SUSE-SU-2018:0482-1

Vulnerability from csaf_suse - Published: 2018-02-19 19:17 - Updated: 2018-02-19 19:17
Summary
Security update for the Linux Kernel
Severity
Important
Notes
Title of the patch: Security update for the Linux Kernel
Description of the patch: The SUSE Linux Enterprise 12 SP2 Realtime kernel was updated to 4.4.114 to receive various security and bugfixes. The following security bugs were fixed: - CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032). The previous fix using CPU Microcode has been complemented by building the Linux Kernel with return trampolines aka 'retpolines'. - CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in net/rds/rdma.c mishandled cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference (bnc#1075617). - CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function did not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c) (bnc#1075621). - CVE-2017-17862: kernel/bpf/verifier.c in the Linux kernel ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service (bnc#1073928). - CVE-2017-17864: kernel/bpf/verifier.c in the Linux kernel mishandled states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allowed local users to obtain potentially sensitive address information, aka a 'pointer leak (bnc#1073928). - CVE-2017-17712: The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel has a race condition in inet->hdrincl that leads to uninitialized stack pointer usage; this allowed a local user to execute code and gain privileges (bnc#1073229 1073230). - CVE-2017-15129: A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel The function get_net_ns_by_id() in net/core/net_namespace.c did not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely (bnc#1074839). - CVE-2017-18017: The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action (bnc#1074488). - CVE-2018-1000004: In the Linux kernel a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition (bnc#1076017). The following non-security bugs were fixed: - 509: fix printing uninitialized stack memory when OID is empty (bsc#1075078). - 8021q: fix a memory leak for VLAN 0 device (bnc#1012382). - acpi / scan: Prefer devices without _HID/_CID for _ADR matching (bnc#1012382). - af_key: fix buffer overread in parse_exthdrs() (bnc#1012382). - af_key: fix buffer overread in verify_address_len() (bnc#1012382). - afs: Adjust mode bits processing (bnc#1012382). - afs: Connect up the CB.ProbeUuid (bnc#1012382). - afs: Fix afs_kill_pages() (bnc#1012382). - afs: Fix missing put_page() (bnc#1012382). - afs: Fix page leak in afs_write_begin() (bnc#1012382). - afs: Fix the maths in afs_fs_store_data() (bnc#1012382). - afs: Flush outstanding writes when an fd is closed (bnc#1012382). - afs: Migrate vlocation fields to 64-bit (bnc#1012382). - afs: Populate and use client modification time (bnc#1012382). - afs: Populate group ID from vnode status (bnc#1012382). - afs: Prevent callback expiry timer overflow (bnc#1012382). - alpha: fix build failures (bnc#1012382). - alsa: aloop: Fix inconsistent format due to incomplete rule (bsc#1031717). - alsa: aloop: Fix racy hw constraints adjustment (bsc#1031717). - alsa: aloop: Release cable upon open error path (bsc#1031717). - alsa: hda - Apply headphone noise quirk for another Dell XPS 13 variant (bsc#1031717). - alsa: hda - Apply the existing quirk to iMac 14,1 (bsc#1031717). - alsa: pcm: Abort properly at pending signal in OSS read/write loops (bsc#1031717). - alsa: pcm: Add missing error checks in OSS emulation plugin builder (bsc#1031717). - alsa: pcm: Allow aborting mutex lock at OSS read/write loops (bsc#1031717). - alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1031717). - alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1031717). - arc: uaccess: dont use 'l' gcc inline asm constraint modifier (bnc#1012382). - arm64: Add hypervisor safe helper for checking constant capabilities (bsc#1068032). - arm64: Add macros to read/write system registers (bsc#1068032). - arm64: add macro to extract ESR_ELx.EC (bsc#1068032). - arm64: Add skeleton to harden the branch predictor against aliasing attacks (bsc#1068032). - arm64: Add trace_hardirqs_off annotation in ret_to_user (bsc#1068032). - arm64: alternative: add auto-nop infrastructure (bsc#1068032). - arm64: barriers: introduce nops and __nops macros for NOP sequences (bsc#1068032). - arm64: cpu_errata: Allow an erratum to be match for all revisions of a core (bsc#1068032). - arm64: cpufeature: Add scope for capability check (bsc#1068032). - arm64/cpufeature: do not use mutex in bringup path (bsc#1068032). - arm64: cpufeature: Pass capability structure to ->enable callback (bsc#1068032). - arm64: debug: remove unused local_dbg_{enable, disable} macros (bsc#1068032). - arm64: Disable kpti for non broadcast TLB HW (bsc#1068032). - arm64: Disable TTBR0_EL1 during normal kernel execution (bsc#1068032). - arm64: do not pull uaccess.h into *.S (bsc#1068032). - arm64: Enable CONFIG_ARM64_SW_TTBR0_PAN (bsc#1068032). - arm64: entry: Add exception trampoline page for exceptions from EL0 (bsc#1068032). - arm64: entry: Add fake CPU feature for unmapping the kernel at EL0 (bsc#1068032). - arm64: entry: Explicitly pass exception level to kernel_ventry macro (bsc#1068032). - arm64: entry: Hook up entry trampoline to exception vectors (bsc#1068032). - arm64: entry: remove pointless SPSR mode check (bsc#1068032). - arm64: entry.S convert el0_sync (bsc#1068032). - arm64: entry.S: convert el1_sync (bsc#1068032). - arm64: entry.S: convert elX_irq (bsc#1068032). - arm64: entry.S: move SError handling into a C function for future expansion (bsc#1068032). - arm64: entry.S: Remove disable_dbg (bsc#1068032). - arm64: explicitly mask all exceptions (bsc#1068032). - arm64: factor out entry stack manipulation (bsc#1068032). - arm64: factor out PAGE_* and CONT_* definitions (bsc#1068032). - arm64: Factor out PAN enabling/disabling into separate uaccess_* macros (bsc#1068032). - arm64: Factor out TTBR0_EL1 post-update workaround into a specific asm macro (bsc#1068032). - arm64: factor work_pending state machine to C (bsc#1068032). - arm64: Fix circular include of asm/lse.h through linux/jump_label.h (bsc#1068032). - arm64: Fix compilation (bsc#1068032). - arm64: fpsimd: Prevent registers leaking from dead tasks (bnc#1012382). - arm64: Handle el1 synchronous instruction aborts cleanly (bsc#1068032). - arm64: head.S: get rid of x25 and x26 with 'global' scope (bsc#1068032). - arm64: Implement branch predictor hardening for affected Cortex-A CPUs (bsc#1068032). - arm64: Initialise high_memory global variable earlier (bnc#1012382). - arm64: introduce an order for exceptions (bsc#1068032). - arm64: introduce mov_q macro to move a constant into a 64-bit register (bsc#1068032). - arm64: Introduce uaccess_{disable,enable} functionality based on TTBR0_EL1 (bsc#1068032). - arm64: kaslr: Put kernel vectors address in separate data page (bsc#1068032). - arm64: Kconfig: Add CONFIG_UNMAP_KERNEL_AT_EL0 (bsc#1068032). - arm64: Kconfig: Reword UNMAP_KERNEL_AT_EL0 kconfig entry (bsc#1068032). - arm64: kill ESR_LNX_EXEC (bsc#1068032). - arm64: kpti: Fix the interaction between ASID switching and software PAN (bsc#1068032). - arm64: kvm: Fix SMCCC handling of unimplemented SMC/HVC calls (bnc#1012382). - arm64: kvm: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382). - arm64: kvm: Survive unknown traps from guests (bnc#1012382). - arm64: kvm: Use per-CPU vector when BP hardening is enabled (bsc#1068032). - arm64: Mask all exceptions during kernel_exit (bsc#1068032). - arm64: mm: Add arm64_kernel_unmapped_at_el0 helper (bsc#1068032). - arm64: mm: Allocate ASIDs in pairs (bsc#1068032). - arm64: mm: Fix and re-enable ARM64_SW_TTBR0_PAN (bsc#1068032). - arm64: mm: hardcode rodata=true (bsc#1068032). - arm64: mm: Introduce TTBR_ASID_MASK for getting at the ASID in the TTBR (bsc#1068032). - arm64: mm: Invalidate both kernel and user ASIDs when performing TLBI (bsc#1068032). - arm64: mm: Map entry trampoline into trampoline and kernel page tables (bsc#1068032). - arm64: mm: Move ASID from TTBR0 to TTBR1 (bsc#1068032). - arm64: mm: Rename post_ttbr0_update_workaround (bsc#1068032). - arm64: mm: Temporarily disable ARM64_SW_TTBR0_PAN (bsc#1068032). - arm64: mm: Use non-global mappings for kernel space (bsc#1068032). - arm64: Move BP hardening to check_and_switch_context (bsc#1068032). - arm64: Move post_ttbr_update_workaround to C code (bsc#1068032). - arm64: Move the async/fiq helpers to explicitly set process context flags (bsc#1068032). - arm64: Store struct thread_info in sp_el0 (bsc#1068032). - arm64: SW PAN: Point saved ttbr0 at the zero page when switching to init_mm (bsc#1068032). - arm64: SW PAN: Update saved ttbr0 value on enter_lazy_tlb (bsc#1068032). - arm64: swp emulation: bound LL/SC retries before rescheduling (bsc#1068032). - arm64: sysreg: allow write_sysreg to use XZR (bsc#1068032). - arm64: sysreg: Fix unprotected macro argmuent in write_sysreg (bsc#1068032). - arm64: Take into account ID_AA64PFR0_EL1.CSV3 (bsc#1068032). - arm64: tlbflush.h: add __tlbi() macro (bsc#1068032). - arm64: tls: Avoid unconditional zeroing of tpidrro_el0 for native tasks (bsc#1068032). - arm64: use alternative auto-nop (bsc#1068032). - arm64: use RET instruction for exiting the trampoline (bsc#1068032). - arm64: Use static keys for CPU features (bsc#1068032). - arm64: xen: Enable user access before a privcmd hvc call (bsc#1068032). - arm: avoid faulting on qemu (bnc#1012382). - arm: BUG if jumping to usermode address in kernel mode (bnc#1012382). - arm-ccn: perf: Prevent module unload while PMU is in use (bnc#1012382). - arm: dma-mapping: disallow dma_get_sgtable() for non-kernel managed memory (bnc#1012382). - arm: dts: am335x-evmsk: adjust mmc2 param to allow suspend (bnc#1012382). - arm: dts: kirkwood: fix pin-muxing of MPP7 on OpenBlocks A7 (bnc#1012382). - arm: dts: ti: fix pci bus dtc warnings (bnc#1012382). - arm: kprobes: Align stack to 8-bytes in test code (bnc#1012382). - arm: kprobes: Fix the return address of multiple kretprobes (bnc#1012382). - arm: kvm: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382). - arm: kvm: Survive unknown traps from guests (bnc#1012382). - arm: OMAP1: DMA: Correct the number of logical channels (bnc#1012382). - arm: OMAP2+: Fix device node reference counts (bnc#1012382). - arm: OMAP2+: gpmc-onenand: propagate error on initialization failure (bnc#1012382). - arm: OMAP2+: Release device node after it is no longer needed (bnc#1012382). - asm-prototypes: Clear any CPP defines before declaring the functions (git-fixes). - asn.1: check for error from ASN1_OP_END__ACT actions (bnc#1012382). - asn.1: fix out-of-bounds read when parsing indefinite length item (bnc#1012382). - ath9k: fix tx99 potential info leak (bnc#1012382). - atm: horizon: Fix irq release error (bnc#1012382). - audit: ensure that 'audit=1' actually enables audit for PID 1 (bnc#1012382). - axonram: Fix gendisk handling (bnc#1012382). - backlight: pwm_bl: Fix overflow condition (bnc#1012382). - bcache: add a comment in journal bucket reading (bsc#1076110). - bcache: Avoid nested function definition (bsc#1076110). - bcache: check return value of register_shrinker (bsc#1076110). - bcache: debug: avoid accessing .bi_io_vec directly (bsc#1076110). - bcache: documentation formatting, edited for clarity, stripe alignment notes (bsc#1076110). - bcache: documentation updates and corrections (bsc#1076110). - bcache: Do not reinvent the wheel but use existing llist API (bsc#1076110). - bcache: do not write back data if reading it failed (bsc#1076110). - bcache: explicitly destroy mutex while exiting (bnc#1012382). - bcache: fix a comments typo in bch_alloc_sectors() (bsc#1076110). - bcache: fix sequential large write IO bypass (bsc#1076110). - bcache: fix wrong cache_misses statistics (bnc#1012382). - bcache: gc does not work when triggering by manual command (bsc#1076110, bsc#1038078). - bcache: implement PI controller for writeback rate (bsc#1076110). - bcache: increase the number of open buckets (bsc#1076110). - bcache: only permit to recovery read error when cache device is clean (bnc#1012382 bsc#1043652). - bcache: partition support: add 16 minors per bcacheN device (bsc#1076110). - bcache: pr_err: more meaningful error message when nr_stripes is invalid (bsc#1076110). - bcache: rearrange writeback main thread ratelimit (bsc#1076110). - bcache: recover data from backing when data is clean (bnc#1012382 bsc#1043652). - bcache: register_bcache(): call blkdev_put() when cache_alloc() fails (bsc#1076110). - bcache: Remove deprecated create_workqueue (bsc#1076110). - bcache: Remove redundant block_size assignment (bsc#1076110). - bcache: Remove redundant parameter for cache_alloc() (bsc#1076110). - bcache: Remove redundant set_capacity (bsc#1076110). - bcache: remove unused parameter (bsc#1076110). - bcache: rewrite multiple partitions support (bsc#1076110, bsc#1038085, bsc#1019784). - bcache: safeguard a dangerous addressing in closure_queue (bsc#1076110). - bcache: silence static checker warning (bsc#1076110). - bcache: smooth writeback rate control (bsc#1076110). - bcache: switch to using blk_queue_write_cache() (bsc#1076110). - bcache.txt: standardize document format (bsc#1076110). - bcache: update bio->bi_opf bypass/writeback REQ_ flag hints (bsc#1076110). - bcache: update bucket_in_use in real time (bsc#1076110). - bcache: Update continue_at() documentation (bsc#1076110). - bcache: update document info (bsc#1076110). - bcache: use kmalloc to allocate bio in bch_data_verify() (bsc#1076110). - bcache: use llist_for_each_entry_safe() in __closure_wake_up() (bsc#1076110). - bcache: writeback rate clamping: make 32 bit safe (bsc#1076110). - bcache: writeback rate shouldn't artifically clamp (bsc#1076110). - be2net: restore properly promisc mode after queues reconfiguration (bsc#963844 FATE#320192). - block: export bio_free_pages to other modules (bsc#1076110). - block: wake up all tasks blocked in get_request() (bnc#1012382). - bluetooth: btusb: driver to enable the usb-wakeup feature (bnc#1012382). - bnx2x: do not rollback VF MAC/VLAN filters we did not configure (bnc#1012382). - bnx2x: fix possible overrun of VFPF multicast addresses array (bnc#1012382). - bnx2x: prevent crash when accessing PTP with interface down (bnc#1012382). - btrfs: account for pinned bytes in should_alloc_chunk (bsc#1066842). - btrfs: add missing memset while reading compressed inline extents (bnc#1012382). - can: af_can: canfd_rcv(): replace WARN_ONCE by pr_warn_once (bnc#1012382). - can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once (bnc#1012382). - can: ems_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382). - can: esd_usb2: cancel urb on -EPIPE and -EPROTO (bnc#1012382). - can: gs_usb: fix return value of the 'set_bittiming' callback (bnc#1012382). - can: kvaser_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382). - can: kvaser_usb: Fix comparison bug in kvaser_usb_read_bulk_callback() (bnc#1012382). - can: kvaser_usb: free buf in error paths (bnc#1012382). - can: kvaser_usb: ratelimit errors if incomplete messages are received (bnc#1012382). - can: peak: fix potential bug in packet fragmentation (bnc#1012382). - can: ti_hecc: Fix napi poll return value for repoll (bnc#1012382). - can: usb_8dev: cancel urb on -EPIPE and -EPROTO (bnc#1012382). - cdc-acm: apply quirk for card reader (bsc#1060279). - cdrom: factor out common open_for_* code (bsc#1048585). - cdrom: wait for tray to close (bsc#1048585). - ceph: drop negative child dentries before try pruning inode's alias (bnc#1012382). - ceph: more accurate statfs (bsc#1077068). - clk: imx6: refine hdmi_isfr's parent to make HDMI work on i.MX6 SoCs w/o VPU (bnc#1012382). - clk: mediatek: add the option for determining PLL source clock (bnc#1012382). - clk: tegra: Fix cclk_lp divisor register (bnc#1012382). - cpuidle: fix broadcast control when broadcast can not be entered (bnc#1012382). - cpuidle: powernv: Pass correct drv->cpumask for registration (bnc#1012382). - cpuidle: Validate cpu_dev in cpuidle_add_sysfs() (bnc#1012382). - crypto: algapi - fix NULL dereference in crypto_remove_spawns() (bnc#1012382). - crypto: chacha20poly1305 - validate the digest size (bnc#1012382). - crypto: crypto4xx - increase context and scatter ring buffer elements (bnc#1012382). - crypto: deadlock between crypto_alg_sem/rtnl_mutex/genl_mutex (bnc#1012382). - crypto: mcryptd - protect the per-CPU queue with a lock (bnc#1012382). - crypto: n2 - cure use after free (bnc#1012382). - crypto: pcrypt - fix freeing pcrypt instances (bnc#1012382). - crypto: s5p-sss - Fix completing crypto request in IRQ handler (bnc#1012382). - crypto: tcrypt - fix buffer lengths in test_aead_speed() (bnc#1012382). - cxl: Check if vphb exists before iterating over AFU devices (bsc#1066223). - dax: Pass detailed error code from __dax_fault() (bsc#1072484). - dccp: do not restart ccid2_hc_tx_rto_expire() if sk in closed state (bnc#1012382). - delay: add poll_event_interruptible (bsc#1048585). - dmaengine: dmatest: move callback wait queue to thread context (bnc#1012382). - dmaengine: Fix array index out of bounds warning in __get_unmap_pool() (bnc#1012382). - dmaengine: pl330: fix double lock (bnc#1012382). - dmaengine: ti-dma-crossbar: Correct am335x/am43xx mux value type (bnc#1012382). - dm btree: fix serious bug in btree_split_beneath() (bnc#1012382). - dm bufio: fix shrinker scans when (nr_to_scan < retain_target) (bnc#1012382). - dm thin metadata: THIN_MAX_CONCURRENT_LOCKS should be 6 (bnc#1012382). - drivers: base: cacheinfo: fix boot error message when acpi is enabled (bnc#1012382). - drivers: base: cacheinfo: fix x86 with CONFIG_OF enabled (bnc#1012382). - drivers/firmware: Expose psci_get_version through psci_ops structure (bsc#1068032). - drivers/md/bcache/util.h: remove duplicate inclusion of blkdev.h (bsc#1076110). - drivers: net: xgene: Fix hardware checksum setting (bsc#1078526). - drm/amd/amdgpu: fix console deadlock if late init failed (bnc#1012382). - drm: extra printk() wrapper macros (bnc#1012382). - drm/exynos/decon5433: set STANDALONE_UPDATE_F on output enablement (bnc#1012382). - drm/exynos: gem: Drop NONCONTIG flag for buffers allocated without IOMMU (bnc#1012382). - drm/omap: fix dmabuf mmap for dma_alloc'ed buffers (bnc#1012382). - drm/radeon: reinstate oland workaround for sclk (bnc#1012382). - drm/radeon/si: add dpm quirk for Oland (bnc#1012382). - drm/vmwgfx: Potential off by one in vmw_view_add() (bnc#1012382). - dynamic-debug-howto: fix optional/omitted ending line number to be LARGE instead of 0 (bnc#1012382). - edac, i5000, i5400: Fix definition of NRECMEMB register (bnc#1012382). - edac, i5000, i5400: Fix use of MTR_DRAM_WIDTH macro (bnc#1012382). - edac, sb_edac: Fix missing break in switch (bnc#1012382). - efi/esrt: Cleanup bad memory map log messages (bnc#1012382). - efi: Move some sysfs files to be read-only by root (bnc#1012382). - eventpoll.h: add missing epoll event masks (bnc#1012382). - ext4: fix crash when a directory's i_size is too small (bnc#1012382). - ext4: Fix ENOSPC handling in DAX page fault handle (bsc#1072484). - ext4: fix fdatasync(2) after fallocate(2) operation (bnc#1012382). - fbdev: controlfb: Add missing modes to fix out of bounds access (bnc#1012382). - Fix build error in vma.c (bnc#1012382). - fjes: Fix wrong netdevice feature flags (bnc#1012382). - flow_dissector: properly cap thoff field (bnc#1012382). - fm10k: ensure we process SM mbx when processing VF mbx (bnc#1012382). - fork: clear thread stack upon allocation (bsc#1077560). Conflicts: series.conf - fscache: Fix the default for fscache_maybe_release_page() (bnc#1012382). - futex: Prevent overflow by strengthen input validation (bnc#1012382). - gcov: disable for COMPILE_TEST (bnc#1012382). - gfs2: Take inode off order_write list when setting jdata flag (bnc#1012382). - gpio: altera: Use handle_level_irq when configured as a level_high (bnc#1012382). - hid: chicony: Add support for another ASUS Zen AiO keyboard (bnc#1012382). - hid: xinmo: fix for out of range for THT 2P arcade controller (bnc#1012382). - hrtimer: Reset hrtimer cpu base proper on CPU hotplug (bnc#1012382). - hv: kvp: Avoid reading past allocated blocks from KVP file (bnc#1012382). - hwmon: (asus_atk0110) fix uninitialized data access (bnc#1012382). - i40e: Do not enable NAPI on q_vectors that have no rings (bnc#1012382). - ib/hfi1: Correct defered count after processing qp_wait_list (git-fixes). - ib/hfi1: Fix rnr_timer addition (git-fixes). - ib/hfi1: Handle kzalloc failure in init_pervl_scs (git-fixes). - ib/hfi1: Move iowait_init() to priv allocate (git-fixes). - ib/hfi1: Prevent kernel QP post send hard lockups (git-fixes). - ib/hfi1: Reset QSFP on every run through channel tuning (git-fixes). - ib/ipoib: Fix lockdep issue found on ipoib_ib_dev_heavy_flush (git-fixes). - ib/ipoib: Grab rtnl lock on heavy flush when calling ndo_open/stop (bnc#1012382). - ib/mlx4: Increase maximal message size under UD QP (bnc#1012382). - ib/mlx5: Assign send CQ and recv CQ of UMR QP (bnc#1012382). - ibmvnic: Allocate and request vpd in init_resources (bsc#1076872). - ibmvnic: Do not handle RX interrupts when not up (bsc#1075066). - ibmvnic: Fix IP offload control buffer (bsc#1076899). - ibmvnic: Fix IPv6 packet descriptors (bsc#1076899). - ibmvnic: Fix pending MAC address changes (bsc#1075627). - ibmvnic: Modify buffer size and number of queues on failover (bsc#1076872). - ibmvnic: Revert to previous mtu when unsupported value requested (bsc#1076872). - ibmvnic: Wait for device response when changing MAC (bsc#1078681). - ib/qib: Remove qpt_mask global (git-fixes). - ib/rdmavt: restore IRQs on error path in rvt_create_ah() (git-fixes). - ib/srpt: Disable RDMA access by the initiator (bnc#1012382). - igb: check memory allocation failure (bnc#1012382). - ima: fix hash algorithm initialization (bnc#1012382). - inet: frag: release spinlock before calling icmp_send() (bnc#1012382). - input: 88pm860x-ts - fix child-node lookup (bnc#1012382). - input: elantech - add new icbody type 15 (bnc#1012382). - input: i8042 - add TUXEDO BU1406 (N24_25BU) to the nomux list (bnc#1012382). - input: trackpoint - force 3 buttons if 0 button is reported (bnc#1012382). - input: twl4030-vibra - fix sibling-node lookup (bnc#1012382). - input: twl6040-vibra - fix child-node lookup (bnc#1012382). - input: twl6040-vibra - fix DT node memory management (bnc#1012382). - intel_th: pci: Add Gemini Lake support (bnc#1012382). - iommu/arm-smmu-v3: Do not free page table ops twice (bnc#1012382). - iommu/vt-d: Fix scatterlist offset handling (bnc#1012382). - ip6_tunnel: disable dst caching if tunnel is dual-stack (bnc#1012382). - ipmi: Stop timers before cleaning up the module (bnc#1012382). - ipv4: Fix use-after-free when flushing FIB tables (bnc#1012382). - ipv4: igmp: guard against silly MTU values (bnc#1012382). - ipv4: Make neigh lookup keys for loopback/point-to-point devices be INADDR_ANY (bnc#1012382). - ipv6: Fix getsockopt() for sockets with default IPV6_AUTOFLOWLABEL (bnc#1012382). - ipv6: fix possible mem leaks in ipv6_make_skb() (bnc#1012382). - ipv6: fix udpv6 sendmsg crash caused by too small MTU (bnc#1012382). - ipv6: ip6_make_skb() needs to clear cork.base.dst (git-fixes). - ipv6: mcast: better catch silly mtu values (bnc#1012382). - ipv6: reorder icmpv6_init() and ip6_mr_init() (bnc#1012382). - ipvlan: fix ipv6 outbound device (bnc#1012382). - ipvlan: remove excessive packet scrubbing (bsc#1070799). - irda: vlsi_ir: fix check for DMA mapping errors (bnc#1012382). - irqchip/crossbar: Fix incorrect type of register size (bnc#1012382). - iscsi-target: fix memory leak in lio_target_tiqn_addtpg() (bnc#1012382). - iscsi-target: Make TASK_REASSIGN use proper se_cmd->cmd_kref (bnc#1012382). - isdn: kcapi: avoid uninitialized data (bnc#1012382). - iw_cxgb4: Only validate the MSN for successful completions (bnc#1012382). - ixgbe: fix use of uninitialized padding (bnc#1012382). - jump_label: Invoke jump_label_test() via early_initcall() (bnc#1012382). - jump_label: Make it possible for arches to invoke jump_label_init() earlier (bsc#1068032). - jump_labels: Allow array initialisers (bsc#1068032). - Kabi: Keep KVM stable after enable s390 wire up bpb feature (bsc#1076806). - kABI: protect struct bpf_map (kabi). - kABI: protect struct ipv6_pinfo (kabi). - kABI: protect struct t10_alua_tg_pt_gp (kabi). - kABI: protect struct usbip_device (kabi). - kabi/severities: do not care about stuff_RSB - kaiser: Set _PAGE_NX only if supported (bnc#1012382). - kaiser: Set _PAGE_NX only if supported (bnc#1012382). - kbuild: add '-fno-stack-check' to kernel build options (bnc#1012382). - kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032). - kbuild: pkg: use --transform option to prefix paths in tar (bnc#1012382). - kdb: Fix handling of kallsyms_symbol_next() return value (bnc#1012382). - kernel/acct.c: fix the acct->needcheck check in check_free_space() (bnc#1012382). - kernel: make groups_sort calling a responsibility group_info allocators (bnc#1012382). - kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from !sig_kernel_only() signals (bnc#1012382). - kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL (bnc#1012382). - kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in complete_signal() (bnc#1012382). - keys: add missing permission check for request_key() destination (bnc#1012382). - kprobes/x86: Disable preemption in ftrace-based jprobes (bnc#1012382). - kpti: Rename to PAGE_TABLE_ISOLATION (bnc#1012382). - kpti: Report when enabled (bnc#1012382). - kvm: arm/arm64: Fix occasional warning from the timer work function (bnc#1012382 bsc#988524). - kvm: Fix stack-out-of-bounds read in write_mmio (bnc#1012382). - kvm: nVMX: reset nested_run_pending if the vCPU is going to be reset (bnc#1012382). - kvm: nVMX: VMCLEAR should not cause the vCPU to shut down (bnc#1012382). - kvm: pci-assign: do not map smm memory slot pages in vt-d page tables (bnc#1012382). - kvm: s390: Enable all facility bits that are known good for passthrough (bsc#1076806). - kvm: s390: wire up bpb feature (bsc#1076806). - kvm: VMX: Fix enable VPID conditions (bnc#1012382). - kvm: VMX: remove I/O port 0x80 bypass on Intel hosts (bnc#1012382). - kvm: vmx: Scrub hardware GPRs at VM-exit (bnc#1012382). - kvm: x86: Add memory barrier on vmcs field lookup (bnc#1012382). - kvm: x86: correct async page present tracepoint (bnc#1012382). - kvm: X86: Fix load RFLAGS w/o the fixed bit (bnc#1012382). - kvm: x86: fix RSM when pciD is non-zero (bnc#1012382). - l2tp: cleanup l2tp_tunnel_delete calls (bnc#1012382). - lan78xx: Fix failure in USB Full Speed (bnc#1012382). - libata: apply MAX_SEC_1024 to all LITEON EP1 series devices (bnc#1012382). - libata: drop WARN from protocol error in ata_sff_qc_issue() (bnc#1012382). - lib/genalloc.c: make the avail variable an atomic_long_t (bnc#1012382). - macvlan: Only deliver one copy of the frame to the macvlan interface (bnc#1012382). - md-cluster: free md_cluster_info if node leave cluster (bnc#1012382). - media: dvb: i2c transfers over usb cannot be done from stack (bnc#1012382). - mfd: cros ec: spi: Do not send first message too soon (bnc#1012382). - mfd: twl4030-audio: Fix sibling-node lookup (bnc#1012382). - mfd: twl6040: Fix child-node lookup (bnc#1012382). - MIPS: Also verify sizeof `elf_fpreg_t' with PTRACE_SETREGSET (bnc#1012382). - MIPS: AR7: ensure the port type's FCR value is used (bnc#1012382). - MIPS: Consistently handle buffer counter with PTRACE_SETREGSET (bnc#1012382). - MIPS: Disallow outsized PTRACE_SETREGSET NT_PRFPREG regset accesses (bnc#1012382). - MIPS: Factor out NT_PRFPREG regset access helpers (bnc#1012382). - MIPS: Fix an FCSR access API regression with NT_PRFPREG and MSA (bnc#1012382). - MIPS: Guard against any partial write attempt with PTRACE_SETREGSET (bnc#1012382). - MIPS: math-emu: Fix final emulation phase for certain instructions (bnc#1012382). - MIPS: Validate PR_SET_FP_MODE prctl(2) requests against the ABI of the task (bnc#1012382). - mlxsw: reg: Fix SPVMLR max record count (bnc#1012382). - mlxsw: reg: Fix SPVM max record count (bnc#1012382). - mm: avoid returning VM_FAULT_RETRY from ->page_mkwrite handlers (bnc#1012382). - mmc: mediatek: Fixed bug where clock frequency could be set wrong (bnc#1012382). - mm: drop unused pmdp_huge_get_and_clear_notify() (bnc#1012382). - mm: Handle 0 flags in _calc_vm_trans() macro (bnc#1012382). - mm: Introduce lm_alias (bsc#1068032). - mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1012382). - mm/mprotect: add a cond_resched() inside change_pmd_range() (bnc#1077871). - mm/vmstat: Make NR_TLB_REMOTE_FLUSH_RECEIVED available even on UP (bnc#1012382). - module: set __jump_table alignment to 8 (bnc#1012382). - more bio_map_user_iov() leak fixes (bnc#1012382). - net: Allow neigh contructor functions ability to modify the primary_key (bnc#1012382). - net/appletalk: Fix kernel memory disclosure (bnc#1012382). - net: bcmgenet: correct MIB access of UniMAC RUNT counters (bnc#1012382). - net: bcmgenet: correct the RBUF_OVFL_CNT and RBUF_ERR_CNT MIB values (bnc#1012382). - net: bcmgenet: power down internal phy if open or resume fails (bnc#1012382). - net: bcmgenet: Power up the internal PHY before probing the MII (bnc#1012382). - net: bcmgenet: reserved phy revisions must be checked first (bnc#1012382). - net: bridge: fix early call to br_stp_change_bridge_id and plug newlink leaks (bnc#1012382). - net: core: fix module type in sock_diag_bind (bnc#1012382). - net: Do not allow negative values for busy_read and busy_poll sysctl interfaces (bnc#1012382). - net: fec: fix multicast filtering hardware setup (bnc#1012382). - netfilter: bridge: honor frag_max_size when refragmenting (bnc#1012382). - netfilter: do not track fragmented packets (bnc#1012382). - netfilter: ipvs: Fix inappropriate output of procfs (bnc#1012382). - netfilter: nfnetlink_queue: fix secctx memory leak (bnc#1012382). - netfilter: nfnetlink_queue: fix timestamp attribute (bsc#1074134). - netfilter: nfnl_cthelper: fix a race when walk the nf_ct_helper_hash table (bnc#1012382). - netfilter: nfnl_cthelper: Fix memory leak (bnc#1012382). - netfilter: nfnl_cthelper: fix runtime expectation policy updates (bnc#1012382). - net: Fix double free and memory corruption in get_net_ns_by_id() (bnc#1012382). - net: igmp: fix source address check for IGMPv3 reports (bnc#1012382). - net: igmp: Use correct source address on IGMPv3 reports (bnc#1012382). - net: initialize msg.msg_flags in recvfrom (bnc#1012382). - net: ipv4: fix for a race condition in raw_sendmsg (bnc#1012382). - net/mac80211/debugfs.c: prevent build failure with CONFIG_UBSAN=y (bnc#1012382). - net: mvmdio: disable/unprepare clocks in EPROBE_DEFER case (bnc#1012382). - net: mvneta: clear interface link status on port disable (bnc#1012382). - net/packet: fix a race in packet_bind() and packet_notifier() (bnc#1012382). - net: phy: at803x: Change error to EINVAL for invalid MAC (bnc#1012382). - net: phy: micrel: ksz9031: reconfigure autoneg after phy autoneg workaround (bnc#1012382). - net: qdisc_pkt_len_init() should be more robust (bnc#1012382). - net: qmi_wwan: add Sierra EM7565 1199:9091 (bnc#1012382). - net: qmi_wwan: Add USB IDs for MDM6600 modem on Motorola Droid 4 (bnc#1012382). - net: reevalulate autoflowlabel setting after sysctl setting (bnc#1012382). - net: Resend IGMP memberships upon peer notification (bnc#1012382). - net: sctp: fix array overrun read on sctp_timer_tbl (bnc#1012382). - net: stmmac: enable EEE in MII, GMII or RGMII only (bnc#1012382). - net: systemport: Pad packet before inserting TSB (bnc#1012382). - net: systemport: Utilize skb_put_padto() (bnc#1012382). - net: tcp: close sock if net namespace is exiting (bnc#1012382). - net: wimax/i2400m: fix NULL-deref at probe (bnc#1012382). - nfsd: auth: Fix gid sorting when rootsquash enabled (bnc#1012382). - nfsd: fix nfsd_minorversion(.., NFSD_AVAIL) (bnc#1012382). - nfsd: fix nfsd_reset_versions for NFSv4 (bnc#1012382). - nfs: Do not take a reference on fl->fl_file for LOCK operation (bnc#1012382). - nfs: Fix a typo in nfs_rename() (bnc#1012382). - nfsv4.1 respect server's max size in CREATE_SESSION (bnc#1012382). - nfsv4: Fix client recovery when server reboots multiple times (bnc#1012382). - nohz: Prevent a timer interrupt storm in tick_nohz_stop_sched_tick() (bnc#1012382). - n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD) (bnc#1012382). - openrisc: fix issue handling 8 byte get_user calls (bnc#1012382). - packet: fix crash in fanout_demux_rollover() (bnc#1012382). - parisc: Fix alignment of pa_tlb_lock in assembly on 32-bit SMP kernel (bnc#1012382). - parisc: Hide Diva-built-in serial aux and graphics card (bnc#1012382). - partially revert tipc improve link resiliency when rps is activated (bsc#1068038). - pci/aer: Report non-fatal errors only to the affected endpoint (bnc#1012382). - pci: Avoid bus reset if bridge itself is broken (bnc#1012382). - pci: Create SR-IOV virtfn/physfn links before attaching driver (bnc#1012382). - pci: Detach driver before procfs & sysfs teardown on device remove (bnc#1012382). - pci/pme: Handle invalid data when reading Root Status (bnc#1012382). - pci / pm: Force devices to D0 in pci_pm_thaw_noirq() (bnc#1012382). - perf symbols: Fix symbols__fixup_end heuristic for corner cases (bnc#1012382). - perf test attr: Fix ignored test case result (bnc#1012382). - perf: xgene: Add APM X-Gene SoC Performance Monitoring Unit driver (bsc#1036737). - perf: xgene: Add support for SoC PMU version 3 (bsc#1076809). - perf: xgene: Include module.h (bsc#1076809). - perf: xgene: Move PMU leaf functions into function pointer structure (bsc#1076809). - perf: xgene: Parse PMU subnode from the match table (bsc#1076809). - perf: xgene: Remove unnecessary managed resources cleanup (bsc#1076809). - phy: work around 'phys' references to usb-nop-xceiv devices (bnc#1012382). - pinctrl: adi2: Fix Kconfig build problem (bnc#1012382). - pinctrl: st: add irq_request/release_resources callbacks (bnc#1012382). - pipe: avoid round_pipe_size() nr_pages overflow on 32-bit (bnc#1012382). - powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1075087). - powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087). - powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087). - powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1075087). - powerpc/64s: Add support for RFI flush of L1-D cache (bsc#1068032, bsc#1075087). - powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032, bsc#1075087). - powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087). - powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075087). - powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1075087). - powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032). - powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1075087). - powerpc/ipic: Fix status get and status clear (bnc#1012382). - powerpc/perf: Dereference BHRB entries safely (bsc#1066223). - powerpc/perf/hv-24x7: Fix incorrect comparison in memord (bnc#1012382). - powerpc/powernv: Check device-tree for RFI flush settings (bsc#1068032, bsc#1075087). - powerpc/powernv/cpufreq: Fix the frequency read by /proc/cpuinfo (bnc#1012382). - powerpc/powernv/ioda2: Gracefully fail if too many TCE levels requested (bnc#1012382). - powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1075087). - powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032, bsc#1075087). - powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032, bsc#1075087). - powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075087). - powerpc/pseries: rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075087). - powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032, bsc#1075087). - powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1068032, bsc#1075087). - powerpc/rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1068032, bsc#1075087). - powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1068032, bsc#1075087). - powerpc/rfi-flush: prevent crash when changing flush type to fallback after system boot (bsc#1068032, bsc#1075087). - ppp: Destroy the mutex when cleanup (bnc#1012382). - pppoe: take ->needed_headroom of lower device into account on xmit (bnc#1012382). - pti: unbreak EFI (bsc#1074709). - r8152: fix the list rx_done may be used without initialization (bnc#1012382). - r8152: prevent the driver from transmitting packets with carrier off (bnc#1012382). - r8169: fix memory corruption on retrieval of hardware statistics (bnc#1012382). - raid5: Set R5_Expanded on parity devices as well as data (bnc#1012382). - ravb: Remove Rx overflow log messages (bnc#1012382). - rbd: set max_segments to USHRT_MAX (bnc#1012382). - rdma/cma: Avoid triggering undefined behavior (bnc#1012382). - rdma/iser: Fix possible mr leak on device removal event (bnc#1012382). - rds: Fix NULL pointer dereference in __rds_rdma_map (bnc#1012382). - rds: Heap OOB write in rds_message_alloc_sgs() (bnc#1012382). - rds: null pointer dereference in rds_atomic_free_op (bnc#1012382). - regulator: core: Rely on regulator_dev_release to free constraints (bsc#1074847). - regulator: da9063: Return an error code on probe failure (bsc#1074847). - regulator: pwm: Fix regulator ramp delay for continuous mode (bsc#1074847). - regulator: Try to resolve regulators supplies on registration (bsc#1074847). - Revert 'arm64: alternatives: add enable parameter to conditional asm macros' (bsc#1068032). - Revert 'Bluetooth: btusb: driver to enable the usb-wakeup feature' (bnc#1012382). - Revert 'drm/armada: Fix compile fail' (bnc#1012382). - Revert 'kaiser: vmstat show NR_KAISERTABLE as nr_overhead' (kabi). - Revert 'lib/genalloc.c: make the avail variable an atomic_long_t' (kabi). - Revert 'module: Add retpoline tag to VERMAGIC' (bnc#1012382 kabi). - Revert 'ocfs2: should wait dio before inode lock in ocfs2_setattr()' (bnc#1012382). - Revert 's390/kbuild: enable modversions for symbols exported from asm' (bnc#1012382). - Revert 'sched/deadline: Use the revised wakeup rule for suspending constrained dl tasks' (kabi). - Revert 'scsi: libsas: align sata_device's rps_resp on a cacheline' (kabi). - Revert 'spi: SPI_FSL_DSPI should depend on HAS_DMA' (bnc#1012382). - Revert 'userfaultfd: selftest: vm: allow to build in vm/ directory' (bnc#1012382). - Revert 'x86/efi: Build our own page table structures' (bnc#1012382). - Revert 'x86/efi: Hoist page table switching code into efi_call_virt()' (bnc#1012382). - Revert 'x86/mm/pat: Ensure cpa->pfn only contains page frame numbers' (bnc#1012382). - rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075087). - ring-buffer: Mask out the info bits when returning buffer page length (bnc#1012382). - route: also update fnhe_genid when updating a route cache (bnc#1012382). - route: update fnhe_expires for redirect when the fnhe exists (bnc#1012382). - rtc: cmos: Initialize hpet timer before irq is registered (bsc#1077592). - rtc: pcf8563: fix output clock rate (bnc#1012382). - rtc: pl031: make interrupt optional (bnc#1012382). - rtc: set the alarm to the next expiring timer (bnc#1012382). - s390: always save and restore all registers on context switch (bnc#1012382). - s390: fix compat system call table (bnc#1012382). - s390/pci: do not require AIS facility (bnc#1012382). - s390/qeth: no ETH header for outbound AF_IUCV (bnc#1012382). - s390/runtime instrumentation: simplify task exit handling (bnc#1012382). - sch_dsmark: fix invalid skb_cow() usage (bnc#1012382). - sched/deadline: Make sure the replenishment timer fires in the next period (bnc#1012382). - sched/deadline: Throttle a constrained deadline task activated after the deadline (bnc#1012382). - sched/deadline: Use deadline instead of period when calculating overflow (bnc#1012382). - sched/deadline: Use the revised wakeup rule for suspending constrained dl tasks (bnc#1012382). - sched/deadline: Zero out positive runtime after throttling constrained tasks (git-fixes). - scsi: bfa: integer overflow in debugfs (bnc#1012382). - scsi: check for device state in __scsi_remove_target() (bsc#1072589). - scsi: cxgb4i: fix Tx skb leak (bnc#1012382). - scsi: fixup kernel warning during rmmod() (bsc#1052360). - scsi: hpsa: cleanup sas_phy structures in sysfs when unloading (bnc#1012382). - scsi: hpsa: destroy sas transport properties before scsi_host (bnc#1012382). - scsi: libsas: align sata_device's rps_resp on a cacheline (bnc#1012382). - scsi: lpfc: Fix crash during Hardware error recovery on SLI3 adapters (bnc#1012382). - scsi: lpfc: Fix PT2PT PRLI reject (bnc#1012382). - scsi: lpfc: Fix secure firmware updates (bnc#1012382). - scsi: lpfc: PLOGI failures during NPIV testing (bnc#1012382). - scsi: mpt3sas: Fix IO error occurs on pulling out a drive from RAID1 volume created on two SATA drive (bnc#1012382). - scsi: sd: change allow_restart to bool in sysfs interface (bnc#1012382). - scsi: sd: change manage_start_stop to bool in sysfs interface (bnc#1012382). - scsi: sg: disable SET_FORCE_LOW_DMA (bnc#1012382). - scsi: sr: wait for the medium to become ready (bsc#1048585). - sctp: do not allow the v4 socket to bind a v4mapped v6 address (bnc#1012382). - sctp: do not free asoc when it is already dead in sctp_sendmsg (bnc#1012382). - sctp: Replace use of sockets_allocated with specified macro (bnc#1012382). - sctp: return error if the asoc has been peeled off in sctp_wait_for_sndbuf (bnc#1012382). - sctp: use the right sk after waking up from wait_buf sleep (bnc#1012382). - selftest/powerpc: Fix false failures for skipped tests (bnc#1012382). - selftests/x86: Add test_vsyscall (bnc#1012382). - selftests/x86/ldt_get: Add a few additional tests for limits (bnc#1012382). - serial: 8250_pci: Add Amazon pci serial device ID (bnc#1012382). - serial: 8250: Preserve DLD[7:4] for PORT_XR17V35X (bnc#1012382). - Set supported_modules_check 1 (bsc#1072163). - sfc: do not warn on successful change of MAC (bnc#1012382). - sh_eth: fix SH7757 GEther initialization (bnc#1012382). - sh_eth: fix TSU resource handling (bnc#1012382). - sit: update frag_off info (bnc#1012382). - sock: free skb in skb_complete_tx_timestamp on error (bnc#1012382). - sparc64/mm: set fields in deferred pages (bnc#1012382). - spi_ks8995: fix 'BUG: key accdaa28 not in .data!' (bnc#1012382). - spi: sh-msiof: Fix DMA transfer size check (bnc#1012382). - spi: xilinx: Detect stall with Unknown commands (bnc#1012382). - staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl (bnc#1012382). - sunrpc: Fix rpc_task_begin trace point (bnc#1012382). - sunxi-rsb: Include OF based modalias in device uevent (bnc#1012382). - sysfs/cpu: Add vulnerability folder (bnc#1012382). - sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382). - sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091). - sysrq : fix Show Regs call trace on ARM (bnc#1012382). - target: Avoid early CMD_T_PRE_EXECUTE failures during ABORT_TASK (bnc#1012382). - target/file: Do not return error for UNMAP if length is zero (bnc#1012382). - target: fix ALUA transition timeout handling (bnc#1012382). - target:fix condition return in core_pr_dump_initiator_port() (bnc#1012382). - target: fix race during implicit transition work flushes (bnc#1012382). - target/iscsi: Fix a race condition in iscsit_add_reject_from_cmd() (bnc#1012382). - target: Use system workqueue for ALUA transitions (bnc#1012382). - tcp: correct memory barrier usage in tcp_check_space() (bnc#1012382). - tcp: fix under-evaluated ssthresh in TCP Vegas (bnc#1012382). - tcp md5sig: Use skb's saddr when replying to an incoming segment (bnc#1012382). - tcp: __tcp_hdrlen() helper (bnc#1012382). - tg3: Fix rx hang on MTU change with 5717/5719 (bnc#1012382). - thermal/drivers/step_wise: Fix temperature regulation misbehavior (bnc#1012382). - thermal: hisilicon: Handle return value of clk_prepare_enable (bnc#1012382). - tipc: fix cleanup at module unload (bnc#1012382). - tipc: fix memory leak in tipc_accept_from_sock() (bnc#1012382). - tipc: improve link resiliency when rps is activated (bsc#1068038). - tracing: Allocate mask_str buffer dynamically (bnc#1012382). - tracing: Fix converting enum's from the map in trace_event_eval_update() (bnc#1012382). - tracing: Fix crash when it fails to alloc ring buffer (bnc#1012382). - tracing: Fix possible double free on failure of allocating trace buffer (bnc#1012382). - tracing: Remove extra zeroing out of the ring buffer page (bnc#1012382). - tty fix oops when rmmod 8250 (bnc#1012382). - uas: Always apply US_FL_NO_ATA_1X quirk to Seagate devices (bnc#1012382). - uas: ignore UAS for Norelsys NS1068(X) chips (bnc#1012382). - udf: Avoid overflow when session starts at large offset (bnc#1012382). - um: link vmlinux with -no-pie (bnc#1012382). - usb: Add device quirk for Logitech HD Pro Webcam C925e (bnc#1012382). - usb: add RESET_RESUME for ELSA MicroLink 56K (bnc#1012382). - USB: core: Add type-specific length check of BOS descriptors (bnc#1012382). - USB: core: prevent malicious bNumInterfaces overflow (bnc#1012382). - USB: devio: Prevent integer overflow in proc_do_submiturb() (bnc#1012382). - USB: Fix off by one in type-specific length check of BOS SSP capability (git-fixes). - USB: fix usbmon BUG trigger (bnc#1012382). - usb: gadget: configs: plug memory leak (bnc#1012382). - usb: gadget: ffs: Forbid usb_ep_alloc_request from sleeping (bnc#1012382). - USB: gadgetfs: Fix a potential memory leak in 'dev_config()' (bnc#1012382). - usb: gadget: f_uvc: Sanity check wMaxPacketSize for SuperSpeed (bnc#1012382). - usb: gadget: udc: remove pointer dereference after free (bnc#1012382). - usb: hub: Cycle HUB power when initialization fails (bnc#1012382). - USB: Increase usbfs transfer limit (bnc#1012382). - usbip: Fix implicit fallthrough warning (bnc#1012382). - usbip: Fix potential format overflow in userspace tools (bnc#1012382). - usbip: fix stub_rx: get_pipe() to validate endpoint number (bnc#1012382). - usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input (bnc#1012382). - usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer (bnc#1012382). - usbip: fix usbip bind writing random string after command in match_busid (bnc#1012382). - usbip: prevent leaking socket pointer address in messages (bnc#1012382). - usbip: prevent vhci_hcd driver from leaking a socket pointer address (bnc#1012382). - usbip: remove kernel addresses from usb device and urb debug msgs (bnc#1012382). - usbip: stub: stop printing kernel pointer addresses in messages (bnc#1012382). - usbip: vhci: stop printing kernel pointer addresses in messages (bnc#1012382). - usb: misc: usb3503: make sure reset is low for at least 100us (bnc#1012382). - usb: musb: da8xx: fix babble condition handling (bnc#1012382). - usb: phy: isp1301: Add OF device ID table (bnc#1012382). - usb: phy: isp1301: Fix build warning when CONFIG_OF is disabled (git-fixes). - usb: phy: tahvo: fix error handling in tahvo_usb_probe() (bnc#1012382). - usb: quirks: Add no-lpm quirk for KY-688 USB 3.1 Type-C Hub (bnc#1012382). - USB: serial: cp210x: add IDs for LifeScan OneTouch Verio IQ (bnc#1012382). - USB: serial: cp210x: add new device ID ELV ALC 8xxx (bnc#1012382). - USB: serial: ftdi_sio: add id for Airbus DS P8GR (bnc#1012382). - USB: serial: option: adding support for YUGA CLM920-NC5 (bnc#1012382). - USB: serial: option: add Quectel BG96 id (bnc#1012382). - USB: serial: option: add support for Telit ME910 PID 0x1101 (bnc#1012382). - USB: serial: qcserial: add Sierra Wireless EM7565 (bnc#1012382). - USB: uas and storage: Add US_FL_BROKEN_FUA for another JMicron JMS567 ID (bnc#1012382). - USB: usbfs: Filter flags passed in from user space (bnc#1012382). - usb: usbip: Fix possible deadlocks reported by lockdep (bnc#1012382). - usb: xhci: Add XHCI_TRUST_TX_LENGTH for Renesas uPD720201 (bnc#1012382). - usb: xhci: fix panic in xhci_free_virt_devices_depth_first (bnc#1012382). - userfaultfd: selftest: vm: allow to build in vm/ directory (bnc#1012382). - userfaultfd: shmem: __do_fault requires VM_FAULT_NOPAGE (bnc#1012382). - video: fbdev: au1200fb: Release some resources if a memory allocation fails (bnc#1012382). - video: fbdev: au1200fb: Return an error code if a memory allocation fails (bnc#1012382). - virtio: release virtio index when fail to device_register (bnc#1012382). - vmxnet3: repair memory leak (bnc#1012382). - vsyscall: Fix permissions for emulate mode with KAISER/PTI (bnc#1012382). - vt6655: Fix a possible sleep-in-atomic bug in vt6655_suspend (bnc#1012382). - vti6: Do not report path MTU below IPV6_MIN_MTU (bnc#1012382). - vti6: fix device register to report IFLA_INFO_KIND (bnc#1012382). - workqueue: trigger WARN if queue_delayed_work() is called with NULL @wq (bnc#1012382). - writeback: fix memory leak in wb_queue_work() (bnc#1012382). - X.509: fix buffer overflow detection in sprint_oid() (bsc#1075078). - X.509: reject invalid BIT STRING for subjectPublicKey (bnc#1012382). - x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984). - x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984). - x86/alternatives: Add missing '\n' at end of ALTERNATIVE inline asm (bnc#1012382). - x86/alternatives: Fix optimize_nops() checking (bnc#1012382). - x86/apic/vector: Fix off by one in error path (bnc#1012382). - x86/asm/32: Make sync_core() handle missing CPUID on all 32-bit kernels (bnc#1012382). - x86/boot: Fix early command-line parsing when matching at end (bsc#1068032). - x86/cpu: Factor out application of forced CPU caps (bnc#1012382). - x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382). - x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382). - x86/cpufeatures: Make CPU bugs sticky (bnc#1012382). - x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382). - x86/cpu: Merge bugs.c and bugs_64.c (bnc#1012382). - x86/cpu, x86/pti: Do not enable PTI on AMD processors (bnc#1012382). - x86/Documentation: Add PTI description (bnc#1012382). - x86/entry: Use SYSCALL_DEFINE() macros for sys_modify_ldt() (bnc#1012382). - x86/hpet: Prevent might sleep splat on resume (bnc#1012382). - x86/kasan: Clear kasan_zero_page after TLB flush (bnc#1012382). - x86/kasan: Write protect kasan zero shadow (bnc#1012382). - x86/microcode/intel: Extend BDW late-loading further with LLC size check (bnc#1012382). - x86/microcode/intel: Extend BDW late-loading with a revision check (bnc#1012382). - x86/microcode/intel: Fix BDW late-loading revision check (bnc#1012382). - x86/mm/32: Move setup_clear_cpu_cap(X86_FEATURE_PCID) earlier (git-fixes). - x86/mm: Disable pciD on 32-bit kernels (bnc#1012382). - x86/PCI: Make broadcom_postcore_init() check acpi_disabled (bnc#1012382). - x86/pti: Document fix wrong index (bnc#1012382). - x86/pti/efi: broken conversion from efi to kernel page table (bnc#1012382). - x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382). - x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032). - x86/smpboot: Remove stale TLB flush invocations (bnc#1012382). - x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091). - x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091). - x86/tlb: Drop the _GPL from the cpu_tlbstate export (bnc#1012382). - x86/vm86/32: Switch to flush_tlb_mm_range() in mark_screen_rdonly() (bnc#1012382). - xen-netfront: avoid crashing on resume after a failure in talk_to_netback() (bnc#1012382). - xen-netfront: Improve error handling during initialization (bnc#1012382). - xfrm: Copy policy family in clone_policy (bnc#1012382). - xfs: add configurable error support to metadata buffers (bsc#1068569). - xfs: add configuration handlers for specific errors (bsc#1068569). - xfs: add configuration of error failure speed (bsc#1068569). - xfs: add 'fail at unmount' error handling configuration (bsc#1068569). - xfs: Add infrastructure needed for error propagation during buffer IO failure (bsc#1068569). - xfs: address kabi for xfs buffer retry infrastructure (kabi). - xfs: configurable error behavior via sysfs (bsc#1068569). - xfs: fix incorrect extent state in xfs_bmap_add_extent_unwritten_real (bnc#1012382). - xfs: fix log block underflow during recovery cycle verification (bnc#1012382). - xfs: fix up inode32/64 (re)mount handling (bsc#1069160). - xfs: introduce metadata IO error class (bsc#1068569). - xfs: introduce table-based init for error behaviors (bsc#1068569). - xfs: Properly retry failed inode items in case of error during buffer writeback (bsc#1068569). - xfs: remove xfs_trans_ail_delete_bulk (bsc#1068569). - xhci: Do not add a virt_dev to the devs array before it's fully allocated (bnc#1012382). - xhci: Fix ring leak in failure path of xhci_alloc_virt_device() (bnc#1012382). - xhci: plat: Register shutdown for xhci_plat (bnc#1012382). - zram: set physical queue limits to avoid array out of bounds accesses (bnc#1012382).
Patchnames: SUSE-SLE-RT-12-SP2-2018-327
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
https://www.suse.com/support/security/rating/ external
https://ftp.suse.com/pub/projects/security/csaf/s… self
https://www.suse.com/support/update/announcement/… self
https://lists.suse.com/pipermail/sle-security-upd… self
https://bugzilla.suse.com/1012382 self
https://bugzilla.suse.com/1019784 self
https://bugzilla.suse.com/1031717 self
https://bugzilla.suse.com/1036737 self
https://bugzilla.suse.com/1038078 self
https://bugzilla.suse.com/1038085 self
https://bugzilla.suse.com/1043652 self
https://bugzilla.suse.com/1048585 self
https://bugzilla.suse.com/1052360 self
https://bugzilla.suse.com/1060279 self
https://bugzilla.suse.com/1066223 self
https://bugzilla.suse.com/1066842 self
https://bugzilla.suse.com/1068032 self
https://bugzilla.suse.com/1068038 self
https://bugzilla.suse.com/1068569 self
https://bugzilla.suse.com/1068984 self
https://bugzilla.suse.com/1069160 self
https://bugzilla.suse.com/1070799 self
https://bugzilla.suse.com/1072163 self
https://bugzilla.suse.com/1072484 self
https://bugzilla.suse.com/1072589 self
https://bugzilla.suse.com/1073229 self
https://bugzilla.suse.com/1073230 self
https://bugzilla.suse.com/1073928 self
https://bugzilla.suse.com/1074134 self
https://bugzilla.suse.com/1074488 self
https://bugzilla.suse.com/1074621 self
https://bugzilla.suse.com/1074709 self
https://bugzilla.suse.com/1074839 self
https://bugzilla.suse.com/1074847 self
https://bugzilla.suse.com/1075066 self
https://bugzilla.suse.com/1075078 self
https://bugzilla.suse.com/1075087 self
https://bugzilla.suse.com/1075091 self
https://bugzilla.suse.com/1075428 self
https://bugzilla.suse.com/1075617 self
https://bugzilla.suse.com/1075621 self
https://bugzilla.suse.com/1075627 self
https://bugzilla.suse.com/1075994 self
https://bugzilla.suse.com/1076017 self
https://bugzilla.suse.com/1076110 self
https://bugzilla.suse.com/1076806 self
https://bugzilla.suse.com/1076809 self
https://bugzilla.suse.com/1076872 self
https://bugzilla.suse.com/1076899 self
https://bugzilla.suse.com/1077068 self
https://bugzilla.suse.com/1077560 self
https://bugzilla.suse.com/1077592 self
https://bugzilla.suse.com/1077871 self
https://bugzilla.suse.com/1078526 self
https://bugzilla.suse.com/1078681 self
https://bugzilla.suse.com/963844 self
https://bugzilla.suse.com/988524 self
https://www.suse.com/security/cve/CVE-2017-15129/ self
https://www.suse.com/security/cve/CVE-2017-17712/ self
https://www.suse.com/security/cve/CVE-2017-17862/ self
https://www.suse.com/security/cve/CVE-2017-17864/ self
https://www.suse.com/security/cve/CVE-2017-18017/ self
https://www.suse.com/security/cve/CVE-2017-5715/ self
https://www.suse.com/security/cve/CVE-2018-1000004/ self
https://www.suse.com/security/cve/CVE-2018-5332/ self
https://www.suse.com/security/cve/CVE-2018-5333/ self
https://www.suse.com/security/cve/CVE-2017-15129 external
https://bugzilla.suse.com/1074839 external
https://www.suse.com/security/cve/CVE-2017-17712 external
https://bugzilla.suse.com/1073229 external
https://bugzilla.suse.com/1073230 external
https://www.suse.com/security/cve/CVE-2017-17862 external
https://bugzilla.suse.com/1073928 external
https://www.suse.com/security/cve/CVE-2017-17864 external
https://bugzilla.suse.com/1073928 external
https://www.suse.com/security/cve/CVE-2017-18017 external
https://bugzilla.suse.com/1074488 external
https://bugzilla.suse.com/1080255 external
https://bugzilla.suse.com/1091815 external
https://bugzilla.suse.com/1115893 external
https://bugzilla.suse.com/971126 external
https://www.suse.com/security/cve/CVE-2017-5715 external
https://bugzilla.suse.com/1068032 external
https://bugzilla.suse.com/1074562 external
https://bugzilla.suse.com/1074578 external
https://bugzilla.suse.com/1074701 external
https://bugzilla.suse.com/1074741 external
https://bugzilla.suse.com/1074919 external
https://bugzilla.suse.com/1075006 external
https://bugzilla.suse.com/1075007 external
https://bugzilla.suse.com/1075262 external
https://bugzilla.suse.com/1075419 external
https://bugzilla.suse.com/1076115 external
https://bugzilla.suse.com/1076372 external
