fix rfc1042 header retrieval in QCA4019 with eth decap mode (bnc#1012382).
- ath: Add regulatory mapping for APL13_WORLD (bnc#1012382).
- ath: Add regulatory mapping for APL2_FCCA (bnc#1012382).
- ath: Add regulatory mapping for Bahamas (bnc#1012382).
- ath: Add regulatory mapping for Bermuda (bnc#1012382).
- ath: Add regulatory mapping for ETSI8_WORLD (bnc#1012382).
- ath: Add regulatory mapping for FCC3_ETSIC (bnc#1012382).
- ath: Add regulatory mapping for Serbia (bnc#1012382).
- ath: Add regulatory mapping for Tanzania (bnc#1012382).
- ath: Add regulatory mapping for Uganda (bnc#1012382).
- atm: zatm: Fix potential Spectre v1 (bnc#1012382).
- audit: allow not equal op for audit by executable (bnc#1012382).
- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).
- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).
- bcache: add io_disable to struct cached_dev (bsc#1064232).
- bcache: add journal statistic (bsc#1076110).
- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).
- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).
- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).
- bcache: Annotate switch fall-through (bsc#1064232).
- bcache: closures: move control bits one bit right (bsc#1076110).
- bcache: correct flash only vols (check all uuids) (bsc#1064232).
- bcache: count backing device I/O error for writeback I/O (bsc#1064232).
- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).
- bcache: fix cached_dev->count usage for bch_cache_set_error() (bsc#1064232).
- bcache: fix crashes in duplicate cache device register (bsc#1076110).
- bcache: fix error return value in memory shrink (bsc#1064232).
- bcache: fix high CPU occupancy during journal (bsc#1076110).
- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).
- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).
- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).
- bcache: Fix indentation (bsc#1064232).
- bcache: Fix kernel-doc warnings (bsc#1064232).
- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).
- bcache: fix using of loop variable in memory shrink (bsc#1064232).
- bcache: fix writeback target calc on large devices (bsc#1076110).
- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).
- bcache: mark closure_sync() __sched (bsc#1076110).
- bcache: move closure debug file into debug directory (bsc#1064232).
- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).
- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).
- bcache: Remove an unused variable (bsc#1064232).
- bcache: ret IOERR when read meets metadata error (bsc#1076110).
- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).
- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).
- bcache: set dc->io_disable to true in conditional_stop_bcache_device() (bsc#1064232).
- bcache: set error_limit correctly (bsc#1064232).
- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).
- bcache: stop bcache device when backing device is offline (bsc#1064232).
- bcache: stop dc->writeback_rate_update properly (bsc#1064232).
- bcache: stop writeback thread after detaching (bsc#1076110).
- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).
- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).
- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).
- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).
- bcm63xx_enet: correct clock usage (bnc#1012382).
- bcm63xx_enet: do not write to random DMA channel on BCM6345 (bnc#1012382).
- blkcg: simplify statistic accumulation code (bsc#1082979).
- block: copy ioprio in __bio_clone_fast() (bsc#1082653).
- block: do not use interruptible wait anywhere (bnc#1012382).
- block/swim: Fix array bounds check (bsc#1082979).
- bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bnc#1012382).
- bluetooth: hci_qca: Fix 'Sleep inside atomic section' warning (bnc#1012382).
- bpf: fix loading of BPF_MAXINSNS sized programs (bsc#1012382).
- bpf: fix references to free_bpf_prog_info() in comments (bnc#1012382).
- bpf, x64: fix memleak when not converging after image (bsc#1012382).
- brcmfmac: Add support for bcm43364 wireless chipset (bnc#1012382).
- btrfs: add barriers to btrfs_sync_log before log_commit_wait wakeups (bnc#1012382).
- btrfs: Do not remove block group still has pinned down bytes (bsc#1086457).
- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bnc#1012382).
- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (git-fixes).
- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).
- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).
- cachefiles: Wait rather than BUG'ing on 'Unexpected object collision' (bsc#1099858).
- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bnc#1012382).
- can: xilinx_can: fix device dropping off bus on RX overrun (bnc#1012382).
- can: xilinx_can: fix incorrect clear of non-processed interrupts (bnc#1012382).
- can: xilinx_can: fix recovery from error states not being propagated (bnc#1012382).
- can: xilinx_can: fix RX loop if RXNEMP is asserted without RXOK (bnc#1012382).
- can: xilinx_can: fix RX overflow interrupt not being enabled (bnc#1012382).
- can: xilinx_can: keep only 1-2 frames in TX FIFO to fix TX accounting (bnc#1012382).
- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).
- cifs: Fix infinite loop when using hard mount option (bnc#1012382).
- clk: tegra: Fix PLL_U post divider and initial rate on Tegra30 (bnc#1012382).
- compiler, clang: always inline when CONFIG_OPTIMIZE_INLINING is disabled (bnc#1012382).
- compiler, clang: properly override 'inline' for clang (bnc#1012382).
- compiler, clang: suppress warning for unused static inline functions (bnc#1012382).
- compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations (bnc#1012382).
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- crypto: authenc - do not leak pointers to authenc keys (bnc#1012382).
- crypto: authencesn - do not leak pointers to authenc keys (bnc#1012382).
- crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak (bnc#1012382).
- crypto: crypto4xx - remove bad list_del (bnc#1012382).
- crypto: padlock-aes - Fix Nano workaround data corruption (bnc#1012382).
- disable loading f2fs module on PAGE_SIZE > 4KB (bnc#1012382).
- dmaengine: pxa_dma: remove duplicate const qualifier (bnc#1012382).
- dma-iommu: Fix compilation when !CONFIG_IOMMU_DMA (bnc#1012382).
- dm thin metadata: remove needless work from __commit_transaction (bsc#1082979).
- documentation/spec_ctrl: Do some minor cleanups (bnc#1012382).
- drbd: fix access after free (bnc#1012382).
- driver core: Partially revert 'driver core: correct device's shutdown order' (bnc#1012382).
- drm: Add DP PSR2 sink enable bit (bnc#1012382).
- drm/atomic: Handling the case when setting old crtc for plane (bnc#1012382).
- drm/cirrus: Use drm_framebuffer_put to avoid kernel oops in clean-up (bsc#1101822).
- drm/gma500: fix psb_intel_lvds_mode_valid()'s return type (bnc#1012382).
- drm/msm: Fix possible null dereference on failure of get_pages() (bsc#1102394).
- drm/radeon: fix mode_valid's return type (bnc#1012382).
- drm: re-enable error handling (bsc#1103884).
- esp6: fix memleak on error path in esp6_input (git-fixes).
- ext4: add more inode number paranoia checks (bnc#1012382).
- ext4: add more mount time checks of the superblock (bnc#1012382).
- ext4: always check block group bounds in ext4_init_block_bitmap() (bnc#1012382).
- ext4: check for allocation block validity with block group locked (bsc#1104495).
- ext4: check superblock mapped prior to committing (bnc#1012382).
- ext4: clear i_data in ext4_inode_info when removing inline data (bnc#1012382).
- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).
- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).
- ext4: fix inline data updates with checksums enabled (bsc#1104494).
- ext4: include the illegal physical block in the bad map ext4_error msg (bnc#1012382).
- ext4: make sure bitmaps and the inode table do not overlap with bg descriptors (bnc#1012382).
- ext4: only look at the bg_flags field if it is valid (bnc#1012382).
- ext4: verify the depth of extent tree in ext4_find_extent() (bnc#1012382).
- f2fs: fix to do not trigger writeback during recovery (bnc#1012382).
- fat: fix memory allocation failure handling of match_strdup() (bnc#1012382).
- fscache: Allow cancelled operations to be enqueued (bsc#1099858).
- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).
- genirq: Make force irq threading setup more robust (bsc#1082979).
- hid: debug: check length before copy_to_user() (bnc#1012382).
- hid: hiddev: fix potential Spectre v1 (bnc#1012382).
- hid: hid-plantronics: Re-resend Update to map button for PTT products (bnc#1012382).
- hid: i2c-hid: check if device is there before really probing (bnc#1012382).
- hid: i2c-hid: Fix 'incomplete report' noise (bnc#1012382).
- hid: usbhid: add quirk for innomedia INNEX GENESIS/ATARI adapter (bnc#1012382).
- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bnc#1012382).
- i2c: imx: Fix reinit_completion() use (bnc#1012382).
- i2c: rcar: fix resume by always initializing registers before transfer (bnc#1012382).
- ib/isert: fix T10-pi check mask setting (bsc#1082979).
- ibmasm: do not write out of bounds in read handler (bnc#1012382).
- ibmvnic: Fix error recovery on login failure (bsc#1101789).
- ibmvnic: Remove code to request error information (bsc#1104174).
- ibmvnic: Revise RX/TX queue error messages (bsc#1101331).
- ibmvnic: Update firmware error reporting with cause string (bsc#1104174).
- inet: frag: enforce memory limits earlier (bnc#1012382 bsc#970506).
- input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bnc#1012382).
- input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bnc#1012382).
- input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bnc#1012382).
- ipconfig: Correctly initialise ic_nameservers (bnc#1012382).
- ip: hash fragments consistently (bnc#1012382).
- ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull (bnc#1012382).
- ipv4: Fix error return value in fib_convert_metrics() (bnc#1012382).
- ipv4: remove BUG_ON() from fib_compute_spec_dst (bnc#1012382).
- ipv4: Return EINVAL when ping_group_range sysctl does not map to user ns (bnc#1012382).
- ipv6: fix useless rol32 call on hash (bnc#1012382).
- iw_cxgb4: correctly enforce the max reg_mr depth (bnc#1012382).
- iwlwifi: pcie: fix race in Rx buffer allocator (bnc#1012382).
- jbd2: do not mark block as modified if the handle is out of credits (bnc#1012382).
- kabi protect includes in include/linux/inet.h (bsc#1095643).
- KABI protect net/core/utils.c includes (bsc#1095643).
- kABI: protect struct loop_device (kabi).
- kABI: reexport tcp_send_ack (kabi).
- kABI: reintroduce __static_cpu_has_safe (kabi).
- kabi/severities: add 'drivers/md/bcache/* PASS' since no one uses symboles expoted by bcache.
- kbuild: fix # escaping in .cmd files for future Make (bnc#1012382).
- KEYS: DNS: fix parsing multiple options (bnc#1012382).
- kmod: fix wait on recursive loop (bsc#1099792).
- kmod: reduce atomic operations on kmod_concurrent and simplify (bsc#1099792).
- kmod: throttle kmod thread limit (bsc#1099792).
- kprobes/x86: Do not modify singlestep buffer while resuming (bnc#1012382).
- kthread, tracing: Do not expose half-written comm when creating kthreads (bsc#1104897).
- kvm: arm/arm64: Drop resource size check for GICV window (bsc#1102215).
- kvm: arm/arm64: Set dist->spis to NULL after kfree (bsc#1102214).
- kvm/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel (bnc#1012382).
- kvm: x86: vmx: fix vpid leak (bnc#1012382).
- libata: do not try to pass through NCQ commands to non-NCQ devices (bsc#1082979).
- libata: Fix command retry decision (bnc#1012382).
- lib/rhashtable: consider param->min_size when setting initial table size (bnc#1012382).
- loop: add recursion validation to LOOP_CHANGE_FD (bnc#1012382).
- loop: remember whether sysfs_create_group() was done (bnc#1012382).
- md: fix NULL dereference of mddev->pers in remove_and_add_spares() (bnc#1012382).
- media: cx25840: Use subdev host data for PLL override (bnc#1012382).
- media: omap3isp: fix unbalanced dma_iommu_mapping (bnc#1012382).
- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bnc#1012382).
- media: saa7164: Fix driver name in debug output (bnc#1012382).
- media: si470x: fix __be16 annotations (bnc#1012382).
- media: siano: get rid of __le32/__le16 cast warnings (bnc#1012382).
- media: videobuf2-core: do not call memop 'finish' when queueing (bnc#1012382).
- memory: tegra: Apply interrupts mask per SoC (bnc#1012382).