https://bugzilla.suse.com/1076606 external
https://bugzilla.suse.com/1078353 external
https://bugzilla.suse.com/1080039 external
https://bugzilla.suse.com/1087887 external
https://bugzilla.suse.com/1087939 external
https://bugzilla.suse.com/1088147 external
https://bugzilla.suse.com/1089055 external
https://bugzilla.suse.com/1091815 external
https://bugzilla.suse.com/1095735 external
https://bugzilla.suse.com/1102517 external
https://bugzilla.suse.com/1105108 external
https://bugzilla.suse.com/1126516 external
https://bugzilla.suse.com/1173489 external
https://bugzilla.suse.com/1178658 external
https://bugzilla.suse.com/1201457 external
https://bugzilla.suse.com/1201877 external
https://bugzilla.suse.com/1203236 external
https://www.suse.com/security/cve/CVE-2018-1000004 external
https://bugzilla.suse.com/1076017 external
https://bugzilla.suse.com/1091815 external
https://www.suse.com/security/cve/CVE-2018-5332 external
https://bugzilla.suse.com/1075621 external
https://bugzilla.suse.com/1091815 external
https://bugzilla.suse.com/1115893 external
https://www.suse.com/security/cve/CVE-2018-5333 external
https://bugzilla.suse.com/1075617 external
https://bugzilla.suse.com/1091815 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\n\nThe SUSE Linux Enterprise 12 SP2 Realtime kernel was updated to 4.4.114 to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).\n\n  The previous fix using CPU Microcode has been complemented by building the Linux Kernel with return trampolines aka \u0027retpolines\u0027.\n\n- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in net/rds/rdma.c mishandled cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference (bnc#1075617).\n- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function did not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c) (bnc#1075621).\n- CVE-2017-17862: kernel/bpf/verifier.c in the Linux kernel ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service (bnc#1073928).\n- CVE-2017-17864: kernel/bpf/verifier.c in the Linux kernel mishandled states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allowed local users to obtain potentially sensitive address information, aka a \u0027pointer leak (bnc#1073928).\n- CVE-2017-17712: The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel has a race condition in inet-\u003ehdrincl that leads to uninitialized stack pointer usage; this allowed a local user to execute code and gain privileges (bnc#1073229 1073230).\n- CVE-2017-15129: A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel The function get_net_ns_by_id() in net/core/net_namespace.c did not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely (bnc#1074839).\n- CVE-2017-18017: The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action (bnc#1074488).\n- CVE-2018-1000004: In the Linux kernel a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition (bnc#1076017).\n\nThe following non-security bugs were fixed:\n\n- 509: fix printing uninitialized stack memory when OID is empty (bsc#1075078).\n- 8021q: fix a memory leak for VLAN 0 device (bnc#1012382).\n- acpi / scan: Prefer devices without _HID/_CID for _ADR matching (bnc#1012382).\n- af_key: fix buffer overread in parse_exthdrs() (bnc#1012382).\n- af_key: fix buffer overread in verify_address_len() (bnc#1012382).\n- afs: Adjust mode bits processing (bnc#1012382).\n- afs: Connect up the CB.ProbeUuid (bnc#1012382).\n- afs: Fix afs_kill_pages() (bnc#1012382).\n- afs: Fix missing put_page() (bnc#1012382).\n- afs: Fix page leak in afs_write_begin() (bnc#1012382).\n- afs: Fix the maths in afs_fs_store_data() (bnc#1012382).\n- afs: Flush outstanding writes when an fd is closed (bnc#1012382).\n- afs: Migrate vlocation fields to 64-bit (bnc#1012382).\n- afs: Populate and use client modification time (bnc#1012382).\n- afs: Populate group ID from vnode status (bnc#1012382).\n- afs: Prevent callback expiry timer overflow (bnc#1012382).\n- alpha: fix build failures (bnc#1012382).\n- alsa: aloop: Fix inconsistent format due to incomplete rule (bsc#1031717).\n- alsa: aloop: Fix racy hw constraints adjustment (bsc#1031717).\n- alsa: aloop: Release cable upon open error path (bsc#1031717).\n- alsa: hda - Apply headphone noise quirk for another Dell XPS 13 variant (bsc#1031717).\n- alsa: hda - Apply the existing quirk to iMac 14,1 (bsc#1031717).\n- alsa: pcm: Abort properly at pending signal in OSS read/write loops (bsc#1031717).\n- alsa: pcm: Add missing error checks in OSS emulation plugin builder (bsc#1031717).\n- alsa: pcm: Allow aborting mutex lock at OSS read/write loops (bsc#1031717).\n- alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1031717).\n- alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1031717).\n- arc: uaccess: dont use \u0027l\u0027 gcc inline asm constraint modifier (bnc#1012382).\n- arm64: Add hypervisor safe helper for checking constant capabilities (bsc#1068032).\n- arm64: Add macros to read/write system registers (bsc#1068032).\n- arm64: add macro to extract ESR_ELx.EC (bsc#1068032).\n- arm64: Add skeleton to harden the branch predictor against aliasing attacks (bsc#1068032).\n- arm64: Add trace_hardirqs_off annotation in ret_to_user (bsc#1068032).\n- arm64: alternative: add auto-nop infrastructure (bsc#1068032).\n- arm64: barriers: introduce nops and __nops macros for NOP sequences (bsc#1068032).\n- arm64: cpu_errata: Allow an erratum to be match for all revisions of a core (bsc#1068032).\n- arm64: cpufeature: Add scope for capability check (bsc#1068032).\n- arm64/cpufeature: do not use mutex in bringup path (bsc#1068032).\n- arm64: cpufeature: Pass capability structure to -\u003eenable callback (bsc#1068032).\n- arm64: debug: remove unused local_dbg_{enable, disable} macros (bsc#1068032).\n- arm64: Disable kpti for non broadcast TLB HW (bsc#1068032).\n- arm64: Disable TTBR0_EL1 during normal kernel execution (bsc#1068032).\n- arm64: do not pull uaccess.h into *.S (bsc#1068032).\n- arm64: Enable CONFIG_ARM64_SW_TTBR0_PAN (bsc#1068032).\n- arm64: entry: Add exception trampoline page for exceptions from EL0 (bsc#1068032).\n- arm64: entry: Add fake CPU feature for unmapping the kernel at EL0 (bsc#1068032).\n- arm64: entry: Explicitly pass exception level to kernel_ventry macro (bsc#1068032).\n- arm64: entry: Hook up entry trampoline to exception vectors (bsc#1068032).\n- arm64: entry: remove pointless SPSR mode check (bsc#1068032).\n- arm64: entry.S convert el0_sync (bsc#1068032).\n- arm64: entry.S: convert el1_sync (bsc#1068032).\n- arm64: entry.S: convert elX_irq (bsc#1068032).\n- arm64: entry.S: move SError handling into a C function for future expansion (bsc#1068032).\n- arm64: entry.S: Remove disable_dbg (bsc#1068032).\n- arm64: explicitly mask all exceptions (bsc#1068032).\n- arm64: factor out entry stack manipulation (bsc#1068032).\n- arm64: factor out PAGE_* and CONT_* definitions (bsc#1068032).\n- arm64: Factor out PAN enabling/disabling into separate uaccess_* macros (bsc#1068032).\n- arm64: Factor out TTBR0_EL1 post-update workaround into a specific asm macro (bsc#1068032).\n- arm64: factor work_pending state machine to C (bsc#1068032).\n- arm64: Fix circular include of asm/lse.h through linux/jump_label.h (bsc#1068032).\n- arm64: Fix compilation (bsc#1068032).\n- arm64: fpsimd: Prevent registers leaking from dead tasks (bnc#1012382).\n- arm64: Handle el1 synchronous instruction aborts cleanly (bsc#1068032).\n- arm64: head.S: get rid of x25 and x26 with \u0027global\u0027 scope (bsc#1068032).\n- arm64: Implement branch predictor hardening for affected Cortex-A CPUs (bsc#1068032).\n- arm64: Initialise high_memory global variable earlier (bnc#1012382).\n- arm64: introduce an order for exceptions (bsc#1068032).\n- arm64: introduce mov_q macro to move a constant into a 64-bit register (bsc#1068032).\n- arm64: Introduce uaccess_{disable,enable} functionality based on TTBR0_EL1 (bsc#1068032).\n- arm64: kaslr: Put kernel vectors address in separate data page (bsc#1068032).\n- arm64: Kconfig: Add CONFIG_UNMAP_KERNEL_AT_EL0 (bsc#1068032).\n- arm64: Kconfig: Reword UNMAP_KERNEL_AT_EL0 kconfig entry (bsc#1068032).\n- arm64: kill ESR_LNX_EXEC (bsc#1068032).\n- arm64: kpti: Fix the interaction between ASID switching and software PAN (bsc#1068032).\n- arm64: kvm: Fix SMCCC handling of unimplemented SMC/HVC calls (bnc#1012382).\n- arm64: kvm: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382).\n- arm64: kvm: Survive unknown traps from guests (bnc#1012382).\n- arm64: kvm: Use per-CPU vector when BP hardening is enabled (bsc#1068032).\n- arm64: Mask all exceptions during kernel_exit (bsc#1068032).\n- arm64: mm: Add arm64_kernel_unmapped_at_el0 helper (bsc#1068032).\n- arm64: mm: Allocate ASIDs in pairs (bsc#1068032).\n- arm64: mm: Fix and re-enable ARM64_SW_TTBR0_PAN (bsc#1068032).\n- arm64: mm: hardcode rodata=true (bsc#1068032).\n- arm64: mm: Introduce TTBR_ASID_MASK for getting at the ASID in the TTBR (bsc#1068032).\n- arm64: mm: Invalidate both kernel and user ASIDs when performing TLBI (bsc#1068032).\n- arm64: mm: Map entry trampoline into trampoline and kernel page tables (bsc#1068032).\n- arm64: mm: Move ASID from TTBR0 to TTBR1 (bsc#1068032).\n- arm64: mm: Rename post_ttbr0_update_workaround (bsc#1068032).\n- arm64: mm: Temporarily disable ARM64_SW_TTBR0_PAN (bsc#1068032).\n- arm64: mm: Use non-global mappings for kernel space (bsc#1068032).\n- arm64: Move BP hardening to check_and_switch_context (bsc#1068032).\n- arm64: Move post_ttbr_update_workaround to C code (bsc#1068032).\n- arm64: Move the async/fiq helpers to explicitly set process context flags (bsc#1068032).\n- arm64: Store struct thread_info in sp_el0 (bsc#1068032).\n- arm64: SW PAN: Point saved ttbr0 at the zero page when switching to init_mm (bsc#1068032).\n- arm64: SW PAN: Update saved ttbr0 value on enter_lazy_tlb (bsc#1068032).\n- arm64: swp emulation: bound LL/SC retries before rescheduling (bsc#1068032).\n- arm64: sysreg: allow write_sysreg to use XZR (bsc#1068032).\n- arm64: sysreg: Fix unprotected macro argmuent in write_sysreg (bsc#1068032).\n- arm64: Take into account ID_AA64PFR0_EL1.CSV3 (bsc#1068032).\n- arm64: tlbflush.h: add __tlbi() macro (bsc#1068032).\n- arm64: tls: Avoid unconditional zeroing of tpidrro_el0 for native tasks (bsc#1068032).\n- arm64: use alternative auto-nop (bsc#1068032).\n- arm64: use RET instruction for exiting the trampoline (bsc#1068032).\n- arm64: Use static keys for CPU features (bsc#1068032).\n- arm64: xen: Enable user access before a privcmd hvc call (bsc#1068032).\n- arm: avoid faulting on qemu (bnc#1012382).\n- arm: BUG if jumping to usermode address in kernel mode (bnc#1012382).\n- arm-ccn: perf: Prevent module unload while PMU is in use (bnc#1012382).\n- arm: dma-mapping: disallow dma_get_sgtable() for non-kernel managed memory (bnc#1012382).\n- arm: dts: am335x-evmsk: adjust mmc2 param to allow suspend (bnc#1012382).\n- arm: dts: kirkwood: fix pin-muxing of MPP7 on OpenBlocks A7 (bnc#1012382).\n- arm: dts: ti: fix pci bus dtc warnings (bnc#1012382).\n- arm: kprobes: Align stack to 8-bytes in test code (bnc#1012382).\n- arm: kprobes: Fix the return address of multiple kretprobes (bnc#1012382).\n- arm: kvm: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382).\n- arm: kvm: Survive unknown traps from guests (bnc#1012382).\n- arm: OMAP1: DMA: Correct the number of logical channels (bnc#1012382).\n- arm: OMAP2+: Fix device node reference counts (bnc#1012382).\n- arm: OMAP2+: gpmc-onenand: propagate error on initialization failure (bnc#1012382).\n- arm: OMAP2+: Release device node after it is no longer needed (bnc#1012382).\n- asm-prototypes: Clear any CPP defines before declaring the functions (git-fixes).\n- asn.1: check for error from ASN1_OP_END__ACT actions (bnc#1012382).\n- asn.1: fix out-of-bounds read when parsing indefinite length item (bnc#1012382).\n- ath9k: fix tx99 potential info leak (bnc#1012382).\n- atm: horizon: Fix irq release error (bnc#1012382).\n- audit: ensure that \u0027audit=1\u0027 actually enables audit for PID 1 (bnc#1012382).\n- axonram: Fix gendisk handling (bnc#1012382).\n- backlight: pwm_bl: Fix overflow condition (bnc#1012382).\n- bcache: add a comment in journal bucket reading (bsc#1076110).\n- bcache: Avoid nested function definition (bsc#1076110).\n- bcache: check return value of register_shrinker (bsc#1076110).\n- bcache: debug: avoid accessing .bi_io_vec directly (bsc#1076110).\n- bcache: documentation formatting, edited for clarity, stripe alignment notes (bsc#1076110).\n- bcache: documentation updates and corrections (bsc#1076110).\n- bcache: Do not reinvent the wheel but use existing llist API (bsc#1076110).\n- bcache: do not write back data if reading it failed (bsc#1076110).\n- bcache: explicitly destroy mutex while exiting (bnc#1012382).\n- bcache: fix a comments typo in bch_alloc_sectors() (bsc#1076110).\n- bcache: fix sequential large write IO bypass (bsc#1076110).\n- bcache: fix wrong cache_misses statistics (bnc#1012382).\n- bcache: gc does not work when triggering by manual command (bsc#1076110, bsc#1038078).\n- bcache: implement PI controller for writeback rate (bsc#1076110).\n- bcache: increase the number of open buckets (bsc#1076110).\n- bcache: only permit to recovery read error when cache device is clean (bnc#1012382 bsc#1043652).\n- bcache: partition support: add 16 minors per bcacheN device (bsc#1076110).\n- bcache: pr_err: more meaningful error message when nr_stripes is invalid (bsc#1076110).\n- bcache: rearrange writeback main thread ratelimit (bsc#1076110).\n- bcache: recover data from backing when data is clean (bnc#1012382 bsc#1043652).\n- bcache: register_bcache(): call blkdev_put() when cache_alloc() fails (bsc#1076110).\n- bcache: Remove deprecated create_workqueue (bsc#1076110).\n- bcache: Remove redundant block_size assignment (bsc#1076110).\n- bcache: Remove redundant parameter for cache_alloc() (bsc#1076110).\n- bcache: Remove redundant set_capacity (bsc#1076110).\n- bcache: remove unused parameter (bsc#1076110).\n- bcache: rewrite multiple partitions support (bsc#1076110, bsc#1038085, bsc#1019784).\n- bcache: safeguard a dangerous addressing in closure_queue (bsc#1076110).\n- bcache: silence static checker warning (bsc#1076110).\n- bcache: smooth writeback rate control (bsc#1076110).\n- bcache: switch to using blk_queue_write_cache() (bsc#1076110).\n- bcache.txt: standardize document format (bsc#1076110).\n- bcache: update bio-\u003ebi_opf bypass/writeback REQ_ flag hints (bsc#1076110).\n- bcache: update bucket_in_use in real time (bsc#1076110).\n- bcache: Update continue_at() documentation (bsc#1076110).\n- bcache: update document info (bsc#1076110).\n- bcache: use kmalloc to allocate bio in bch_data_verify() (bsc#1076110).\n- bcache: use llist_for_each_entry_safe() in __closure_wake_up() (bsc#1076110).\n- bcache: writeback rate clamping: make 32 bit safe (bsc#1076110).\n- bcache: writeback rate shouldn\u0027t artifically clamp (bsc#1076110).\n- be2net: restore properly promisc mode after queues reconfiguration (bsc#963844 FATE#320192).\n- block: export bio_free_pages to other modules (bsc#1076110).\n- block: wake up all tasks blocked in get_request() (bnc#1012382).\n- bluetooth: btusb: driver to enable the usb-wakeup feature (bnc#1012382).\n- bnx2x: do not rollback VF MAC/VLAN filters we did not configure (bnc#1012382).\n- bnx2x: fix possible overrun of VFPF multicast addresses array (bnc#1012382).\n- bnx2x: prevent crash when accessing PTP with interface down (bnc#1012382).\n- btrfs: account for pinned bytes in should_alloc_chunk (bsc#1066842).\n- btrfs: add missing memset while reading compressed inline extents (bnc#1012382).\n- can: af_can: canfd_rcv(): replace WARN_ONCE by pr_warn_once (bnc#1012382).\n- can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once (bnc#1012382).\n- can: ems_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382).\n- can: esd_usb2: cancel urb on -EPIPE and -EPROTO (bnc#1012382).\n- can: gs_usb: fix return value of the \u0027set_bittiming\u0027 callback (bnc#1012382).\n- can: kvaser_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382).\n- can: kvaser_usb: Fix comparison bug in kvaser_usb_read_bulk_callback() (bnc#1012382).\n- can: kvaser_usb: free buf in error paths (bnc#1012382).\n- can: kvaser_usb: ratelimit errors if incomplete messages are received (bnc#1012382).\n- can: peak: fix potential bug in packet fragmentation (bnc#1012382).\n- can: ti_hecc: Fix napi poll return value for repoll (bnc#1012382).\n- can: usb_8dev: cancel urb on -EPIPE and -EPROTO (bnc#1012382).\n- cdc-acm: apply quirk for card reader (bsc#1060279).\n- cdrom: factor out common open_for_* code (bsc#1048585).\n- cdrom: wait for tray to close (bsc#1048585).\n- ceph: drop negative child dentries before try pruning inode\u0027s alias (bnc#1012382).\n- ceph: more accurate statfs (bsc#1077068).\n- clk: imx6: refine hdmi_isfr\u0027s parent to make HDMI work on i.MX6 SoCs w/o VPU (bnc#1012382).\n- clk: mediatek: add the option for determining PLL source clock (bnc#1012382).\n- clk: tegra: Fix cclk_lp divisor register (bnc#1012382).\n- cpuidle: fix broadcast control when broadcast can not be entered (bnc#1012382).\n- cpuidle: powernv: Pass correct drv-\u003ecpumask for registration (bnc#1012382).\n- cpuidle: Validate cpu_dev in cpuidle_add_sysfs() (bnc#1012382).\n- crypto: algapi - fix NULL dereference in crypto_remove_spawns() (bnc#1012382).\n- crypto: chacha20poly1305 - validate the digest size (bnc#1012382).\n- crypto: crypto4xx - increase context and scatter ring buffer elements (bnc#1012382).\n- crypto: deadlock between crypto_alg_sem/rtnl_mutex/genl_mutex (bnc#1012382).\n- crypto: mcryptd - protect the per-CPU queue with a lock (bnc#1012382).\n- crypto: n2 - cure use after free (bnc#1012382).\n- crypto: pcrypt - fix freeing pcrypt instances (bnc#1012382).\n- crypto: s5p-sss - Fix completing crypto request in IRQ handler (bnc#1012382).\n- crypto: tcrypt - fix buffer lengths in test_aead_speed() (bnc#1012382).\n- cxl: Check if vphb exists before iterating over AFU devices (bsc#1066223).\n- dax: Pass detailed error code from __dax_fault() (bsc#1072484).\n- dccp: do not restart ccid2_hc_tx_rto_expire() if sk in closed state (bnc#1012382).\n- delay: add poll_event_interruptible (bsc#1048585).\n- dmaengine: dmatest: move callback wait queue to thread context (bnc#1012382).\n- dmaengine: Fix array index out of bounds warning in __get_unmap_pool() (bnc#1012382).\n- dmaengine: pl330: fix double lock (bnc#1012382).\n- dmaengine: ti-dma-crossbar: Correct am335x/am43xx mux value type (bnc#1012382).\n- dm btree: fix serious bug in btree_split_beneath() (bnc#1012382).\n- dm bufio: fix shrinker scans when (nr_to_scan \u003c retain_target) (bnc#1012382).\n- dm thin metadata: THIN_MAX_CONCURRENT_LOCKS should be 6 (bnc#1012382).\n- drivers: base: cacheinfo: fix boot error message when acpi is enabled (bnc#1012382).\n- drivers: base: cacheinfo: fix x86 with CONFIG_OF enabled (bnc#1012382).\n- drivers/firmware: Expose psci_get_version through psci_ops structure (bsc#1068032).\n- drivers/md/bcache/util.h: remove duplicate inclusion of blkdev.h (bsc#1076110).\n- drivers: net: xgene: Fix hardware checksum setting (bsc#1078526).\n- drm/amd/amdgpu: fix console deadlock if late init failed (bnc#1012382).\n- drm: extra printk() wrapper macros (bnc#1012382).\n- drm/exynos/decon5433: set STANDALONE_UPDATE_F on output enablement (bnc#1012382).\n- drm/exynos: gem: Drop NONCONTIG flag for buffers allocated without IOMMU (bnc#1012382).\n- drm/omap: fix dmabuf mmap for dma_alloc\u0027ed buffers (bnc#1012382).\n- drm/radeon: reinstate oland workaround for sclk (bnc#1012382).\n- drm/radeon/si: add dpm quirk for Oland (bnc#1012382).\n- drm/vmwgfx: Potential off by one in vmw_view_add() (bnc#1012382).\n- dynamic-debug-howto: fix optional/omitted ending line number to be LARGE instead of 0 (bnc#1012382).\n- edac, i5000, i5400: Fix definition of NRECMEMB register (bnc#1012382).\n- edac, i5000, i5400: Fix use of MTR_DRAM_WIDTH macro (bnc#1012382).\n- edac, sb_edac: Fix missing break in switch (bnc#1012382).\n- efi/esrt: Cleanup bad memory map log messages (bnc#1012382).\n- efi: Move some sysfs files to be read-only by root (bnc#1012382).\n- eventpoll.h: add missing epoll event masks (bnc#1012382).\n- ext4: fix crash when a directory\u0027s i_size is too small (bnc#1012382).\n- ext4: Fix ENOSPC handling in DAX page fault handle (bsc#1072484).\n- ext4: fix fdatasync(2) after fallocate(2) operation (bnc#1012382).\n- fbdev: controlfb: Add missing modes to fix out of bounds access (bnc#1012382).\n- Fix build error in vma.c (bnc#1012382).\n- fjes: Fix wrong netdevice feature flags (bnc#1012382).\n- flow_dissector: properly cap thoff field (bnc#1012382).\n- fm10k: ensure we process SM mbx when processing VF mbx (bnc#1012382).\n- fork: clear thread stack upon allocation (bsc#1077560). Conflicts: \tseries.conf\n- fscache: Fix the default for fscache_maybe_release_page() (bnc#1012382).\n- futex: Prevent overflow by strengthen input validation (bnc#1012382).\n- gcov: disable for COMPILE_TEST (bnc#1012382).\n- gfs2: Take inode off order_write list when setting jdata flag (bnc#1012382).\n- gpio: altera: Use handle_level_irq when configured as a level_high (bnc#1012382).\n- hid: chicony: Add support for another ASUS Zen AiO keyboard (bnc#1012382).\n- hid: xinmo: fix for out of range for THT 2P arcade controller (bnc#1012382).\n- hrtimer: Reset hrtimer cpu base proper on CPU hotplug (bnc#1012382).\n- hv: kvp: Avoid reading past allocated blocks from KVP file (bnc#1012382).\n- hwmon: (asus_atk0110) fix uninitialized data access (bnc#1012382).\n- i40e: Do not enable NAPI on q_vectors that have no rings (bnc#1012382).\n- ib/hfi1: Correct defered count after processing qp_wait_list (git-fixes).\n- ib/hfi1: Fix rnr_timer addition (git-fixes).\n- ib/hfi1: Handle kzalloc failure in init_pervl_scs (git-fixes).\n- ib/hfi1: Move iowait_init() to priv allocate (git-fixes).\n- ib/hfi1: Prevent kernel QP post send hard lockups (git-fixes).\n- ib/hfi1: Reset QSFP on every run through channel tuning (git-fixes).\n- ib/ipoib: Fix lockdep issue found on ipoib_ib_dev_heavy_flush (git-fixes).\n- ib/ipoib: Grab rtnl lock on heavy flush when calling ndo_open/stop (bnc#1012382).\n- ib/mlx4: Increase maximal message size under UD QP (bnc#1012382).\n- ib/mlx5: Assign send CQ and recv CQ of UMR QP (bnc#1012382).\n- ibmvnic: Allocate and request vpd in init_resources (bsc#1076872).\n- ibmvnic: Do not handle RX interrupts when not up (bsc#1075066).\n- ibmvnic: Fix IP offload control buffer (bsc#1076899).\n- ibmvnic: Fix IPv6 packet descriptors (bsc#1076899).\n- ibmvnic: Fix pending MAC address changes (bsc#1075627).\n- ibmvnic: Modify buffer size and number of queues on failover (bsc#1076872).\n- ibmvnic: Revert to previous mtu when unsupported value requested (bsc#1076872).\n- ibmvnic: Wait for device response when changing MAC (bsc#1078681).\n- ib/qib: Remove qpt_mask global (git-fixes).\n- ib/rdmavt: restore IRQs on error path in rvt_create_ah() (git-fixes).\n- ib/srpt: Disable RDMA access by the initiator (bnc#1012382).\n- igb: check memory allocation failure (bnc#1012382).\n- ima: fix hash algorithm initialization (bnc#1012382).\n- inet: frag: release spinlock before calling icmp_send() (bnc#1012382).\n- input: 88pm860x-ts - fix child-node lookup (bnc#1012382).\n- input: elantech - add new icbody type 15 (bnc#1012382).\n- input: i8042 - add TUXEDO BU1406 (N24_25BU) to the nomux list (bnc#1012382).\n- input: trackpoint - force 3 buttons if 0 button is reported (bnc#1012382).\n- input: twl4030-vibra - fix sibling-node lookup (bnc#1012382).\n- input: twl6040-vibra - fix child-node lookup (bnc#1012382).\n- input: twl6040-vibra - fix DT node memory management (bnc#1012382).\n- intel_th: pci: Add Gemini Lake support (bnc#1012382).\n- iommu/arm-smmu-v3: Do not free page table ops twice (bnc#1012382).\n- iommu/vt-d: Fix scatterlist offset handling (bnc#1012382).\n- ip6_tunnel: disable dst caching if tunnel is dual-stack (bnc#1012382).\n- ipmi: Stop timers before cleaning up the module (bnc#1012382).\n- ipv4: Fix use-after-free when flushing FIB tables (bnc#1012382).\n- ipv4: igmp: guard against silly MTU values (bnc#1012382).\n- ipv4: Make neigh lookup keys for loopback/point-to-point devices be INADDR_ANY (bnc#1012382).\n- ipv6: Fix getsockopt() for sockets with default IPV6_AUTOFLOWLABEL (bnc#1012382).\n- ipv6: fix possible mem leaks in ipv6_make_skb() (bnc#1012382).\n- ipv6: fix udpv6 sendmsg crash caused by too small MTU (bnc#1012382).\n- ipv6: ip6_make_skb() needs to clear cork.base.dst (git-fixes).\n- ipv6: mcast: better catch silly mtu values (bnc#1012382).\n- ipv6: reorder icmpv6_init() and ip6_mr_init() (bnc#1012382).\n- ipvlan: fix ipv6 outbound device (bnc#1012382).\n- ipvlan: remove excessive packet scrubbing (bsc#1070799).\n- irda: vlsi_ir: fix check for DMA mapping errors (bnc#1012382).\n- irqchip/crossbar: Fix incorrect type of register size (bnc#1012382).\n- iscsi-target: fix memory leak in lio_target_tiqn_addtpg() (bnc#1012382).\n- iscsi-target: Make TASK_REASSIGN use proper se_cmd-\u003ecmd_kref (bnc#1012382).\n- isdn: kcapi: avoid uninitialized data (bnc#1012382).\n- iw_cxgb4: Only validate the MSN for successful completions (bnc#1012382).\n- ixgbe: fix use of uninitialized padding (bnc#1012382).\n- jump_label: Invoke jump_label_test() via early_initcall() (bnc#1012382).\n- jump_label: Make it possible for arches to invoke jump_label_init() earlier (bsc#1068032).\n- jump_labels: Allow array initialisers (bsc#1068032).\n- Kabi: Keep KVM stable after enable s390 wire up bpb feature (bsc#1076806).\n- kABI: protect struct bpf_map (kabi).\n- kABI: protect struct ipv6_pinfo (kabi).\n- kABI: protect struct t10_alua_tg_pt_gp (kabi).\n- kABI: protect struct usbip_device (kabi).\n- kabi/severities: do not care about stuff_RSB\n- kaiser: Set _PAGE_NX only if supported (bnc#1012382).\n- kaiser: Set _PAGE_NX only if supported (bnc#1012382).\n- kbuild: add \u0027-fno-stack-check\u0027 to kernel build options (bnc#1012382).\n- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).\n- kbuild: pkg: use --transform option to prefix paths in tar (bnc#1012382).\n- kdb: Fix handling of kallsyms_symbol_next() return value (bnc#1012382).\n- kernel/acct.c: fix the acct-\u003eneedcheck check in check_free_space() (bnc#1012382).\n- kernel: make groups_sort calling a responsibility group_info allocators (bnc#1012382).\n- kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from !sig_kernel_only() signals (bnc#1012382).\n- kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL (bnc#1012382).\n- kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in complete_signal() (bnc#1012382).\n- keys: add missing permission check for request_key() destination (bnc#1012382).\n- kprobes/x86: Disable preemption in ftrace-based jprobes (bnc#1012382).\n- kpti: Rename to PAGE_TABLE_ISOLATION (bnc#1012382).\n- kpti: Report when enabled (bnc#1012382).\n- kvm: arm/arm64: Fix occasional warning from the timer work function (bnc#1012382 bsc#988524).\n- kvm: Fix stack-out-of-bounds read in write_mmio (bnc#1012382).\n- kvm: nVMX: reset nested_run_pending if the vCPU is going to be reset (bnc#1012382).\n- kvm: nVMX: VMCLEAR should not cause the vCPU to shut down (bnc#1012382).\n- kvm: pci-assign: do not map smm memory slot pages in vt-d page tables (bnc#1012382).\n- kvm: s390: Enable all facility bits that are known good for passthrough (bsc#1076806).\n- kvm: s390: wire up bpb feature (bsc#1076806).\n- kvm: VMX: Fix enable VPID conditions (bnc#1012382).\n- kvm: VMX: remove I/O port 0x80 bypass on Intel hosts (bnc#1012382).\n- kvm: vmx: Scrub hardware GPRs at VM-exit (bnc#1012382).\n- kvm: x86: Add memory barrier on vmcs field lookup (bnc#1012382).\n- kvm: x86: correct async page present tracepoint (bnc#1012382).\n- kvm: X86: Fix load RFLAGS w/o the fixed bit (bnc#1012382).\n- kvm: x86: fix RSM when pciD is non-zero (bnc#1012382).\n- l2tp: cleanup l2tp_tunnel_delete calls (bnc#1012382).\n- lan78xx: Fix failure in USB Full Speed (bnc#1012382).\n- libata: apply MAX_SEC_1024 to all LITEON EP1 series devices (bnc#1012382).\n- libata: drop WARN from protocol error in ata_sff_qc_issue() (bnc#1012382).\n- lib/genalloc.c: make the avail variable an atomic_long_t (bnc#1012382).\n- macvlan: Only deliver one copy of the frame to the macvlan interface (bnc#1012382).\n- md-cluster: free md_cluster_info if node leave cluster (bnc#1012382).