- memory: tegra: Do not handle spurious interrupts (bnc#1012382).
- mfd: cros_ec: Fail early if we cannot identify the EC (bnc#1012382).
- microblaze: Fix simpleImage format generation (bnc#1012382).
- mmc: dw_mmc: fix card threshold control configuration (bsc#1102203).
- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1097771).
- mm: hugetlb: yield when prepping struct pages (bnc#1012382).
- mm: memcg: fix use after free in mem_cgroup_iter() (bnc#1012382).
- mm/slub.c: add __printf verification to slab_err() (bnc#1012382).
- mm: vmalloc: avoid racy handling of debugobjects in vunmap (bnc#1012382).
- mtd: cfi_cmdset_0002: Change definition naming to retry write operation (bnc#1012382).
- mtd: cfi_cmdset_0002: Change erase functions to check chip good only (bnc#1012382).
- mtd: cfi_cmdset_0002: Change erase functions to retry for error (bnc#1012382).
- mtd: rawnand: fsl_ifc: fix FSL NAND driver to read all ONFI parameter pages (bnc#1012382).
- mtd: rawnand: mxc: set spare area size register explicitly (bnc#1012382).
- mtd: ubi: wl: Fix error return code in ubi_wl_init() (git-fixes).
- mwifiex: correct histogram data with appropriate index (bnc#1012382).
- mwifiex: handle race during mwifiex_usb_disconnect (bnc#1012382).
- net: cxgb3_main: fix potential Spectre v1 (bnc#1012382).
- net: dccp: avoid crash in ccid3_hc_rx_send_feedback() (bnc#1012382).
- net: dccp: switch rx_tstamp_last_feedback to monotonic clock (bnc#1012382).
- net: Do not copy pfmemalloc flag in __copy_skb_header() (bnc#1012382).
- net: dsa: Do not suspend/resume closed slave_dev (bnc#1012382).
- netfilter: ebtables: reject non-bridge targets (bnc#1012382).
- netfilter: ipset: List timing out entries with 'timeout 1' instead of zero (bnc#1012382).
- netfilter: ipvs: do not create conn for ABORT packet in sctp_conn_schedule (bsc#1102797).
- netfilter: ipvs: fix the issue that sctp_conn_schedule drops non-INIT packet (bsc#1102797).
- netfilter: nf_log: do not hold nf_log_mutex during user access (bnc#1012382).
- netfilter: nf_queue: augment nfqa_cfg_policy (bnc#1012382).
- netfilter: nf_tables: use WARN_ON_ONCE instead of BUG_ON in nft_do_chain() (bnc#1012382).
- netfilter: x_tables: initialise match/target check parameter struct (bnc#1012382).
- net: fix amd-xgbe flow-control issue (bnc#1012382).
- net/ipv4: Set oif in fib_compute_spec_dst (bnc#1012382).
- net: lan78xx: fix rx handling before first packet is send (bnc#1012382).
- netlink: Do not shift on 64 for ngroups (bnc#1012382).
- netlink: Do not shift with UB on nlk->ngroups (bnc#1012382).
- netlink: Do not subscribe to non-existent groups (bnc#1012382).
- netlink: Fix spectre v1 gadget in netlink_create() (bnc#1012382).
- net/mlx4_core: Save the qpn from the input modifier in RST2INIT wrapper (bnc#1012382).
- net/mlx5: Fix command interface race in polling mode (bnc#1012382).
- net/mlx5: Fix incorrect raw command length parsing (bnc#1012382).
- net: mvneta: fix the Rx desc DMA address in the Rx path (bsc#1102207).
- net/nfc: Avoid stalls when nfc_alloc_send_skb() returned NULL (bnc#1012382).
- net: off by one in inet6_pton() (bsc#1095643).
- net: phy: fix flag masking in __set_phy_supported (bnc#1012382).
- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1102205).
- net_sched: blackhole: tell upper qdisc about dropped packets (bnc#1012382).
- net: socket: fix potential spectre v1 gadget in socketcall (bnc#1012382).
- net: stmmac: align DMA stuff to largest cache line length (bnc#1012382).
- net: sungem: fix rx checksum support (bnc#1012382).
- net/utils: generic inet_pton_with_scope helper (bsc#1095643).
- net: vmxnet3: use new api ethtool_{get|set}_link_ksettings (bsc#1091860 bsc#1098253).
- nfsd: fix potential use-after-free in nfsd4_decode_getdeviceinfo (bnc#1012382).
- nohz: Fix local_timer_softirq_pending() (bnc#1012382).
- n_tty: Access echo_* variables carefully (bnc#1012382).
- n_tty: Fix stall at n_tty_receive_char_special() (bnc#1012382).
- null_blk: use sector_div instead of do_div (bsc#1082979).
- nvme-pci: initialize queue memory before interrupts (bnc#1012382).
- nvme-rdma: Check remotely invalidated rkey matches our expected rkey (bsc#1092001).
- nvme-rdma: default MR page size to 4k (bsc#1092001).
- nvme-rdma: do not complete requests before a send work request has completed (bsc#1092001).
- nvme-rdma: do not suppress send completions (bsc#1092001).
- nvme-rdma: Fix command completion race at error recovery (bsc#1090435).
- nvme-rdma: make nvme_rdma_[create|destroy]_queue_ib symmetrical (bsc#1092001).
- nvme-rdma: use inet_pton_with_scope helper (bsc#1095643).
- nvme-rdma: Use mr pool (bsc#1092001).
- nvme-rdma: wait for local invalidation before completing a request (bsc#1092001).
- ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent (bnc#1012382).
- pci: ibmphp: Fix use-before-set in get_max_bus_speed() (bsc#1100132).
- pci: pciehp: Request control of native hotplug only if supported (bnc#1012382).
- pci: Prevent sysfs disable of device while driver is attached (bnc#1012382).
- perf: fix invalid bit in diagnostic entry (bnc#1012382).
- perf tools: Move syscall number fallbacks from perf-sys.h to tools/arch/x86/include/asm/ (bnc#1012382).
- perf/x86/intel/uncore: Correct fixed counter index check for NHM (bnc#1012382).
- perf/x86/intel/uncore: Correct fixed counter index check in generic code (bnc#1012382).
- pinctrl: at91-pio4: add missing of_node_put (bnc#1012382).
- pm / hibernate: Fix oops at snapshot_write() (bnc#1012382).
- powerpc/32: Add a missing include header (bnc#1012382).
- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244, bsc#1100930, bsc#1102683).
- powerpc/64s: Fix compiler store ordering to SLB shadow area (bnc#1012382).
- powerpc/8xx: fix invalid register expression in head_8xx.S (bnc#1012382).
- powerpc/chrp/time: Make some functions static, add missing header include (bnc#1012382).
- powerpc/embedded6xx/hlwd-pic: Prevent interrupts from being handled by Starlet (bnc#1012382).
- powerpc/fadump: handle crash memory ranges array index overflow (bsc#1103269).
- powerpc/fadump: merge adjacent memory ranges to reduce PT_LOAD segements (bsc#1103269).
- powerpc/powermac: Add missing prototype for note_bootable_part() (bnc#1012382).
- powerpc/powermac: Mark variable x as unused (bnc#1012382).
- provide special timeout module parameters for EC2 (bsc#1065364).
- ptp: fix missing break in switch (bnc#1012382).
- qed: Limit msix vectors in kdump kernel to the minimum required count (bnc#1012382).
- r8152: napi hangup fix after disconnect (bnc#1012382).
- random: mix rdrand with entropy sent in from userspace (bnc#1012382).
- rdma/mad: Convert BUG_ONs to error flows (bnc#1012382).
- rdma/ocrdma: Fix an error code in ocrdma_alloc_pd() (bsc#1082979).
- rdma/ocrdma: Fix error codes in ocrdma_create_srq() (bsc#1082979).
- rdma/ucm: Mark UCM interface as BROKEN (bnc#1012382).
- rds: avoid unenecessary cong_update in loop transport (bnc#1012382).
- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bnc#1012382).
- Remove broken patches for dac9063 watchdog (bsc#1100843)
- restore cond_resched() in shrink_dcache_parent() (bsc#1098599).
- Revert 'block-cancel-workqueue-entries-on-blk_mq_freeze_queue' (bsc#1103717)
- Revert 'net: Do not copy pfmemalloc flag in __copy_skb_header()' (kabi).
- Revert 'sit: reload iphdr in ipip6_rcv' (bnc#1012382).
- Revert 'skbuff: Unconditionally copy pfmemalloc in __skb_clone()' (kabi).
- Revert 'x86/cpufeature: Move some of the scattered feature bits to x86_capability' (kabi).
- Revert 'x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6' (kabi).
- Revert 'x86/mm: Give each mm TLB flush generation a unique ID' (kabi).
- Revert 'x86/speculation: Use Indirect Branch Prediction Barrier in context switch' (kabi).
- ring_buffer: tracing: Inherit the tracing setting to next ring buffer (bnc#1012382).
- rsi: Fix 'invalid vdd' warning in mmc (bnc#1012382).
- rtc: ensure rtc_set_alarm fails when alarms are not supported (bnc#1012382).
- rtlwifi: rtl8821ae: fix firmware is not ready to run (bnc#1012382).
- rtnetlink: add rtnl_link_state check in rtnl_configure_link (bnc#1012382).
- s390: Correct register corruption in critical section cleanup (bnc#1012382).
- s390/cpum_sf: Add data entry sizes to sampling trailer entry (bnc#1012382).
- s390/qeth: fix error handling in adapter command callbacks (bnc#1103745, LTC#169699).
- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).
- sched/smt: Update sched_smt_present at runtime (bsc#1089343).
- scsi: 3w-9xxx: fix a missing-check bug (bnc#1012382).
- scsi: 3w-xxxx: fix a missing-check bug (bnc#1012382).
- scsi: megaraid_sas: Increase timeout by 1 sec for non-RAID fastpath IOs (bnc#1012382).
- scsi: megaraid: silence a static checker bug (bnc#1012382).
- scsi: qla2xxx: Fix ISP recovery on unload (bnc#1012382).
- scsi: qla2xxx: Return error when TMF returns (bnc#1012382).
- scsi: qlogicpti: Fix an error handling path in 'qpti_sbus_probe()' (bsc#1082979).
- scsi: scsi_dh: replace too broad 'TP9' string with the exact models (bnc#1012382).
- scsi: sg: fix minor memory leak in error path (bsc#1082979).
- scsi: sg: mitigate read/write abuse (bsc#1101296).
- scsi: target: fix crash with iscsi target and dvd (bsc#1082979).
- scsi: ufs: fix exception event handling (bnc#1012382).
- selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC (bnc#1012382).
- selftest/seccomp: Fix the seccomp(2) signature (bnc#1012382).
- skbuff: Unconditionally copy pfmemalloc in __skb_clone() (bnc#1012382).
- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).
- smsc95xx: Configure pause time to 0xffff when tx flow control enabled (bsc#1085536).
- squashfs: be more careful about metadata corruption (bnc#1012382).
- squashfs: more metadata hardening (bnc#1012382).
- squashfs: more metadata hardenings (bnc#1012382).
- staging: android: ion: Return an ERR_PTR in ion_map_kernel (bnc#1012382).
- staging: comedi: quatech_daqp_cs: fix no-op loop daqp_ao_insn_write() (bnc#1012382).
- tcp: add max_quickacks param to tcp_incr_quickack and tcp_enter_quickack_mode (bnc#1012382).
- tcp: add one more quick ack after after ECN events (bnc#1012382).
- tcp: do not aggressively quick ack after ECN events (bnc#1012382).
- tcp: do not cancel delay-AcK on DCTCP special ACK (bnc#1012382).
- tcp: do not delay ACK in DCTCP upon CE status change (bnc#1012382).
- tcp: do not force quickack when receiving out-of-order packets (bnc#1012382).
- tcp: fix dctcp delayed ACK schedule (bnc#1012382).
- tcp: fix Fast Open key endianness (bnc#1012382).
- tcp: helpers to send special DCTCP ack (bnc#1012382).
- tcp: prevent bogus FRTO undos with non-SACK flows (bnc#1012382).
- tcp: refactor tcp_ecn_check_ce to remove sk type cast (bnc#1012382).
- tg3: Add higher cpu clock for 5762 (bnc#1012382).
- thermal: exynos: fix setting rising_threshold for Exynos5433 (bnc#1012382).
- tools build: fix # escaping in .cmd files for future Make (bnc#1012382).
- tracing: Fix double free of event_trigger_data (bnc#1012382).
- tracing: Fix missing return symbol in function_graph output (bnc#1012382).
- tracing: Fix possible double free in event_enable_trigger_func() (bnc#1012382).
- tracing/kprobes: Fix trace_probe flags on enable_trace_kprobe() failure (bnc#1012382).
- tracing: Quiet gcc warning about maybe unused link variable (bnc#1012382).
- tty: Fix data race in tty_insert_flip_string_fixed_flag (bnc#1012382).
- turn off -Wattribute-alias (bnc#1012382).
- ubi: Be more paranoid while seaching for the most recent Fastmap (bnc#1012382).
- ubi: fastmap: Correctly handle interrupted erasures in EBA (bnc#1012382).
- ubi: fastmap: Erase outdated anchor PEBs during attach (bnc#1012382).
- ubi: Fix Fastmap's update_vol() (bnc#1012382).
- ubi: Fix races around ubi_refill_pools() (bnc#1012382).
- ubi: Introduce vol_ignored() (bnc#1012382).
- ubi: Rework Fastmap attach base code (bnc#1012382).
- uprobes/x86: Remove incorrect WARN_ON() in uprobe_init_insn() (bnc#1012382).
- usb: cdc_acm: Add quirk for Castles VEGA3000 (bnc#1012382).
- usb: cdc_acm: Add quirk for Uniden UBC125 scanner (bnc#1012382).
- usb: core: handle hub C_PORT_OVER_CURRENT condition (bsc#1100132).
- usb: gadget: f_fs: Only return delayed status when len is 0 (bnc#1012382).
- usb: hub: Do not wait for connect state at resume for powered-off ports (bnc#1012382).
- usbip: usbip_detach: Fix memory, udev context and udev leak (bnc#1012382).
- usb: quirks: add delay quirks for Corsair Strafe (bnc#1012382).
- USB: serial: ch341: fix type promotion bug in ch341_control_in() (bnc#1012382).
- USB: serial: cp210x: add another USB ID for Qivicon ZigBee stick (bnc#1012382).
- USB: serial: cp210x: add CESINEL device ids (bnc#1012382).
- USB: serial: cp210x: add Silicon Labs IDs for Windows Update (bnc#1012382).
- USB: serial: keyspan_pda: fix modem-status error handling (bnc#1012382).
- USB: serial: mos7840: fix status-register error handling (bnc#1012382).
- USB: yurex: fix out-of-bounds uaccess in read handler (bnc#1012382).
- vfio: platform: Fix reset module leak in error path (bsc#1102211).
- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).
- vhost_net: validate sock before trying to put its fd (bnc#1012382).
- virtio_balloon: fix another race between migration and ballooning (bnc#1012382).
- vmw_balloon: fix inflation with batching (bnc#1012382).
- vmxnet3: add receive data ring support (bsc#1091860 bsc#1098253).
- vmxnet3: add support for get_coalesce, set_coalesce ethtool operations (bsc#1091860 bsc#1098253).
- vmxnet3: allow variable length transmit data ring buffer (bsc#1091860 bsc#1098253).
- vmxnet3: avoid assumption about invalid dma_pa in vmxnet3_set_mc() (bsc#1091860 bsc#1098253).
- vmxnet3: avoid format strint overflow warning (bsc#1091860 bsc#1098253).
- vmxnet3: avoid xmit reset due to a race in vmxnet3 (bsc#1091860 bsc#1098253).
- vmxnet3: fix incorrect dereference when rxvlan is disabled (bsc#1091860 bsc#1098253).
- vmxnet3: fix non static symbol warning (bsc#1091860 bsc#1098253).
- vmxnet3: fix tx data ring copy for variable size (bsc#1091860 bsc#1098253).
- vmxnet3: increase default rx ring sizes (bsc#1091860 bsc#1098253).
- vmxnet3: introduce command to register memory region (bsc#1091860 bsc#1098253).
- vmxnet3: introduce generalized command interface to configure the device (bsc#1091860 bsc#1098253).
- vmxnet3: prepare for version 3 changes (bsc#1091860 bsc#1098253).
- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1091860 bsc#1098253).
- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1091860 bsc#1098253).
- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1091860 bsc#1098253).
- vmxnet3: set the DMA mask before the first DMA map operation (bsc#1091860 bsc#1098253).
- vmxnet3: update to version 3 (bsc#1091860 bsc#1098253).
- vmxnet3: use correct flag to indicate LRO feature (bsc#1091860 bsc#1098253).
- vmxnet3: use DMA memory barriers where required (bsc#1091860 bsc#1098253).
- wait: add wait_event_killable_timeout() (bsc#1099792).
- watchdog: da9063: Fix setting/changing timeout (bsc#1100843).
- watchdog: da9063: Fix timeout handling during probe (bsc#1100843).
- watchdog: da9063: Fix updating timeout value (bsc#1100843).
- wlcore: sdio: check for valid platform device data before suspend (bnc#1012382).
- x86/alternatives: Add an auxilary section (bnc#1012382).
- x86/alternatives: Discard dynamic check after init (bnc#1012382).
- x86/amd: do not set X86_BUG_SYSRET_SS_ATTRS when running under Xen (bnc#1012382).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/asm: Add _ASM_ARG* constants for argument registers to <asm/asm.h> (bnc#1012382).
- x86/asm/entry/32: Simplify pushes of zeroed pt_regs->REGs (bnc#1012382).
- x86/boot: Simplify kernel load address alignment check (bnc#1012382).
- x86/bugs: Respect nospec command line option (bsc#1068032).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/AMD: Fix erratum 1076 (CPB bit) (bnc#1012382).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpufeature: Add helper macro for mask check macros (bnc#1012382).
- x86/cpufeature: Carve out X86_FEATURE_* (bnc#1012382).
- x86/cpufeature: Get rid of the non-asm goto variant (bnc#1012382).
- x86/cpufeature: Make sure DISABLED/REQUIRED macros are updated (bnc#1012382).
- x86/cpufeature: Move some of the scattered feature bits to x86_capability (bnc#1012382).
- x86/cpufeature: preserve numbers (kabi).
- x86/cpufeature: Replace the old static_cpu_has() with safe variant (bnc#1012382).
- x86/cpufeatures: Add CPUID_7_EDX CPUID leaf (bnc#1012382).
- x86/cpufeatures: Clean up Spectre v2 related CPUID flags (bnc#1012382).
- x86/cpufeature: Speed up cpu_feature_enabled() (bnc#1012382).
- x86/cpufeature: Update cpufeaure macros (bnc#1012382).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Make alternative_msr_write work for 32-bit code (bnc#1012382).
- x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6 (bnc#1012382).
- x86/cpu: Provide a config option to disable static_cpu_has (bnc#1012382).
- x86/cpu: Re-apply forced caps every time CPU caps are re-read (bnc#1012382).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface (bnc#1012382).
- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).
- x86/fpu: Add an XSTATE_OP() macro (bnc#1012382).
- x86/fpu: Get rid of xstate_fault() (bnc#1012382).
- x86/headers: Do not include asm/processor.h in asm/atomic.h (bnc#1012382).
- x86/irqflags: Provide a declaration for native_save_fl (git-fixes).
- x86/mce: Fix incorrect 'Machine check from unknown source' message (bnc#1012382).
- x86/MCE: Remove min interval polling limitation (bnc#1012382).
- x86/mm: Give each mm TLB flush generation a unique ID (bnc#1012382).
- x86/mm/pkeys: Fix mismerge of protection keys CPUID bits (bnc#1012382).
- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081).
- x86/paravirt: Make native_save_fl() extern inline (bnc#1012382).
- x86/process: Correct and optimize TIF_BLOCKSTEP switch (bnc#1012382).
- x86/process: Optimize TIF checks in __switch_to_xtra() (bnc#1012382).
- x86/process: Optimize TIF_NOTSC switch (bnc#1012382).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/spectre_v2: Do not check microcode versions when running under hypervisors (bnc#1012382).
- x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support (bnc#1012382).
- x86/speculation: Add <asm/msr-index.h> dependency (bnc#1012382).
- x86/speculation: Clean up various Spectre related details (bnc#1012382).
- x86/speculation: Correct Speculation Control microcode blacklist again (bnc#1012382).
- x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP (bnc#1012382).
- x86/speculation: Update Speculation Control microcode blacklist (bnc#1012382).
- x86/speculation: Use IBRS if available before calling into firmware (bnc#1012382).
- x86/speculation: Use Indirect Branch Prediction Barrier in context switch (bnc#1012382).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- x86/vdso: Use static_cpu_has() (bnc#1012382).
- x86/xen: Add call of speculative_store_bypass_ht_init() to PV paths (bnc#1012382).
- xen/grant-table: log the lack of grants (bnc#1085042).
- xen-netfront: Fix mismatched rtnl_unlock (bnc#1101658).
- xen-netfront: Update features after registering netdev (bnc#1101658).
- xen-netfront: wait xenbus state change when load module manually (bnc#1012382).
- xen: set cpu capabilities from xen_start_kernel() (bnc#1012382).
- xhci: Fix perceived dead host due to runtime suspend race with event handler (bnc#1012382).
- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bnc#1012382).