\n- media: dvb: i2c transfers over usb cannot be done from stack (bnc#1012382).\n- mfd: cros ec: spi: Do not send first message too soon (bnc#1012382).\n- mfd: twl4030-audio: Fix sibling-node lookup (bnc#1012382).\n- mfd: twl6040: Fix child-node lookup (bnc#1012382).\n- MIPS: Also verify sizeof `elf_fpreg_t\u0027 with PTRACE_SETREGSET (bnc#1012382).\n- MIPS: AR7: ensure the port type\u0027s FCR value is used (bnc#1012382).\n- MIPS: Consistently handle buffer counter with PTRACE_SETREGSET (bnc#1012382).\n- MIPS: Disallow outsized PTRACE_SETREGSET NT_PRFPREG regset accesses (bnc#1012382).\n- MIPS: Factor out NT_PRFPREG regset access helpers (bnc#1012382).\n- MIPS: Fix an FCSR access API regression with NT_PRFPREG and MSA (bnc#1012382).\n- MIPS: Guard against any partial write attempt with PTRACE_SETREGSET (bnc#1012382).\n- MIPS: math-emu: Fix final emulation phase for certain instructions (bnc#1012382).\n- MIPS: Validate PR_SET_FP_MODE prctl(2) requests against the ABI of the task (bnc#1012382).\n- mlxsw: reg: Fix SPVMLR max record count (bnc#1012382).\n- mlxsw: reg: Fix SPVM max record count (bnc#1012382).\n- mm: avoid returning VM_FAULT_RETRY from -\u003epage_mkwrite handlers (bnc#1012382).\n- mmc: mediatek: Fixed bug where clock frequency could be set wrong (bnc#1012382).\n- mm: drop unused pmdp_huge_get_and_clear_notify() (bnc#1012382).\n- mm: Handle 0 flags in _calc_vm_trans() macro (bnc#1012382).\n- mm: Introduce lm_alias (bsc#1068032).\n- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1012382).\n- mm/mprotect: add a cond_resched() inside change_pmd_range() (bnc#1077871).\n- mm/vmstat: Make NR_TLB_REMOTE_FLUSH_RECEIVED available even on UP (bnc#1012382).\n- module: set __jump_table alignment to 8 (bnc#1012382).\n- more bio_map_user_iov() leak fixes (bnc#1012382).\n- net: Allow neigh contructor functions ability to modify the primary_key (bnc#1012382).\n- net/appletalk: Fix kernel memory disclosure (bnc#1012382).\n- net: bcmgenet: correct MIB access of UniMAC RUNT counters (bnc#1012382).\n- net: bcmgenet: correct the RBUF_OVFL_CNT and RBUF_ERR_CNT MIB values (bnc#1012382).\n- net: bcmgenet: power down internal phy if open or resume fails (bnc#1012382).\n- net: bcmgenet: Power up the internal PHY before probing the MII (bnc#1012382).\n- net: bcmgenet: reserved phy revisions must be checked first (bnc#1012382).\n- net: bridge: fix early call to br_stp_change_bridge_id and plug newlink leaks (bnc#1012382).\n- net: core: fix module type in sock_diag_bind (bnc#1012382).\n- net: Do not allow negative values for busy_read and busy_poll sysctl interfaces (bnc#1012382).\n- net: fec: fix multicast filtering hardware setup (bnc#1012382).\n- netfilter: bridge: honor frag_max_size when refragmenting (bnc#1012382).\n- netfilter: do not track fragmented packets (bnc#1012382).\n- netfilter: ipvs: Fix inappropriate output of procfs (bnc#1012382).\n- netfilter: nfnetlink_queue: fix secctx memory leak (bnc#1012382).\n- netfilter: nfnetlink_queue: fix timestamp attribute (bsc#1074134).\n- netfilter: nfnl_cthelper: fix a race when walk the nf_ct_helper_hash table (bnc#1012382).\n- netfilter: nfnl_cthelper: Fix memory leak (bnc#1012382).\n- netfilter: nfnl_cthelper: fix runtime expectation policy updates (bnc#1012382).\n- net: Fix double free and memory corruption in get_net_ns_by_id() (bnc#1012382).\n- net: igmp: fix source address check for IGMPv3 reports (bnc#1012382).\n- net: igmp: Use correct source address on IGMPv3 reports (bnc#1012382).\n- net: initialize msg.msg_flags in recvfrom (bnc#1012382).\n- net: ipv4: fix for a race condition in raw_sendmsg (bnc#1012382).\n- net/mac80211/debugfs.c: prevent build failure with CONFIG_UBSAN=y (bnc#1012382).\n- net: mvmdio: disable/unprepare clocks in EPROBE_DEFER case (bnc#1012382).\n- net: mvneta: clear interface link status on port disable (bnc#1012382).\n- net/packet: fix a race in packet_bind() and packet_notifier() (bnc#1012382).\n- net: phy: at803x: Change error to EINVAL for invalid MAC (bnc#1012382).\n- net: phy: micrel: ksz9031: reconfigure autoneg after phy autoneg workaround (bnc#1012382).\n- net: qdisc_pkt_len_init() should be more robust (bnc#1012382).\n- net: qmi_wwan: add Sierra EM7565 1199:9091 (bnc#1012382).\n- net: qmi_wwan: Add USB IDs for MDM6600 modem on Motorola Droid 4 (bnc#1012382).\n- net: reevalulate autoflowlabel setting after sysctl setting (bnc#1012382).\n- net: Resend IGMP memberships upon peer notification (bnc#1012382).\n- net: sctp: fix array overrun read on sctp_timer_tbl (bnc#1012382).\n- net: stmmac: enable EEE in MII, GMII or RGMII only (bnc#1012382).\n- net: systemport: Pad packet before inserting TSB (bnc#1012382).\n- net: systemport: Utilize skb_put_padto() (bnc#1012382).\n- net: tcp: close sock if net namespace is exiting (bnc#1012382).\n- net: wimax/i2400m: fix NULL-deref at probe (bnc#1012382).\n- nfsd: auth: Fix gid sorting when rootsquash enabled (bnc#1012382).\n- nfsd: fix nfsd_minorversion(.., NFSD_AVAIL) (bnc#1012382).\n- nfsd: fix nfsd_reset_versions for NFSv4 (bnc#1012382).\n- nfs: Do not take a reference on fl-\u003efl_file for LOCK operation (bnc#1012382).\n- nfs: Fix a typo in nfs_rename() (bnc#1012382).\n- nfsv4.1 respect server\u0027s max size in CREATE_SESSION (bnc#1012382).\n- nfsv4: Fix client recovery when server reboots multiple times (bnc#1012382).\n- nohz: Prevent a timer interrupt storm in tick_nohz_stop_sched_tick() (bnc#1012382).\n- n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD) (bnc#1012382).\n- openrisc: fix issue handling 8 byte get_user calls (bnc#1012382).\n- packet: fix crash in fanout_demux_rollover() (bnc#1012382).\n- parisc: Fix alignment of pa_tlb_lock in assembly on 32-bit SMP kernel (bnc#1012382).\n- parisc: Hide Diva-built-in serial aux and graphics card (bnc#1012382).\n- partially revert tipc improve link resiliency when rps is activated (bsc#1068038).\n- pci/aer: Report non-fatal errors only to the affected endpoint (bnc#1012382).\n- pci: Avoid bus reset if bridge itself is broken (bnc#1012382).\n- pci: Create SR-IOV virtfn/physfn links before attaching driver (bnc#1012382).\n- pci: Detach driver before procfs \u0026 sysfs teardown on device remove (bnc#1012382).\n- pci/pme: Handle invalid data when reading Root Status (bnc#1012382).\n- pci / pm: Force devices to D0 in pci_pm_thaw_noirq() (bnc#1012382).\n- perf symbols: Fix symbols__fixup_end heuristic for corner cases (bnc#1012382).\n- perf test attr: Fix ignored test case result (bnc#1012382).\n- perf: xgene: Add APM X-Gene SoC Performance Monitoring Unit driver (bsc#1036737).\n- perf: xgene: Add support for SoC PMU version 3 (bsc#1076809).\n- perf: xgene: Include module.h (bsc#1076809).\n- perf: xgene: Move PMU leaf functions into function pointer structure (bsc#1076809).\n- perf: xgene: Parse PMU subnode from the match table (bsc#1076809).\n- perf: xgene: Remove unnecessary managed resources cleanup (bsc#1076809).\n- phy: work around \u0027phys\u0027 references to usb-nop-xceiv devices (bnc#1012382).\n- pinctrl: adi2: Fix Kconfig build problem (bnc#1012382).\n- pinctrl: st: add irq_request/release_resources callbacks (bnc#1012382).\n- pipe: avoid round_pipe_size() nr_pages overflow on 32-bit (bnc#1012382).\n- powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1075087).\n- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).\n- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).\n- powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1075087).\n- powerpc/64s: Add support for RFI flush of L1-D cache (bsc#1068032,  bsc#1075087).\n- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032, bsc#1075087).\n- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).\n- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075087).\n- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1075087).\n- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).\n- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1075087).\n- powerpc/ipic: Fix status get and status clear (bnc#1012382).\n- powerpc/perf: Dereference BHRB entries safely (bsc#1066223).\n- powerpc/perf/hv-24x7: Fix incorrect comparison in memord (bnc#1012382).\n- powerpc/powernv: Check device-tree for RFI flush settings (bsc#1068032,  bsc#1075087).\n- powerpc/powernv/cpufreq: Fix the frequency read by /proc/cpuinfo (bnc#1012382).\n- powerpc/powernv/ioda2: Gracefully fail if too many TCE levels requested (bnc#1012382).\n- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1075087).\n- powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032, bsc#1075087).\n- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032,  bsc#1075087).\n- powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075087).\n- powerpc/pseries: rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1068032, bsc#1075087).\n- powerpc/rfi-flush: prevent crash when changing flush type to fallback after system boot (bsc#1068032, bsc#1075087).\n- ppp: Destroy the mutex when cleanup (bnc#1012382).\n- pppoe: take -\u003eneeded_headroom of lower device into account on xmit (bnc#1012382).\n- pti: unbreak EFI (bsc#1074709).\n- r8152: fix the list rx_done may be used without initialization (bnc#1012382).\n- r8152: prevent the driver from transmitting packets with carrier off (bnc#1012382).\n- r8169: fix memory corruption on retrieval of hardware statistics (bnc#1012382).\n- raid5: Set R5_Expanded on parity devices as well as data (bnc#1012382).\n- ravb: Remove Rx overflow log messages (bnc#1012382).\n- rbd: set max_segments to USHRT_MAX (bnc#1012382).\n- rdma/cma: Avoid triggering undefined behavior (bnc#1012382).\n- rdma/iser: Fix possible mr leak on device removal event (bnc#1012382).\n- rds: Fix NULL pointer dereference in __rds_rdma_map (bnc#1012382).\n- rds: Heap OOB write in rds_message_alloc_sgs() (bnc#1012382).\n- rds: null pointer dereference in rds_atomic_free_op (bnc#1012382).\n- regulator: core: Rely on regulator_dev_release to free constraints (bsc#1074847).\n- regulator: da9063: Return an error code on probe failure (bsc#1074847).\n- regulator: pwm: Fix regulator ramp delay for continuous mode (bsc#1074847).\n- regulator: Try to resolve regulators supplies on registration (bsc#1074847).\n- Revert \u0027arm64: alternatives: add enable parameter to conditional asm macros\u0027 (bsc#1068032).\n- Revert \u0027Bluetooth: btusb: driver to enable the usb-wakeup feature\u0027 (bnc#1012382).\n- Revert \u0027drm/armada: Fix compile fail\u0027 (bnc#1012382).\n- Revert \u0027kaiser: vmstat show NR_KAISERTABLE as nr_overhead\u0027 (kabi).\n- Revert \u0027lib/genalloc.c: make the avail variable an atomic_long_t\u0027 (kabi).\n- Revert \u0027module: Add retpoline tag to VERMAGIC\u0027 (bnc#1012382 kabi).\n- Revert \u0027ocfs2: should wait dio before inode lock in ocfs2_setattr()\u0027 (bnc#1012382).\n- Revert \u0027s390/kbuild: enable modversions for symbols exported from asm\u0027 (bnc#1012382).\n- Revert \u0027sched/deadline: Use the revised wakeup rule for suspending constrained dl tasks\u0027 (kabi).\n- Revert \u0027scsi: libsas: align sata_device\u0027s rps_resp on a cacheline\u0027 (kabi).\n- Revert \u0027spi: SPI_FSL_DSPI should depend on HAS_DMA\u0027 (bnc#1012382).\n- Revert \u0027userfaultfd: selftest: vm: allow to build in vm/ directory\u0027 (bnc#1012382).\n- Revert \u0027x86/efi: Build our own page table structures\u0027 (bnc#1012382).\n- Revert \u0027x86/efi: Hoist page table switching code into efi_call_virt()\u0027 (bnc#1012382).\n- Revert \u0027x86/mm/pat: Ensure cpa-\u003epfn only contains page frame numbers\u0027 (bnc#1012382).\n- rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075087).\n- ring-buffer: Mask out the info bits when returning buffer page length (bnc#1012382).\n- route: also update fnhe_genid when updating a route cache (bnc#1012382).\n- route: update fnhe_expires for redirect when the fnhe exists (bnc#1012382).\n- rtc: cmos: Initialize hpet timer before irq is registered (bsc#1077592).\n- rtc: pcf8563: fix output clock rate (bnc#1012382).\n- rtc: pl031: make interrupt optional (bnc#1012382).\n- rtc: set the alarm to the next expiring timer (bnc#1012382).\n- s390: always save and restore all registers on context switch (bnc#1012382).\n- s390: fix compat system call table (bnc#1012382).\n- s390/pci: do not require AIS facility (bnc#1012382).\n- s390/qeth: no ETH header for outbound AF_IUCV (bnc#1012382).\n- s390/runtime instrumentation: simplify task exit handling (bnc#1012382).\n- sch_dsmark: fix invalid skb_cow() usage (bnc#1012382).\n- sched/deadline: Make sure the replenishment timer fires in the next period (bnc#1012382).\n- sched/deadline: Throttle a constrained deadline task activated after the deadline (bnc#1012382).\n- sched/deadline: Use deadline instead of period when calculating overflow (bnc#1012382).\n- sched/deadline: Use the revised wakeup rule for suspending constrained dl tasks (bnc#1012382).\n- sched/deadline: Zero out positive runtime after throttling constrained tasks (git-fixes).\n- scsi: bfa: integer overflow in debugfs (bnc#1012382).\n- scsi: check for device state in __scsi_remove_target() (bsc#1072589).\n- scsi: cxgb4i: fix Tx skb leak (bnc#1012382).\n- scsi: fixup kernel warning during rmmod() (bsc#1052360).\n- scsi: hpsa: cleanup sas_phy structures in sysfs when unloading (bnc#1012382).\n- scsi: hpsa: destroy sas transport properties before scsi_host (bnc#1012382).\n- scsi: libsas: align sata_device\u0027s rps_resp on a cacheline (bnc#1012382).\n- scsi: lpfc: Fix crash during Hardware error recovery on SLI3 adapters (bnc#1012382).\n- scsi: lpfc: Fix PT2PT PRLI reject (bnc#1012382).\n- scsi: lpfc: Fix secure firmware updates (bnc#1012382).\n- scsi: lpfc: PLOGI failures during NPIV testing (bnc#1012382).\n- scsi: mpt3sas: Fix IO error occurs on pulling out a drive from RAID1 volume created on two SATA drive (bnc#1012382).\n- scsi: sd: change allow_restart to bool in sysfs interface (bnc#1012382).\n- scsi: sd: change manage_start_stop to bool in sysfs interface (bnc#1012382).\n- scsi: sg: disable SET_FORCE_LOW_DMA (bnc#1012382).\n- scsi: sr: wait for the medium to become ready (bsc#1048585).\n- sctp: do not allow the v4 socket to bind a v4mapped v6 address (bnc#1012382).\n- sctp: do not free asoc when it is already dead in sctp_sendmsg (bnc#1012382).