Patchnames
SUSE-SLE-RT-12-SP3-2018-1827
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe SUSE Linux Enterprise 12 SP3 RT kernel was updated to 4.4.147 to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent->sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 bsc#1103580).\n- CVE-2018-10876: A flaw was found in the ext4 filesystem code. A use-after-free was possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image. (bnc#1099811)\n- CVE-2018-10877: The ext4 filesystem was vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image. (bnc#1099846)\n- CVE-2018-10878: A flaw was found in the ext4 filesystem. A local user could cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image. (bnc#1099813)\n- CVE-2018-10879: A flaw was found in the ext4 filesystem. A local user could cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image. (bnc#1099844)\n- CVE-2018-10880: Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service. (bnc#1099845)\n- CVE-2018-10881: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099864)\n- CVE-2018-10882: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image. (bnc#1099849)\n- CVE-2018-10883: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099863)\n- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).\n- CVE-2018-3620: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis (bnc#1087081).\n- CVE-2018-3646: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis (bnc#1089343 bnc#1104365).\n- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).\n- CVE-2018-5391 aka 'FragmentSmack': A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).\n- CVE-2018-9363: A buffer overflow in bluetooth HID report processing could be used by malicious bluetooth devices to crash the kernel or potentially execute code (bnc#1105292).\n\nThe following non-security bugs were fixed:\n\n- acpi / pci: Bail early in acpi_pci_add_bus() if there is no ACPI handle (bnc#1012382).\n- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)\n- ahci: Disable LPM on Lenovo 50 series laptops with a too old BIOS (bnc#1012382).\n- alsa: emu10k1: add error handling for snd_ctl_add (bnc#1012382).\n- alsa: emu10k1: Rate-limit error messages about page errors (bnc#1012382).\n- alsa: fm801: add error handling for snd_ctl_add (bnc#1012382).\n- alsa: hda/ca0132: fix build failure when a local macro is defined (bnc#1012382).\n- alsa: rawmidi: Change resized buffers atomically (bnc#1012382).\n- alsa: usb-audio: Apply rate limit to warning messages in URB complete callback (bnc#1012382).\n- arc: Fix CONFIG_SWAP (bnc#1012382).\n- arc: mm: allow mprotect to make stack mappings executable (bnc#1012382).\n- arm64: do not open code page table entry creation (bsc#1102197).\n- arm64: kpti: Use early_param for kpti= command-line option (bsc#1102188).\n- arm64: Make sure permission updates happen for pmd/pud (bsc#1102197).\n- arm: dts: imx6q: Use correct SDMA script for SPI5 core (bnc#1012382).\n- arm: fix put_user() for gcc-8 (bnc#1012382).\n- asoc: dpcm: fix BE dai not hw_free and shutdown (bnc#1012382).\n- asoc: pxa: Fix module autoload for platform drivers (bnc#1012382).\n- ath10k: fix rfc1042 header retrieval in QCA4019 with eth decap mode (bnc#1012382).\n- ath: Add regulatory mapping for APL13_WORLD (bnc#1012382).\n- ath: Add regulatory mapping for APL2_FCCA (bnc#1012382).\n- ath: Add regulatory mapping for Bahamas (bnc#1012382).\n- ath: Add regulatory mapping for Bermuda (bnc#1012382).\n- ath: Add regulatory mapping for ETSI8_WORLD (bnc#1012382).\n- ath: Add regulatory mapping for FCC3_ETSIC (bnc#1012382).\n- ath: Add regulatory mapping for Serbia (bnc#1012382).\n- ath: Add regulatory mapping for Tanzania (bnc#1012382).\n- ath: Add regulatory mapping for Uganda (bnc#1012382).\n- atm: zatm: Fix potential Spectre v1 (bnc#1012382).\n- audit: allow not equal op for audit by executable (bnc#1012382).\n- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).\n- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).\n- bcache: add io_disable to struct cached_dev (bsc#1064232).\n- bcache: add journal statistic (bsc#1076110).\n- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).\n- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).\n- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).\n- bcache: Annotate switch fall-through (bsc#1064232).\n- bcache: closures: move control bits one bit right (bsc#1076110).\n- bcache: correct flash only vols (check all uuids) (bsc#1064232).\n- bcache: count backing device I/O error for writeback I/O (bsc#1064232).\n- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).\n- bcache: fix cached_dev->count usage for bch_cache_set_error() (bsc#1064232).\n- bcache: fix crashes in duplicate cache device register (bsc#1076110).\n- bcache: fix error return value in memory shrink (bsc#1064232).\n- bcache: fix high CPU occupancy during journal (bsc#1076110).\n- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).\n- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).\n- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).\n- bcache: Fix indentation (bsc#1064232).\n- bcache: Fix kernel-doc warnings (bsc#1064232).\n- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).\n- bcache: fix using of loop variable in memory shrink (bsc#1064232).\n- bcache: fix writeback target calc on large devices (bsc#1076110).\n- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).\n- bcache: mark closure_sync() __sched (bsc#1076110).\n- bcache: move closure debug file into debug directory (bsc#1064232).\n- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).\n- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).\n- bcache: Remove an unused variable (bsc#1064232).\n- bcache: ret IOERR when read meets metadata error (bsc#1076110).\n- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).\n- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).\n- bcache: set dc->io_disable to true in conditional_stop_bcache_device() (bsc#1064232).\n- bcache: set error_limit correctly (bsc#1064232).\n- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).\n- bcache: stop bcache device when backing device is offline (bsc#1064232).\n- bcache: stop dc->writeback_rate_update properly (bsc#1064232).\n- bcache: stop writeback thread after detaching (bsc#1076110).\n- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).\n- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).\n- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).\n- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).\n- bcm63xx_enet: correct clock usage (bnc#1012382).\n- bcm63xx_enet: do not write to random DMA channel on BCM6345 (bnc#1012382).\n- blkcg: simplify statistic accumulation code (bsc#1082979).\n- block: copy ioprio in __bio_clone_fast() (bsc#1082653).\n- block: do not use interruptible wait anywhere (bnc#1012382).\n- block/swim: Fix array bounds check (bsc#1082979).\n- bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bnc#1012382).\n- bluetooth: hci_qca: Fix 'Sleep inside atomic section' warning (bnc#1012382).\n- bpf: fix loading of BPF_MAXINSNS sized programs (bsc#1012382).\n- bpf: fix references to free_bpf_prog_info() in comments (bnc#1012382).\n- bpf, x64: fix memleak when not converging after image (bsc#1012382).\n- brcmfmac: Add support for bcm43364 wireless chipset (bnc#1012382).\n- btrfs: add barriers to btrfs_sync_log before log_commit_wait wakeups (bnc#1012382).\n- btrfs: Do not remove block group still has pinned down bytes (bsc#1086457).\n- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bnc#1012382).\n- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (git-fixes).\n- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).\n- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).\n- cachefiles: Wait rather than BUG'ing on 'Unexpected object collision' (bsc#1099858).\n- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bnc#1012382).\n- can: xilinx_can: fix device dropping off bus on RX overrun (bnc#1012382).\n- can: xilinx_can: fix incorrect clear of non-processed interrupts (bnc#1012382).\n- can: xilinx_can: fix recovery from error states not being propagated (bnc#1012382).\n- can: xilinx_can: fix RX loop if RXNEMP is asserted without RXOK (bnc#1012382).\n- can: xilinx_can: fix RX overflow interrupt not being enabled (bnc#1012382).\n- can: xilinx_can: keep only 1-2 frames in TX FIFO to fix TX accounting (bnc#1012382).\n- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).\n- cifs: Fix infinite loop when using hard mount option (bnc#1012382).\n- clk: tegra: Fix PLL_U post divider and initial rate on Tegra30 (bnc#1012382).\n- compiler, clang: always inline when CONFIG_OPTIMIZE_INLINING is disabled (bnc#1012382).\n- compiler, clang: properly override 'inline' for clang (bnc#1012382).\n- compiler, clang: suppress warning for unused static inline functions (bnc#1012382).\n- compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations (bnc#1012382).\n- cpu/hotplug: Add sysfs state interface (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- crypto: authenc - do not leak pointers to authenc keys (bnc#1012382).\n- crypto: authencesn - do not leak pointers to authenc keys (bnc#1012382).\n- crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak (bnc#1012382).\n- crypto: crypto4xx - remove bad list_del (bnc#1012382).\n- crypto: padlock-aes - Fix Nano workaround data corruption (bnc#1012382).\n- disable loading f2fs module on PAGE_SIZE > 4KB (bnc#1012382).\n- dmaengine: pxa_dma: remove duplicate const qualifier (bnc#1012382).\n- dma-iommu: Fix compilation when !CONFIG_IOMMU_DMA (bnc#1012382).\n- dm thin metadata: remove needless work from __commit_transaction (bsc#1082979).\n- documentation/spec_ctrl: Do some minor cleanups (bnc#1012382).\n- drbd: fix access after free (bnc#1012382).\n- driver core: Partially revert 'driver core: correct device's shutdown order' (bnc#1012382).\n- drm: Add DP PSR2 sink enable bit (bnc#1012382).\n- drm/atomic: Handling the case when setting old crtc for plane (bnc#1012382).\n- drm/cirrus: Use drm_framebuffer_put to avoid kernel oops in clean-up (bsc#1101822).\n- drm/gma500: fix psb_intel_lvds_mode_valid()'s return type (bnc#1012382).\n- drm/msm: Fix possible null dereference on failure of get_pages() (bsc#1102394).\n- drm/radeon: fix mode_valid's return type (bnc#1012382).\n- drm: re-enable error handling (bsc#1103884).\n- esp6: fix memleak on error path in esp6_input (git-fixes).\n- ext4: add more inode number paranoia checks (bnc#1012382).\n- ext4: add more mount time checks of the superblock (bnc#1012382).\n- ext4: always check block group bounds in ext4_init_block_bitmap() (bnc#1012382).\n- ext4: check for allocation block validity with block group locked (bsc#1104495).\n- ext4: check superblock mapped prior to committing (bnc#1012382).\n- ext4: clear i_data in ext4_inode_info when removing inline data (bnc#1012382).\n- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).\n- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).\n- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).\n- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).\n- ext4: fix inline data updates with checksums enabled (bsc#1104494).\n- ext4: include the illegal physical block in the bad map ext4_error msg (bnc#1012382).\n- ext4: make sure bitmaps and the inode table do not overlap with bg descriptors (bnc#1012382).\n- ext4: only look at the bg_flags field if it is valid (bnc#1012382).\n- ext4: verify the depth of extent tree in ext4_find_extent() (bnc#1012382).\n- f2fs: fix to do not trigger writeback during recovery (bnc#1012382).\n- fat: fix memory allocation failure handling of match_strdup() (bnc#1012382).\n- fscache: Allow cancelled operations to be enqueued (bsc#1099858).\n- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).\n- genirq: Make force irq threading setup more robust (bsc#1082979).\n- hid: debug: check length before copy_to_user() (bnc#1012382).\n- hid: hiddev: fix potential Spectre v1 (bnc#1012382).\n- hid: hid-plantronics: Re-resend Update to map button for PTT products (bnc#1012382).\n- hid: i2c-hid: check if device is there before really probing (bnc#1012382).\n- hid: i2c-hid: Fix 'incomplete report' noise (bnc#1012382).\n- hid: usbhid: add quirk for innomedia INNEX GENESIS/ATARI adapter (bnc#1012382).\n- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bnc#1012382).\n- i2c: imx: Fix reinit_completion() use (bnc#1012382).\n- i2c: rcar: fix resume by always initializing registers before transfer (bnc#1012382).\n- ib/isert: fix T10-pi check mask setting (bsc#1082979).\n- ibmasm: do not write out of bounds in read handler (bnc#1012382).\n- ibmvnic: Fix error recovery on login failure (bsc#1101789).\n- ibmvnic: Remove code to request error information (bsc#1104174).\n- ibmvnic: Revise RX/TX queue error messages (bsc#1101331).\n- ibmvnic: Update firmware error reporting with cause string (bsc#1104174).\n- inet: frag: enforce memory limits earlier (bnc#1012382 bsc#970506).\n- input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bnc#1012382).\n- input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bnc#1012382).\n- input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bnc#1012382).\n- ipconfig: Correctly initialise ic_nameservers (bnc#1012382).\n- ip: hash fragments consistently (bnc#1012382).\n- ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull (bnc#1012382).\n- ipv4: Fix error return value in fib_convert_metrics() (bnc#1012382).\n- ipv4: remove BUG_ON() from fib_compute_spec_dst (bnc#1012382).\n- ipv4: Return EINVAL when ping_group_range sysctl does not map to user ns (bnc#1012382).\n- ipv6: fix useless rol32 call on hash (bnc#1012382).\n- iw_cxgb4: correctly enforce the max reg_mr depth (bnc#1012382).\n- iwlwifi: pcie: fix race in Rx buffer allocator (bnc#1012382).\n- jbd2: do not mark block as modified if the handle is out of credits (bnc#1012382).\n- kabi protect includes in include/linux/inet.h (bsc#1095643).\n- KABI protect net/core/utils.c includes (bsc#1095643).\n- kABI: protect struct loop_device (kabi).\n- kABI: reexport tcp_send_ack (kabi).\n- kABI: reintroduce __static_cpu_has_safe (kabi).\n- kabi/severities: add 'drivers/md/bcache/* PASS' since no one uses symboles expoted by bcache.\n- kbuild: fix # escaping in .cmd files for future Make (bnc#1012382).\n- KEYS: DNS: fix parsing multiple options (bnc#1012382).\n- kmod: fix wait on recursive loop (bsc#1099792).\n- kmod: reduce atomic operations on kmod_concurrent and simplify (bsc#1099792).\n- kmod: throttle kmod thread limit (bsc#1099792).\n- kprobes/x86: Do not modify singlestep buffer while resuming (bnc#1012382).\n- kthread, tracing: Do not expose half-written comm when creating kthreads (bsc#1104897).\n- kvm: arm/arm64: Drop resource size check for GICV window (bsc#1102215).\n- kvm: arm/arm64: Set dist->spis to NULL after kfree (bsc#1102214).\n- kvm/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel (bnc#1012382).\n- kvm: x86: vmx: fix vpid leak (bnc#1012382).\n- libata: do not try to pass through NCQ commands to non-NCQ devices (bsc#1082979).\n- libata: Fix command retry decision (bnc#1012382).\n- lib/rhashtable: consider param->min_size when setting initial table size (bnc#1012382).\n- loop: add recursion validation to LOOP_CHANGE_FD (bnc#1012382).\n- loop: remember whether sysfs_create_group() was done (bnc#1012382).\n- md: fix NULL dereference of mddev->pers in remove_and_add_spares() (bnc#1012382).\n- media: cx25840: Use subdev host data for PLL override (bnc#1012382).\n- media: omap3isp: fix unbalanced dma_iommu_mapping (bnc#1012382).\n- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bnc#1012382).\n- media: saa7164: Fix driver name in debug output (bnc#1012382).\n- media: si470x: fix __be16 annotations (bnc#1012382).\n- media: siano: get rid of __le32/__le16 cast warnings (bnc#1012382).\n- media: videobuf2-core: do not call memop 'finish' when queueing (bnc#1012382).\n- memory: tegra: Apply interrupts mask per SoC (bnc#1012382).\n- memory: tegra: Do not handle spurious interrupts (bnc#1012382).\n- mfd: cros_ec: Fail early if we cannot identify the EC (bnc#1012382).\n- microblaze: Fix simpleImage format generation (bnc#1012382).\n- mmc: dw_mmc: fix card threshold control configuration (bsc#1102203).\n- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1097771).\n- mm: hugetlb: yield when prepping struct pages (bnc#1012382).\n- mm: memcg: fix use after free in mem_cgroup_iter() (bnc#1012382).\n- mm/slub.c: add __printf verification to slab_err() (bnc#1012382).\n- mm: vmalloc: avoid racy handling of debugobjects in vunmap (bnc#1012382).\n- mtd: cfi_cmdset_0002: Change definition naming to retry write operation (bnc#1012382).\n- mtd: cfi_cmdset_0002: Change erase functions to check chip good only (bnc#1012382).\n- mtd: cfi_cmdset_0002: Change erase functions to retry for error (bnc#1012382).\n- mtd: rawnand: fsl_ifc: fix FSL NAND driver to read all ONFI parameter pages (bnc#1012382).\n- mtd: rawnand: mxc: set spare area size register explicitly (bnc#1012382).\n- mtd: ubi: wl: Fix error return code in ubi_wl_init() (git-fixes).\n- mwifiex: correct histogram data with appropriate index (bnc#1012382).\n- mwifiex: handle race during mwifiex_usb_disconnect (bnc#1012382).\n- net: cxgb3_main: fix potential Spectre v1 (bnc#1012382).\n- net: dccp: avoid crash in ccid3_hc_rx_send_feedback() (bnc#1012382).\n- net: dccp: switch rx_tstamp_last_feedback to monotonic clock (bnc#1012382).\n- net: Do not copy pfmemalloc flag in __copy_skb_header() (bnc#1012382).\n- net: dsa: Do not suspend/resume closed slave_dev (bnc#1012382).\n- netfilter: ebtables: reject non-bridge targets (bnc#1012382).\n- netfilter: ipset: List timing out entries with 'timeout 1' instead of zero (bnc#1012382).\n- netfilter: ipvs: do not create conn for ABORT packet in sctp_conn_schedule (bsc#1102797).\n- netfilter: ipvs: fix the issue that sctp_conn_schedule drops non-INIT packet (bsc#1102797).\n- netfilter: nf_log: do not hold nf_log_mutex during user access (bnc#1012382).\n- netfilter: nf_queue: augment nfqa_cfg_policy (bnc#1012382).\n- netfilter: nf_tables: use WARN_ON_ONCE instead of BUG_ON in nft_do_chain() (bnc#1012382).\n- netfilter: x_tables: initialise match/target check parameter struct (bnc#1012382).\n- net: fix amd-xgbe flow-control issue (bnc#1012382).\n- net/ipv4: Set oif in fib_compute_spec_dst (bnc#1012382).\n- net: lan78xx: fix rx handling before first packet is send (bnc#1012382).\n- netlink: Do not shift on 64 for ngroups (bnc#1012382).\n- netlink: Do not shift with UB on nlk->ngroups (bnc#1012382).\n- netlink: Do not subscribe to non-existent groups (bnc#1012382).\n- netlink: Fix spectre v1 gadget in netlink_create() (bnc#1012382).\n- net/mlx4_core: Save the qpn from the input modifier in RST2INIT wrapper (bnc#1012382).\n- net/mlx5: Fix command interface race in polling mode (bnc#1012382).\n- net/mlx5: Fix incorrect raw command length parsing (bnc#1012382).\n- net: mvneta: fix the Rx desc DMA address in the Rx path (bsc#1102207).\n- net/nfc: Avoid stalls when nfc_alloc_send_skb() returned NULL (bnc#1012382).\n- net: off by one in inet6_pton() (bsc#1095643).\n- net: phy: fix flag masking in __set_phy_supported (bnc#1012382).\n- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1102205).\n- net_sched: blackhole: tell upper qdisc about dropped packets (bnc#1012382).\n- net: socket: fix potential spectre v1 gadget in socketcall (bnc#1012382).\n- net: stmmac: align DMA stuff to largest cache line length (bnc#1012382).\n- net: sungem: fix rx checksum support (bnc#1012382).\n- net/utils: generic inet_pton_with_scope helper (bsc#1095643).\n- net: vmxnet3: use new api ethtool_{get|set}_link_ksettings (bsc#1091860 bsc#1098253).\n- nfsd: fix potential use-after-free in nfsd4_decode_getdeviceinfo (bnc#1012382).\n- nohz: Fix local_timer_softirq_pending() (bnc#1012382).\n- n_tty: Access echo_* variables carefully (bnc#1012382).\n- n_tty: Fix stall at n_tty_receive_char_special() (bnc#1012382).\n- null_blk: use sector_div instead of do_div (bsc#1082979).\n- nvme-pci: initialize queue memory before interrupts (bnc#1012382).\n- nvme-rdma: Check remotely invalidated rkey matches our expected rkey (bsc#1092001).\n- nvme-rdma: default MR page size to 4k (bsc#1092001).\n- nvme-rdma: do not complete requests before a send work request has completed (bsc#1092001).\n- nvme-rdma: do not suppress send completions (bsc#1092001).\n- nvme-rdma: Fix command completion race at error recovery (bsc#1090435).\n- nvme-rdma: make nvme_rdma_[create|destroy]_queue_ib symmetrical (bsc#1092001).\n- nvme-rdma: use inet_pton_with_scope helper (bsc#1095643).\n- nvme-rdma: Use mr pool (bsc#1092001).\n- nvme-rdma: wait for local invalidation before completing a request (bsc#1092001).\n- ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent (bnc#1012382).\n- pci: ibmphp: Fix use-before-set in get_max_bus_speed() (bsc#1100132).\n- pci: pciehp: Request control of native hotplug only if supported (bnc#1012382).\n- pci: Prevent sysfs disable of device while driver is attached (bnc#1012382).\n- perf: fix invalid bit in diagnostic entry (bnc#1012382).\n- perf tools: Move syscall number fallbacks from perf-sys.h to tools/arch/x86/include/asm/ (bnc#1012382).\n- perf/x86/intel/uncore: Correct fixed counter index check for NHM (bnc#1012382).\n- perf/x86/intel/uncore: Correct fixed counter index check in generic code (bnc#1012382).\n- pinctrl: at91-pio4: add missing of_node_put (bnc#1012382).\n- pm / hibernate: Fix oops at snapshot_write() (bnc#1012382).\n- powerpc/32: Add a missing include header (bnc#1012382).\n- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244, bsc#1100930, bsc#1102683).\n- powerpc/64s: Fix compiler store ordering to SLB shadow area (bnc#1012382).\n- powerpc/8xx: fix invalid register expression in head_8xx.S (bnc#1012382).\n- powerpc/chrp/time: Make some functions static, add missing header include (bnc#1012382).\n- powerpc/embedded6xx/hlwd-pic: Prevent interrupts from being handled by Starlet (bnc#1012382).\n- powerpc/fadump: handle crash memory ranges array index overflow (bsc#1103269).\n- powerpc/fadump: merge adjacent memory ranges to reduce PT_LOAD segements (bsc#1103269).\n- powerpc/powermac: Add missing prototype for note_bootable_part() (bnc#1012382).\n- powerpc/powermac: Mark variable x as unused (bnc#1012382).\n- provide special timeout module parameters for EC2 (bsc#1065364).\n- ptp: fix missing break in switch (bnc#1012382).\n- qed: Limit msix vectors in kdump kernel to the minimum required count (bnc#1012382).\n- r8152: napi hangup fix after disconnect (bnc#1012382).\n- random: mix rdrand with entropy sent in from userspace (bnc#1012382).\n- rdma/mad: Convert BUG_ONs to error flows (bnc#1012382).\n- rdma/ocrdma: Fix an error code in ocrdma_alloc_pd() (bsc#1082979).\n- rdma/ocrdma: Fix error codes in ocrdma_create_srq() (bsc#1082979).\n- rdma/ucm: Mark UCM interface as BROKEN (bnc#1012382).\n- rds: avoid unenecessary cong_update in loop transport (bnc#1012382).\n- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bnc#1012382).\n- Remove broken patches for dac9063 watchdog (bsc#1100843)\n- restore cond_resched() in shrink_dcache_parent() (bsc#1098599).\n- Revert 'block-cancel-workqueue-entries-on-blk_mq_freeze_queue' (bsc#1103717)\n- Revert 'net: Do not copy pfmemalloc flag in __copy_skb_header()' (kabi).\n- Revert 'sit: reload iphdr in ipip6_rcv' (bnc#1012382).\n- Revert 'skbuff: Unconditionally copy pfmemalloc in __skb_clone()' (kabi).\n- Revert 'x86/cpufeature: Move some of the scattered feature bits to x86_capability' (kabi).\n- Revert 'x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6' (kabi).\n- Revert 'x86/mm: Give each mm TLB flush generation a unique ID' (kabi).\n- Revert 'x86/speculation: Use Indirect Branch Prediction Barrier in context switch' (kabi).\n- ring_buffer: tracing: Inherit the tracing setting to next ring buffer (bnc#1012382).\n- rsi: Fix 'invalid vdd' warning in mmc (bnc#1012382).\n- rtc: ensure rtc_set_alarm fails when alarms are not supported (bnc#1012382).\n- rtlwifi: rtl8821ae: fix firmware is not ready to run (bnc#1012382).\n- rtnetlink: add rtnl_link_state check in rtnl_configure_link (bnc#1012382).\n- s390: Correct register corruption in critical section cleanup (bnc#1012382).\n- s390/cpum_sf: Add data entry sizes to sampling trailer entry (bnc#1012382).\n- s390/qeth: fix error handling in adapter command callbacks (bnc#1103745, LTC#169699).\n- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).\n- sched/smt: Update sched_smt_present at runtime (bsc#1089343).\n- scsi: 3w-9xxx: fix a missing-check bug (bnc#1012382).\n- scsi: 3w-xxxx: fix a missing-check bug (bnc#1012382).\n- scsi: megaraid_sas: Increase timeout by 1 sec for non-RAID fastpath IOs (bnc#1012382).\n- scsi: megaraid: silence a static checker bug (bnc#1012382).\n- scsi: qla2xxx: Fix ISP recovery on unload (bnc#1012382).\n- scsi: qla2xxx: Return error when TMF returns (bnc#1012382).\n- scsi: qlogicpti: Fix an error handling path in 'qpti_sbus_probe()' (bsc#1082979).\n- scsi: scsi_dh: replace too broad 'TP9' string with the exact models (bnc#1012382).\n- scsi: sg: fix minor memory leak in error path (bsc#1082979).\n- scsi: sg: mitigate read/write abuse (bsc#1101296).\n- scsi: target: fix crash with iscsi target and dvd (bsc#1082979).\n- scsi: ufs: fix exception event handling (bnc#1012382).\n- selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC (bnc#1012382).\n- selftest/seccomp: Fix the seccomp(2) signature (bnc#1012382).\n- skbuff: Unconditionally copy pfmemalloc in __skb_clone() (bnc#1012382).\n- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).\n- smsc95xx: Configure pause time to 0xffff when tx flow control enabled (bsc#1085536).\n- squashfs: be more careful about metadata corruption (bnc#1012382).\n- squashfs: more metadata hardening (bnc#1012382).\n- squashfs: more metadata hardenings (bnc#1012382).\n- staging: android: ion: Return an ERR_PTR in ion_map_kernel (bnc#1012382).\n- staging: comedi: quatech_daqp_cs: fix no-op loop daqp_ao_insn_write() (bnc#1012382).\n- tcp: add max_quickacks param to tcp_incr_quickack and tcp_enter_quickack_mode (bnc#1012382).\n- tcp: add one more quick ack after after ECN events (bnc#1012382).\n- tcp: do not aggressively quick ack after ECN events (bnc#1012382).\n- tcp: do not cancel delay-AcK on DCTCP special ACK (bnc#1012382).\n- tcp: do not delay ACK in DCTCP upon CE status change (bnc#1012382).\n- tcp: do not force quickack when receiving out-of-order packets (bnc#1012382).\n- tcp: fix dctcp delayed ACK schedule (bnc#1012382).\n- tcp: fix Fast Open key endianness (bnc#1012382).\n- tcp: helpers to send special DCTCP ack (bnc#1012382).\n- tcp: prevent bogus FRTO undos with non-SACK flows (bnc#1012382).\n- tcp: refactor tcp_ecn_check_ce to remove sk type cast (bnc#1012382).\n- tg3: Add higher cpu clock for 5762 (bnc#1012382).\n- thermal: exynos: fix setting rising_threshold for Exynos5433 (bnc#1012382).\n- tools build: fix # escaping in .cmd files for future Make (bnc#1012382).\n- tracing: Fix double free of event_trigger_data (bnc#1012382).\n- tracing: Fix missing return symbol in function_graph output (bnc#1012382).\n- tracing: Fix possible double free in event_enable_trigger_func() (bnc#1012382).\n- tracing/kprobes: Fix trace_probe flags on enable_trace_kprobe() failure (bnc#1012382).\n- tracing: Quiet gcc warning about maybe unused link variable (bnc#1012382).\n- tty: Fix data race in tty_insert_flip_string_fixed_flag (bnc#1012382).\n- turn off -Wattribute-alias (bnc#1012382).\n- ubi: Be more paranoid while seaching for the most recent Fastmap (bnc#1012382).\n- ubi: fastmap: Correctly handle interrupted erasures in EBA (bnc#1012382).\n- ubi: fastmap: Erase outdated anchor PEBs during attach (bnc#1012382).\n- ubi: Fix Fastmap's update_vol() (bnc#1012382).\n- ubi: Fix races around ubi_refill_pools() (bnc#1012382).\n- ubi: Introduce vol_ignored() (bnc#1012382).\n- ubi: Rework Fastmap attach base code (bnc#1012382).\n- uprobes/x86: Remove incorrect WARN_ON() in uprobe_init_insn() (bnc#1012382).\n- usb: cdc_acm: Add quirk for Castles VEGA3000 (bnc#1012382).\n- usb: cdc_acm: Add quirk for Uniden UBC125 scanner (bnc#1012382).\n- usb: core: handle hub C_PORT_OVER_CURRENT condition (bsc#1100132).\n- usb: gadget: f_fs: Only return delayed status when len is 0 (bnc#1012382).\n- usb: hub: Do not wait for connect state at resume for powered-off ports (bnc#1012382).\n- usbip: usbip_detach: Fix memory, udev context and udev leak (bnc#1012382).\n- usb: quirks: add delay quirks for Corsair Strafe (bnc#1012382).\n- USB: serial: ch341: fix type promotion bug in ch341_control_in() (bnc#1012382).\n- USB: serial: cp210x: add another USB ID for Qivicon ZigBee stick (bnc#1012382).\n- USB: serial: cp210x: add CESINEL device ids (bnc#1012382).\n- USB: serial: cp210x: add Silicon Labs IDs for Windows Update (bnc#1012382).\n- USB: serial: keyspan_pda: fix modem-status error handling (bnc#1012382).\n- USB: serial: mos7840: fix status-register error handling (bnc#1012382).\n- USB: yurex: fix out-of-bounds uaccess in read handler (bnc#1012382).\n- vfio: platform: Fix reset module leak in error path (bsc#1102211).\n- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).\n- vhost_net: validate sock before trying to put its fd (bnc#1012382).\n- virtio_balloon: fix another race between migration and ballooning (bnc#1012382).\n- vmw_balloon: fix inflation with batching (bnc#1012382).\n- vmxnet3: add receive data ring support (bsc#1091860 bsc#1098253).\n- vmxnet3: add support for get_coalesce, set_coalesce ethtool operations (bsc#1091860 bsc#1098253).\n- vmxnet3: allow variable length transmit data ring buffer (bsc#1091860 bsc#1098253).\n- vmxnet3: avoid assumption about invalid dma_pa in vmxnet3_set_mc() (bsc#1091860 bsc#1098253).\n- vmxnet3: avoid format strint overflow warning (bsc#1091860 bsc#1098253).\n- vmxnet3: avoid xmit reset due to a race in vmxnet3 (bsc#1091860 bsc#1098253).\n- vmxnet3: fix incorrect dereference when rxvlan is disabled (bsc#1091860 bsc#1098253).\n- vmxnet3: fix non static symbol warning (bsc#1091860 bsc#1098253).\n- vmxnet3: fix tx data ring copy for variable size (bsc#1091860 bsc#1098253).\n- vmxnet3: increase default rx ring sizes (bsc#1091860 bsc#1098253).\n- vmxnet3: introduce command to register memory region (bsc#1091860 bsc#1098253).\n- vmxnet3: introduce generalized command interface to configure the device (bsc#1091860 bsc#1098253).\n- vmxnet3: prepare for version 3 changes (bsc#1091860 bsc#1098253).\n- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1091860 bsc#1098253).\n- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1091860 bsc#1098253).\n- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1091860 bsc#1098253).\n- vmxnet3: set the DMA mask before the first DMA map operation (bsc#1091860 bsc#1098253).\n- vmxnet3: update to version 3 (bsc#1091860 bsc#1098253).\n- vmxnet3: use correct flag to indicate LRO feature (bsc#1091860 bsc#1098253).\n- vmxnet3: use DMA memory barriers where required (bsc#1091860 bsc#1098253).\n- wait: add wait_event_killable_timeout() (bsc#1099792).\n- watchdog: da9063: Fix setting/changing timeout (bsc#1100843).\n- watchdog: da9063: Fix timeout handling during probe (bsc#1100843).\n- watchdog: da9063: Fix updating timeout value (bsc#1100843).\n- wlcore: sdio: check for valid platform device data before suspend (bnc#1012382).\n- x86/alternatives: Add an auxilary section (bnc#1012382).\n- x86/alternatives: Discard dynamic check after init (bnc#1012382).\n- x86/amd: do not set X86_BUG_SYSRET_SS_ATTRS when running under Xen (bnc#1012382).\n- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).\n- x86/asm: Add _ASM_ARG* constants for argument registers to <asm/asm.h> (bnc#1012382).\n- x86/asm/entry/32: Simplify pushes of zeroed pt_regs->REGs (bnc#1012382).\n- x86/boot: Simplify kernel load address alignment check (bnc#1012382).\n- x86/bugs: Respect nospec command line option (bsc#1068032).\n- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu/AMD: Fix erratum 1076 (CPB bit) (bnc#1012382).\n- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpufeature: Add helper macro for mask check macros (bnc#1012382).\n- x86/cpufeature: Carve out X86_FEATURE_* (bnc#1012382).\n- x86/cpufeature: Get rid of the non-asm goto variant (bnc#1012382).\n- x86/cpufeature: Make sure DISABLED/REQUIRED macros are updated (bnc#1012382).\n- x86/cpufeature: Move some of the scattered feature bits to x86_capability (bnc#1012382).\n- x86/cpufeature: preserve numbers (kabi).\n- x86/cpufeature: Replace the old static_cpu_has() with safe variant (bnc#1012382).\n- x86/cpufeatures: Add CPUID_7_EDX CPUID leaf (bnc#1012382).\n- x86/cpufeatures: Clean up Spectre v2 related CPUID flags (bnc#1012382).\n- x86/cpufeature: Speed up cpu_feature_enabled() (bnc#1012382).\n- x86/cpufeature: Update cpufeaure macros (bnc#1012382).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu: Make alternative_msr_write work for 32-bit code (bnc#1012382).\n- x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6 (bnc#1012382).\n- x86/cpu: Provide a config option to disable static_cpu_has (bnc#1012382).\n- x86/cpu: Re-apply forced caps every time CPU caps are re-read (bnc#1012382).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface (bnc#1012382).\n- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).\n- x86/fpu: Add an XSTATE_OP() macro (bnc#1012382).\n- x86/fpu: Get rid of xstate_fault() (bnc#1012382).\n- x86/headers: Do not include asm/processor.h in asm/atomic.h (bnc#1012382).\n- x86/irqflags: Provide a declaration for native_save_fl (git-fixes).\n- x86/mce: Fix incorrect 'Machine check from unknown source' message (bnc#1012382).\n- x86/MCE: Remove min interval polling limitation (bnc#1012382).\n- x86/mm: Give each mm TLB flush generation a unique ID (bnc#1012382).\n- x86/mm/pkeys: Fix mismerge of protection keys CPUID bits (bnc#1012382).\n- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081).\n- x86/paravirt: Make native_save_fl() extern inline (bnc#1012382).\n- x86/process: Correct and optimize TIF_BLOCKSTEP switch (bnc#1012382).\n- x86/process: Optimize TIF checks in __switch_to_xtra() (bnc#1012382).\n- x86/process: Optimize TIF_NOTSC switch (bnc#1012382).\n- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/spectre_v2: Do not check microcode versions when running under hypervisors (bnc#1012382).\n- x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support (bnc#1012382).\n- x86/speculation: Add <asm/msr-index.h> dependency (bnc#1012382).\n- x86/speculation: Clean up various Spectre related details (bnc#1012382).\n- x86/speculation: Correct Speculation Control microcode blacklist again (bnc#1012382).\n- x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP (bnc#1012382).\n- x86/speculation: Update Speculation Control microcode blacklist (bnc#1012382).\n- x86/speculation: Use IBRS if available before calling into firmware (bnc#1012382).\n- x86/speculation: Use Indirect Branch Prediction Barrier in context switch (bnc#1012382).\n- x86/topology: Add topology_max_smt_threads() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- x86/vdso: Use static_cpu_has() (bnc#1012382).\n- x86/xen: Add call of speculative_store_bypass_ht_init() to PV paths (bnc#1012382).\n- xen/grant-table: log the lack of grants (bnc#1085042).\n- xen-netfront: Fix mismatched rtnl_unlock (bnc#1101658).\n- xen-netfront: Update features after registering netdev (bnc#1101658).\n- xen-netfront: wait xenbus state change when load module manually (bnc#1012382).\n- xen: set cpu capabilities from xen_start_kernel() (bnc#1012382).\n- xhci: Fix perceived dead host due to runtime suspend race with event handler (bnc#1012382).\n- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bnc#1012382).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-RT-12-SP3-2018-1827", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2596-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:2596-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20182596-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:2596-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html", }, { category: "self", summary: "SUSE Bug 1012382", url: "https://bugzilla.suse.com/1012382", }, { category: "self", summary: "SUSE Bug 1064232", url: "https://bugzilla.suse.com/1064232", }, { category: "self", summary: "SUSE Bug 1065364", url: "https://bugzilla.suse.com/1065364", }, { category: "self", summary: "SUSE Bug 1068032", url: "https://bugzilla.suse.com/1068032", }, { category: "self", summary: "SUSE Bug 1076110", url: "https://bugzilla.suse.com/1076110", }, { category: "self", summary: "SUSE Bug 1082653", url: "https://bugzilla.suse.com/1082653", }, { category: "self", summary: "SUSE Bug 1082979", url: "https://bugzilla.suse.com/1082979", }, { category: "self", summary: "SUSE Bug 1085042", url: "https://bugzilla.suse.com/1085042", }, { category: "self", summary: "SUSE Bug 1085536", url: "https://bugzilla.suse.com/1085536", }, { category: "self", summary: "SUSE Bug 1086457", url: "https://bugzilla.suse.com/1086457", }, { category: "self", summary: "SUSE Bug 1087081", url: "https://bugzilla.suse.com/1087081", }, { category: "self", summary: "SUSE Bug 1089343", url: "https://bugzilla.suse.com/1089343", }, { category: "self", summary: "SUSE Bug 1090123", url: "https://bugzilla.suse.com/1090123", }, { category: "self", summary: "SUSE Bug 1090435", url: "https://bugzilla.suse.com/1090435", }, { category: "self", summary: "SUSE Bug 1091171", url: "https://bugzilla.suse.com/1091171", }, { category: "self", summary: "SUSE Bug 1091860", url: "https://bugzilla.suse.com/1091860", }, { category: "self", summary: "SUSE Bug 1092001", url: "https://bugzilla.suse.com/1092001", }, { category: "self", summary: "SUSE Bug 1094244", url: "https://bugzilla.suse.com/1094244", }, { category: "self", summary: "SUSE Bug 1095643", url: "https://bugzilla.suse.com/1095643", }, { category: "self", summary: "SUSE Bug 1096254", url: "https://bugzilla.suse.com/1096254", }, { category: "self", summary: "SUSE Bug 1096978", url: "https://bugzilla.suse.com/1096978", }, { category: "self", summary: "SUSE Bug 1097771", url: "https://bugzilla.suse.com/1097771", }, { category: "self", summary: "SUSE Bug 1098253", url: "https://bugzilla.suse.com/1098253", }, { category: "self", summary: "SUSE Bug 1098599", url: "https://bugzilla.suse.com/1098599", }, { category: "self", summary: "SUSE Bug 1099792", url: "https://bugzilla.suse.com/1099792", }, { category: "self", summary: "SUSE Bug 1099811", url: "https://bugzilla.suse.com/1099811", }, { category: "self", summary: "SUSE Bug 1099813", url: "https://bugzilla.suse.com/1099813", }, { category: "self", summary: "SUSE Bug 1099844", url: "https://bugzilla.suse.com/1099844", }, { category: "self", summary: "SUSE Bug 1099845", url: "https://bugzilla.suse.com/1099845", }, { category: "self", summary: "SUSE Bug 1099846", url: "https://bugzilla.suse.com/1099846", }, { category: "self", summary: "SUSE Bug 1099849", url: "https://bugzilla.suse.com/1099849", }, { category: "self", summary: "SUSE Bug 1099858", url: "https://bugzilla.suse.com/1099858", }, { category: "self", summary: "SUSE Bug 1099863", url: "https://bugzilla.suse.com/1099863", }, { category: "self", summary: "SUSE Bug 1099864", url: "https://bugzilla.suse.com/1099864", }, { category: "self", summary: "SUSE Bug 1100132", url: "https://bugzilla.suse.com/1100132", }, { category: "self", summary: "SUSE Bug 1100843", url: "https://bugzilla.suse.com/1100843", }, { category: "self", summary: "SUSE Bug 1100930", url: "https://bugzilla.suse.com/1100930", }, { category: "self", summary: "SUSE Bug 1101296", url: "https://bugzilla.suse.com/1101296", }, { category: "self", summary: "SUSE Bug 1101331", url: "https://bugzilla.suse.com/1101331", }, { category: "self", summary: "SUSE Bug 1101658", url: "https://bugzilla.suse.com/1101658", }, { category: "self", summary: "SUSE Bug 1101789", url: "https://bugzilla.suse.com/1101789", }, { category: "self", summary: "SUSE Bug 1101822", url: "https://bugzilla.suse.com/1101822", }, { category: "self", summary: "SUSE Bug 1101841", url: "https://bugzilla.suse.com/1101841", }, { category: "self", summary: "SUSE Bug 1102188", url: "https://bugzilla.suse.com/1102188", }, { category: "self", summary: "SUSE Bug 1102197", url: "https://bugzilla.suse.com/1102197", }, { category: "self", summary: "SUSE Bug 1102203", url: "https://bugzilla.suse.com/1102203", }, { category: "self", summary: "SUSE Bug 1102205", url: "https://bugzilla.suse.com/1102205", }, { category: "self", summary: "SUSE Bug 1102207", url: "https://bugzilla.suse.com/1102207", }, { category: "self", summary: "SUSE Bug 1102211", url: "https://bugzilla.suse.com/1102211", }, { category: "self", summary: "SUSE Bug 1102214", url: "https://bugzilla.suse.com/1102214", }, { category: "self", summary: "SUSE Bug 1102215", url: "https://bugzilla.suse.com/1102215", }, { category: "self", summary: "SUSE Bug 1102340", url: "https://bugzilla.suse.com/1102340", }, { category: "self", summary: "SUSE Bug 1102394", url: "https://bugzilla.suse.com/1102394", }, { category: "self", summary: "SUSE Bug 1102683", url: "https://bugzilla.suse.com/1102683", }, { category: "self", summary: "SUSE Bug 1102715", url: "https://bugzilla.suse.com/1102715", }, { category: "self", summary: "SUSE Bug 1102797", url: "https://bugzilla.suse.com/1102797", }, { category: "self", summary: "SUSE Bug 1102851", url: "https://bugzilla.suse.com/1102851", }, { category: "self", summary: "SUSE Bug 1103097", url: "https://bugzilla.suse.com/1103097", }, { category: "self", summary: "SUSE Bug 1103119", url: "https://bugzilla.suse.com/1103119", }, { category: "self", summary: "SUSE Bug 1103269", url: "https://bugzilla.suse.com/1103269", }, { category: "self", summary: "SUSE Bug 1103445", url: "https://bugzilla.suse.com/1103445", }, { category: "self", summary: "SUSE Bug 1103580", url: "https://bugzilla.suse.com/1103580", }, { category: "self", summary: "SUSE Bug 1103717", url: "https://bugzilla.suse.com/1103717", }, { category: "self", summary: "SUSE Bug 1103745", url: "https://bugzilla.suse.com/1103745", }, { category: "self", summary: "SUSE Bug 1103884", url: "https://bugzilla.suse.com/1103884", }, { category: "self", summary: "SUSE Bug 1104174", url: "https://bugzilla.suse.com/1104174", }, { category: "self", summary: "SUSE Bug 1104319", url: "https://bugzilla.suse.com/1104319", }, { category: "self", summary: "SUSE Bug 1104365", url: "https://bugzilla.suse.com/1104365", }, { category: "self", summary: "SUSE Bug 1104494", url: "https://bugzilla.suse.com/1104494", }, { category: "self", summary: "SUSE Bug 1104495", url: "https://bugzilla.suse.com/1104495", }, { category: "self", summary: "SUSE Bug 1104897", url: "https://bugzilla.suse.com/1104897", }, { category: "self", summary: "SUSE Bug 1105292", url: "https://bugzilla.suse.com/1105292", }, { category: "self", summary: "SUSE Bug 970506", url: "https://bugzilla.suse.com/970506", }, { category: "self", summary: "SUSE CVE CVE-2017-18344 page", url: "https://www.suse.com/security/cve/CVE-2017-18344/", }, { category: "self", summary: "SUSE CVE CVE-2018-10876 page", url: "https://www.suse.com/security/cve/CVE-2018-10876/", }, { category: "self", summary: "SUSE CVE CVE-2018-10877 page", url: "https://www.suse.com/security/cve/CVE-2018-10877/", }, { category: "self", summary: "SUSE CVE CVE-2018-10878 page", url: "https://www.suse.com/security/cve/CVE-2018-10878/", }, { category: "self", summary: "SUSE CVE CVE-2018-10879 page", url: "https://www.suse.com/security/cve/CVE-2018-10879/", }, { category: "self", summary: "SUSE CVE CVE-2018-10880 page", url: "https://www.suse.com/security/cve/CVE-2018-10880/", }, { category: "self", summary: "SUSE CVE CVE-2018-10881 page", url: "https://www.suse.com/security/cve/CVE-2018-10881/", }, { category: "self", summary: "SUSE CVE CVE-2018-10882 page", url: "https://www.suse.com/security/cve/CVE-2018-10882/", }, { category: "self", summary: "SUSE CVE CVE-2018-10883 page", url: "https://www.suse.com/security/cve/CVE-2018-10883/", }, { category: "self", summary: "SUSE CVE CVE-2018-14734 page", url: "https://www.suse.com/security/cve/CVE-2018-14734/", }, { category: "self", summary: "SUSE CVE CVE-2018-3620 page", url: "https://www.suse.com/security/cve/CVE-2018-3620/", }, { category: "self", summary: "SUSE CVE CVE-2018-3646 page", url: "https://www.suse.com/security/cve/CVE-2018-3646/", }, { category: "self", summary: "SUSE CVE CVE-2018-5390 page", url: "https://www.suse.com/security/cve/CVE-2018-5390/", }, { category: "self", summary: "SUSE CVE CVE-2018-5391 page", url: "https://www.suse.com/security/cve/CVE-2018-5391/", }, { category: "self", summary: "SUSE CVE CVE-2018-9363 page", url: "https://www.suse.com/security/cve/CVE-2018-9363/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2018-09-03T15:29:13Z", generator: { date: "2018-09-03T15:29:13Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:2596-1", initial_release_date: "2018-09-03T15:29:13Z", revision_history: [ { date: "2018-09-03T15:29:13Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-4.4.147-3.20.1.noarch", product: { name: "kernel-devel-rt-4.4.147-3.20.1.noarch", product_id: "kernel-devel-rt-4.4.147-3.20.1.noarch", }, }, { category: "product_version", name: "kernel-source-rt-4.4.147-3.20.1.noarch", product: { name: "kernel-source-rt-4.4.147-3.20.1.noarch", product_id: "kernel-source-rt-4.4.147-3.20.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", product: { name: "cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", product_id: "cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-4.4.147-3.20.1.x86_64", product: { name: "dlm-kmp-rt-4.4.147-3.20.1.x86_64", product_id: "dlm-kmp-rt-4.4.147-3.20.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-4.4.147-3.20.1.x86_64", product: { name: "gfs2-kmp-rt-4.4.147-3.20.1.x86_64", product_id: "gfs2-kmp-rt-4.4.147-3.20.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-4.4.147-3.20.1.x86_64", product: { name: "kernel-rt-4.4.147-3.20.1.x86_64", product_id: "kernel-rt-4.4.147-3.20.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-base-4.4.147-3.20.1.x86_64", product: { name: "kernel-rt-base-4.4.147-3.20.1.x86_64", product_id: "kernel-rt-base-4.4.147-3.20.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-4.4.147-3.20.1.x86_64", product: { name: "kernel-rt-devel-4.4.147-3.20.1.x86_64", product_id: "kernel-rt-devel-4.4.147-3.20.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", product: { name: "kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", product_id: "kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-4.4.147-3.20.1.x86_64", product: { name: "kernel-syms-rt-4.4.147-3.20.1.x86_64", product_id: "kernel-syms-rt-4.4.147-3.20.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", product: { name: "ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", product_id: "ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Real Time 12 SP3", product: { name: "SUSE Linux Enterprise Real Time 12 SP3", product_id: "SUSE Linux Enterprise Real Time 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:suse-linux-enterprise-rt:12:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", product_id: "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", }, product_reference: "cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", product_id: "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", }, product_reference: "dlm-kmp-rt-4.4.147-3.20.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", product_id: "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", }, product_reference: "gfs2-kmp-rt-4.4.147-3.20.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-4.4.147-3.20.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP3", product_id: "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", }, product_reference: "kernel-devel-rt-4.4.147-3.20.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", product_id: "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", }, product_reference: "kernel-rt-4.4.147-3.20.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-base-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", product_id: "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", }, product_reference: "kernel-rt-base-4.4.147-3.20.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", product_id: "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", }, product_reference: "kernel-rt-devel-4.4.147-3.20.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", product_id: "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", }, product_reference: "kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-4.4.147-3.20.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP3", product_id: "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", }, product_reference: "kernel-source-rt-4.4.147-3.20.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", product_id: "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", }, product_reference: "kernel-syms-rt-4.4.147-3.20.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", product_id: "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", }, product_reference: "ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP3", }, ], }, vulnerabilities: [ { cve: "CVE-2017-18344", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-18344", }, ], notes: [ { category: "general", text: "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn't properly validate the sigevent->sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-18344", url: "https://www.suse.com/security/cve/CVE-2017-18344", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-18344", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1102851 for CVE-2017-18344", url: "https://bugzilla.suse.com/1102851", }, { category: "external", summary: "SUSE Bug 1103203 for CVE-2017-18344", url: "https://bugzilla.suse.com/1103203", }, { category: "external", summary: "SUSE Bug 1103580 for CVE-2017-18344", url: "https://bugzilla.suse.com/1103580", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2017-18344", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-03T15:29:13Z", details: "important", }, ], title: "CVE-2017-18344", }, { cve: "CVE-2018-10876", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10876", }, ], notes: [ { category: "general", text: "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10876", url: "https://www.suse.com/security/cve/CVE-2018-10876", }, { category: "external", summary: "SUSE Bug 1099811 for CVE-2018-10876", url: "https://bugzilla.suse.com/1099811", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-03T15:29:13Z", details: "low", }, ], title: "CVE-2018-10876", }, { cve: "CVE-2018-10877", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10877", }, ], notes: [ { category: "general", text: "Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10877", url: "https://www.suse.com/security/cve/CVE-2018-10877", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10877", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099846 for CVE-2018-10877", url: "https://bugzilla.suse.com/1099846", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-03T15:29:13Z", details: "low", }, ], title: "CVE-2018-10877", }, { cve: "CVE-2018-10878", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10878", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10878", url: "https://www.suse.com/security/cve/CVE-2018-10878", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10878", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099813 for CVE-2018-10878", url: "https://bugzilla.suse.com/1099813", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-03T15:29:13Z", details: "moderate", }, ], title: "CVE-2018-10878", }, { cve: "CVE-2018-10879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10879", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10879", url: "https://www.suse.com/security/cve/CVE-2018-10879", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10879", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099844 for CVE-2018-10879", url: "https://bugzilla.suse.com/1099844", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-03T15:29:13Z", details: "moderate", }, ], title: "CVE-2018-10879", }, { cve: "CVE-2018-10880", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10880", }, ], notes: [ { category: "general", text: "Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10880", url: "https://www.suse.com/security/cve/CVE-2018-10880", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10880", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099845 for CVE-2018-10880", url: "https://bugzilla.suse.com/1099845", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-03T15:29:13Z", details: "moderate", }, ], title: "CVE-2018-10880", }, { cve: "CVE-2018-10881", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10881", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10881", url: "https://www.suse.com/security/cve/CVE-2018-10881", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10881", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099864 for CVE-2018-10881", url: "https://bugzilla.suse.com/1099864", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-03T15:29:13Z", details: "moderate", }, ], title: "CVE-2018-10881", }, { cve: "CVE-2018-10882", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10882", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10882", url: "https://www.suse.com/security/cve/CVE-2018-10882", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10882", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099849 for CVE-2018-10882", url: "https://bugzilla.suse.com/1099849", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-03T15:29:13Z", details: "moderate", }, ], title: "CVE-2018-10882", }, { cve: "CVE-2018-10883", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10883", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10883", url: "https://www.suse.com/security/cve/CVE-2018-10883", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10883", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1099863 for CVE-2018-10883", url: "https://bugzilla.suse.com/1099863", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-03T15:29:13Z", details: "moderate", }, ], title: "CVE-2018-10883", }, { cve: "CVE-2018-14734", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14734", }, ], notes: [ { category: "general", text: "drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14734", url: "https://www.suse.com/security/cve/CVE-2018-14734", }, { category: "external", summary: "SUSE Bug 1103119 for CVE-2018-14734", url: "https://bugzilla.suse.com/1103119", }, { category: "external", summary: "SUSE Bug 1131390 for CVE-2018-14734", url: "https://bugzilla.suse.com/1131390", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-03T15:29:13Z", details: "moderate", }, ], title: "CVE-2018-14734", }, { cve: "CVE-2018-3620", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3620", }, ], notes: [ { category: "general", text: "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3620", url: "https://www.suse.com/security/cve/CVE-2018-3620", }, { category: "external", summary: "SUSE Bug 1087078 for CVE-2018-3620", url: "https://bugzilla.suse.com/1087078", }, { category: "external", summary: "SUSE Bug 1087081 for CVE-2018-3620", url: "https://bugzilla.suse.com/1087081", }, { category: "external", summary: "SUSE Bug 1089343 for CVE-2018-3620", url: "https://bugzilla.suse.com/1089343", }, { category: "external", summary: "SUSE Bug 1090340 for CVE-2018-3620", url: "https://bugzilla.suse.com/1090340", }, { category: "external", summary: "SUSE Bug 1091107 for CVE-2018-3620", url: "https://bugzilla.suse.com/1091107", }, { category: "external", summary: "SUSE Bug 1099306 for CVE-2018-3620", url: "https://bugzilla.suse.com/1099306", }, { category: "external", summary: "SUSE Bug 1104894 for CVE-2018-3620", url: "https://bugzilla.suse.com/1104894", }, { category: "external", summary: "SUSE Bug 1136865 for CVE-2018-3620", url: "https://bugzilla.suse.com/1136865", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2018-3620", url: "https://bugzilla.suse.com/1201877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-03T15:29:13Z", details: "moderate", }, ], title: "CVE-2018-3620", }, { cve: "CVE-2018-3646", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-3646", }, ], notes: [ { category: "general", text: "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-3646", url: "https://www.suse.com/security/cve/CVE-2018-3646", }, { category: "external", summary: "SUSE Bug 1087078 for CVE-2018-3646", url: "https://bugzilla.suse.com/1087078", }, { category: "external", summary: "SUSE Bug 1087081 for CVE-2018-3646", url: "https://bugzilla.suse.com/1087081", }, { category: "external", summary: "SUSE Bug 1089343 for CVE-2018-3646", url: "https://bugzilla.suse.com/1089343", }, { category: "external", summary: "SUSE Bug 1091107 for CVE-2018-3646", url: "https://bugzilla.suse.com/1091107", }, { category: "external", summary: "SUSE Bug 1099306 for CVE-2018-3646", url: "https://bugzilla.suse.com/1099306", }, { category: "external", summary: "SUSE Bug 1104365 for CVE-2018-3646", url: "https://bugzilla.suse.com/1104365", }, { category: "external", summary: "SUSE Bug 1104894 for CVE-2018-3646", url: "https://bugzilla.suse.com/1104894", }, { category: "external", summary: "SUSE Bug 1106548 for CVE-2018-3646", url: "https://bugzilla.suse.com/1106548", }, { category: "external", summary: "SUSE Bug 1113534 for CVE-2018-3646", url: "https://bugzilla.suse.com/1113534", }, { category: "external", summary: "SUSE Bug 1136865 for CVE-2018-3646", url: "https://bugzilla.suse.com/1136865", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2018-3646", url: "https://bugzilla.suse.com/1178658", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2018-3646", url: "https://bugzilla.suse.com/1201877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-03T15:29:13Z", details: "important", }, ], title: "CVE-2018-3646", }, { cve: "CVE-2018-5390", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-5390", }, ], notes: [ { category: "general", text: "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-5390", url: "https://www.suse.com/security/cve/CVE-2018-5390", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-5390", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1102340 for CVE-2018-5390", url: "https://bugzilla.suse.com/1102340", }, { category: "external", summary: "SUSE Bug 1102682 for CVE-2018-5390", url: "https://bugzilla.suse.com/1102682", }, { category: "external", summary: "SUSE Bug 1103097 for CVE-2018-5390", url: "https://bugzilla.suse.com/1103097", }, { category: "external", summary: "SUSE Bug 1103098 for CVE-2018-5390", url: "https://bugzilla.suse.com/1103098", }, { category: "external", summary: "SUSE Bug 1156434 for CVE-2018-5390", url: "https://bugzilla.suse.com/1156434", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-03T15:29:13Z", details: "important", }, ], title: "CVE-2018-5390", }, { cve: "CVE-2018-5391", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-5391", }, ], notes: [ { category: "general", text: "The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-5391", url: "https://www.suse.com/security/cve/CVE-2018-5391", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-5391", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1102340 for CVE-2018-5391", url: "https://bugzilla.suse.com/1102340", }, { category: "external", summary: "SUSE Bug 1103097 for CVE-2018-5391", url: "https://bugzilla.suse.com/1103097", }, { category: "external", summary: "SUSE Bug 1103098 for CVE-2018-5391", url: "https://bugzilla.suse.com/1103098", }, { category: "external", summary: "SUSE Bug 1108654 for CVE-2018-5391", url: "https://bugzilla.suse.com/1108654", }, { category: "external", summary: "SUSE Bug 1114071 for CVE-2018-5391", url: "https://bugzilla.suse.com/1114071", }, { category: "external", summary: "SUSE Bug 1121102 for CVE-2018-5391", url: "https://bugzilla.suse.com/1121102", }, { category: "external", summary: "SUSE Bug 1134140 for CVE-2018-5391", url: "https://bugzilla.suse.com/1134140", }, { category: "external", summary: "SUSE Bug 1181460 for CVE-2018-5391", url: "https://bugzilla.suse.com/1181460", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-03T15:29:13Z", details: "important", }, ], title: "CVE-2018-5391", }, { cve: "CVE-2018-9363", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-9363", }, ], notes: [ { category: "general", text: "In the hidp_process_report in bluetooth, there is an integer overflow. This could lead to an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-65853588 References: Upstream kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-9363", url: "https://www.suse.com/security/cve/CVE-2018-9363", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-9363", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1105292 for CVE-2018-9363", url: "https://bugzilla.suse.com/1105292", }, { category: "external", summary: "SUSE Bug 1105293 for CVE-2018-9363", url: "https://bugzilla.suse.com/1105293", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-09-03T15:29:13Z", details: "important", }, ], title: "CVE-2018-9363", }, ], }
ghsa-jw6w-m4jf-m6xp
Vulnerability from github
Published
2022-05-14 01:14
Modified
2022-05-14 01:14
Severity ?
Details
A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.
{ affected: [], aliases: [ "CVE-2018-10876", ], database_specific: { cwe_ids: [ "CWE-416", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2018-07-26T18:29:00Z", severity: "MODERATE", }, details: "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", id: "GHSA-jw6w-m4jf-m6xp", modified: "2022-05-14T01:14:26Z", published: "2022-05-14T01:14:26Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-10876", }, { type: "WEB", url: "https://access.redhat.com/errata/RHSA-2019:0525", }, { type: "WEB", url: "https://access.redhat.com/security/cve/CVE-2018-10876", }, { type: "WEB", url: "https://bugzilla.kernel.org/show_bug.cgi?id=199403", }, { type: "WEB", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1596773", }, { type: "WEB", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10876", }, { type: "WEB", url: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8844618d8aa7a9973e7b527d038a2a589665002c", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html", }, { type: "WEB", url: "https://usn.ubuntu.com/3753-1", }, { type: "WEB", url: "https://usn.ubuntu.com/3753-2", }, { type: "WEB", url: "https://usn.ubuntu.com/3871-1", }, { type: "WEB", url: "https://usn.ubuntu.com/3871-3", }, { type: "WEB", url: "https://usn.ubuntu.com/3871-4", }, { type: "WEB", url: "https://usn.ubuntu.com/3871-5", }, { type: "WEB", url: "http://patchwork.ozlabs.org/patch/929239", }, { type: "WEB", url: "http://www.securityfocus.com/bid/104904", }, { type: "WEB", url: "http://www.securityfocus.com/bid/106503", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", type: "CVSS_V3", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.