\n- sctp: Replace use of sockets_allocated with specified macro (bnc#1012382).\n- sctp: return error if the asoc has been peeled off in sctp_wait_for_sndbuf (bnc#1012382).\n- sctp: use the right sk after waking up from wait_buf sleep (bnc#1012382).\n- selftest/powerpc: Fix false failures for skipped tests (bnc#1012382).\n- selftests/x86: Add test_vsyscall (bnc#1012382).\n- selftests/x86/ldt_get: Add a few additional tests for limits (bnc#1012382).\n- serial: 8250_pci: Add Amazon pci serial device ID (bnc#1012382).\n- serial: 8250: Preserve DLD[7:4] for PORT_XR17V35X (bnc#1012382).\n- Set supported_modules_check 1 (bsc#1072163).\n- sfc: do not warn on successful change of MAC (bnc#1012382).\n- sh_eth: fix SH7757 GEther initialization (bnc#1012382).\n- sh_eth: fix TSU resource handling (bnc#1012382).\n- sit: update frag_off info (bnc#1012382).\n- sock: free skb in skb_complete_tx_timestamp on error (bnc#1012382).\n- sparc64/mm: set fields in deferred pages (bnc#1012382).\n- spi_ks8995: fix \u0027BUG: key accdaa28 not in .data!\u0027 (bnc#1012382).\n- spi: sh-msiof: Fix DMA transfer size check (bnc#1012382).\n- spi: xilinx: Detect stall with Unknown commands (bnc#1012382).\n- staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl (bnc#1012382).\n- sunrpc: Fix rpc_task_begin trace point (bnc#1012382).\n- sunxi-rsb: Include OF based modalias in device uevent (bnc#1012382).\n- sysfs/cpu: Add vulnerability folder (bnc#1012382).\n- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).\n- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).\n- sysrq : fix Show Regs call trace on ARM (bnc#1012382).\n- target: Avoid early CMD_T_PRE_EXECUTE failures during ABORT_TASK (bnc#1012382).\n- target/file: Do not return error for UNMAP if length is zero (bnc#1012382).\n- target: fix ALUA transition timeout handling (bnc#1012382).\n- target:fix condition return in core_pr_dump_initiator_port() (bnc#1012382).\n- target: fix race during implicit transition work flushes (bnc#1012382).\n- target/iscsi: Fix a race condition in iscsit_add_reject_from_cmd() (bnc#1012382).\n- target: Use system workqueue for ALUA transitions (bnc#1012382).\n- tcp: correct memory barrier usage in tcp_check_space() (bnc#1012382).\n- tcp: fix under-evaluated ssthresh in TCP Vegas (bnc#1012382).\n- tcp md5sig: Use skb\u0027s saddr when replying to an incoming segment (bnc#1012382).\n- tcp: __tcp_hdrlen() helper (bnc#1012382).\n- tg3: Fix rx hang on MTU change with 5717/5719 (bnc#1012382).\n- thermal/drivers/step_wise: Fix temperature regulation misbehavior (bnc#1012382).\n- thermal: hisilicon: Handle return value of clk_prepare_enable (bnc#1012382).\n- tipc: fix cleanup at module unload (bnc#1012382).\n- tipc: fix memory leak in tipc_accept_from_sock() (bnc#1012382).\n- tipc: improve link resiliency when rps is activated (bsc#1068038).\n- tracing: Allocate mask_str buffer dynamically (bnc#1012382).\n- tracing: Fix converting enum\u0027s from the map in trace_event_eval_update() (bnc#1012382).\n- tracing: Fix crash when it fails to alloc ring buffer (bnc#1012382).\n- tracing: Fix possible double free on failure of allocating trace buffer (bnc#1012382).\n- tracing: Remove extra zeroing out of the ring buffer page (bnc#1012382).\n- tty fix oops when rmmod 8250 (bnc#1012382).\n- uas: Always apply US_FL_NO_ATA_1X quirk to Seagate devices (bnc#1012382).\n- uas: ignore UAS for Norelsys NS1068(X) chips (bnc#1012382).\n- udf: Avoid overflow when session starts at large offset (bnc#1012382).\n- um: link vmlinux with -no-pie (bnc#1012382).\n- usb: Add device quirk for Logitech HD Pro Webcam C925e (bnc#1012382).\n- usb: add RESET_RESUME for ELSA MicroLink 56K (bnc#1012382).\n- USB: core: Add type-specific length check of BOS descriptors (bnc#1012382).\n- USB: core: prevent malicious bNumInterfaces overflow (bnc#1012382).\n- USB: devio: Prevent integer overflow in proc_do_submiturb() (bnc#1012382).\n- USB: Fix off by one in type-specific length check of BOS SSP capability (git-fixes).\n- USB: fix usbmon BUG trigger (bnc#1012382).\n- usb: gadget: configs: plug memory leak (bnc#1012382).\n- usb: gadget: ffs: Forbid usb_ep_alloc_request from sleeping (bnc#1012382).\n- USB: gadgetfs: Fix a potential memory leak in \u0027dev_config()\u0027 (bnc#1012382).\n- usb: gadget: f_uvc: Sanity check wMaxPacketSize for SuperSpeed (bnc#1012382).\n- usb: gadget: udc: remove pointer dereference after free (bnc#1012382).\n- usb: hub: Cycle HUB power when initialization fails (bnc#1012382).\n- USB: Increase usbfs transfer limit (bnc#1012382).\n- usbip: Fix implicit fallthrough warning (bnc#1012382).\n- usbip: Fix potential format overflow in userspace tools (bnc#1012382).\n- usbip: fix stub_rx: get_pipe() to validate endpoint number (bnc#1012382).\n- usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input (bnc#1012382).\n- usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer (bnc#1012382).\n- usbip: fix usbip bind writing random string after command in match_busid (bnc#1012382).\n- usbip: prevent leaking socket pointer address in messages (bnc#1012382).\n- usbip: prevent vhci_hcd driver from leaking a socket pointer address (bnc#1012382).\n- usbip: remove kernel addresses from usb device and urb debug msgs (bnc#1012382).\n- usbip: stub: stop printing kernel pointer addresses in messages (bnc#1012382).\n- usbip: vhci: stop printing kernel pointer addresses in messages (bnc#1012382).\n- usb: misc: usb3503: make sure reset is low for at least 100us (bnc#1012382).\n- usb: musb: da8xx: fix babble condition handling (bnc#1012382).\n- usb: phy: isp1301: Add OF device ID table (bnc#1012382).\n- usb: phy: isp1301: Fix build warning when CONFIG_OF is disabled (git-fixes).\n- usb: phy: tahvo: fix error handling in tahvo_usb_probe() (bnc#1012382).\n- usb: quirks: Add no-lpm quirk for KY-688 USB 3.1 Type-C Hub (bnc#1012382).\n- USB: serial: cp210x: add IDs for LifeScan OneTouch Verio IQ (bnc#1012382).\n- USB: serial: cp210x: add new device ID ELV ALC 8xxx (bnc#1012382).\n- USB: serial: ftdi_sio: add id for Airbus DS P8GR (bnc#1012382).\n- USB: serial: option: adding support for YUGA CLM920-NC5 (bnc#1012382).\n- USB: serial: option: add Quectel BG96 id (bnc#1012382).\n- USB: serial: option: add support for Telit ME910 PID 0x1101 (bnc#1012382).\n- USB: serial: qcserial: add Sierra Wireless EM7565 (bnc#1012382).\n- USB: uas and storage: Add US_FL_BROKEN_FUA for another JMicron JMS567 ID (bnc#1012382).\n- USB: usbfs: Filter flags passed in from user space (bnc#1012382).\n- usb: usbip: Fix possible deadlocks reported by lockdep (bnc#1012382).\n- usb: xhci: Add XHCI_TRUST_TX_LENGTH for Renesas uPD720201 (bnc#1012382).\n- usb: xhci: fix panic in xhci_free_virt_devices_depth_first (bnc#1012382).\n- userfaultfd: selftest: vm: allow to build in vm/ directory (bnc#1012382).\n- userfaultfd: shmem: __do_fault requires VM_FAULT_NOPAGE (bnc#1012382).\n- video: fbdev: au1200fb: Release some resources if a memory allocation fails (bnc#1012382).\n- video: fbdev: au1200fb: Return an error code if a memory allocation fails (bnc#1012382).\n- virtio: release virtio index when fail to device_register (bnc#1012382).\n- vmxnet3: repair memory leak (bnc#1012382).\n- vsyscall: Fix permissions for emulate mode with KAISER/PTI (bnc#1012382).\n- vt6655: Fix a possible sleep-in-atomic bug in vt6655_suspend (bnc#1012382).\n- vti6: Do not report path MTU below IPV6_MIN_MTU (bnc#1012382).\n- vti6: fix device register to report IFLA_INFO_KIND (bnc#1012382).\n- workqueue: trigger WARN if queue_delayed_work() is called with NULL @wq (bnc#1012382).\n- writeback: fix memory leak in wb_queue_work() (bnc#1012382).\n- X.509: fix buffer overflow detection in sprint_oid() (bsc#1075078).\n- X.509: reject invalid BIT STRING for subjectPublicKey (bnc#1012382).\n- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).\n- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).\n- x86/alternatives: Add missing \u0027\\n\u0027 at end of ALTERNATIVE inline asm (bnc#1012382).\n- x86/alternatives: Fix optimize_nops() checking (bnc#1012382).\n- x86/apic/vector: Fix off by one in error path (bnc#1012382).\n- x86/asm/32: Make sync_core() handle missing CPUID on all 32-bit kernels (bnc#1012382).\n- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).\n- x86/cpu: Factor out application of forced CPU caps (bnc#1012382).\n- x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382).\n- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382).\n- x86/cpufeatures: Make CPU bugs sticky (bnc#1012382).\n- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).\n- x86/cpu: Merge bugs.c and bugs_64.c (bnc#1012382).\n- x86/cpu, x86/pti: Do not enable PTI on AMD processors (bnc#1012382).\n- x86/Documentation: Add PTI description (bnc#1012382).\n- x86/entry: Use SYSCALL_DEFINE() macros for sys_modify_ldt() (bnc#1012382).\n- x86/hpet: Prevent might sleep splat on resume (bnc#1012382).\n- x86/kasan: Clear kasan_zero_page after TLB flush (bnc#1012382).\n- x86/kasan: Write protect kasan zero shadow (bnc#1012382).\n- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bnc#1012382).\n- x86/microcode/intel: Extend BDW late-loading with a revision check (bnc#1012382).\n- x86/microcode/intel: Fix BDW late-loading revision check (bnc#1012382).\n- x86/mm/32: Move setup_clear_cpu_cap(X86_FEATURE_PCID) earlier (git-fixes).\n- x86/mm: Disable pciD on 32-bit kernels (bnc#1012382).\n- x86/PCI: Make broadcom_postcore_init() check acpi_disabled (bnc#1012382).\n- x86/pti: Document fix wrong index (bnc#1012382).\n- x86/pti/efi: broken conversion from efi to kernel page table (bnc#1012382).\n- x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).\n- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).\n- x86/smpboot: Remove stale TLB flush invocations (bnc#1012382).\n- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).\n- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).\n- x86/tlb: Drop the _GPL from the cpu_tlbstate export (bnc#1012382).\n- x86/vm86/32: Switch to flush_tlb_mm_range() in mark_screen_rdonly() (bnc#1012382).\n- xen-netfront: avoid crashing on resume after a failure in talk_to_netback() (bnc#1012382).\n- xen-netfront: Improve error handling during initialization (bnc#1012382).\n- xfrm: Copy policy family in clone_policy (bnc#1012382).\n- xfs: add configurable error support to metadata buffers (bsc#1068569).\n- xfs: add configuration handlers for specific errors (bsc#1068569).\n- xfs: add configuration of error failure speed (bsc#1068569).\n- xfs: add \u0027fail at unmount\u0027 error handling configuration (bsc#1068569).\n- xfs: Add infrastructure needed for error propagation during buffer IO failure (bsc#1068569).\n- xfs: address kabi for xfs buffer retry infrastructure (kabi).\n- xfs: configurable error behavior via sysfs (bsc#1068569).\n- xfs: fix incorrect extent state in xfs_bmap_add_extent_unwritten_real (bnc#1012382).\n- xfs: fix log block underflow during recovery cycle verification (bnc#1012382).\n- xfs: fix up inode32/64 (re)mount handling (bsc#1069160).\n- xfs: introduce metadata IO error class (bsc#1068569).\n- xfs: introduce table-based init for error behaviors (bsc#1068569).\n- xfs: Properly retry failed inode items in case of error during buffer writeback (bsc#1068569).\n- xfs: remove xfs_trans_ail_delete_bulk (bsc#1068569).\n- xhci: Do not add a virt_dev to the devs array before it\u0027s fully allocated (bnc#1012382).\n- xhci: Fix ring leak in failure path of xhci_alloc_virt_device() (bnc#1012382).\n- xhci: plat: Register shutdown for xhci_plat (bnc#1012382).\n- zram: set physical queue limits to avoid array out of bounds accesses (bnc#1012382).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-SLE-RT-12-SP2-2018-327",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0482-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2018:0482-1",
        "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180482-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2018:0482-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-February/003742.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1012382",
        "url": "https://bugzilla.suse.com/1012382"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1019784",
        "url": "https://bugzilla.suse.com/1019784"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1031717",
        "url": "https://bugzilla.suse.com/1031717"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1036737",
        "url": "https://bugzilla.suse.com/1036737"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1038078",
        "url": "https://bugzilla.suse.com/1038078"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1038085",
        "url": "https://bugzilla.suse.com/1038085"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1043652",
        "url": "https://bugzilla.suse.com/1043652"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1048585",
        "url": "https://bugzilla.suse.com/1048585"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1052360",
        "url": "https://bugzilla.suse.com/1052360"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1060279",
        "url": "https://bugzilla.suse.com/1060279"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1066223",
        "url": "https://bugzilla.suse.com/1066223"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1066842",
        "url": "https://bugzilla.suse.com/1066842"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1068032",
        "url": "https://bugzilla.suse.com/1068032"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1068038",
        "url": "https://bugzilla.suse.com/1068038"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1068569",
        "url": "https://bugzilla.suse.com/1068569"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1068984",
        "url": "https://bugzilla.suse.com/1068984"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1069160",
        "url": "https://bugzilla.suse.com/1069160"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1070799",
        "url": "https://bugzilla.suse.com/1070799"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1072163",
        "url": "https://bugzilla.suse.com/1072163"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1072484",
        "url": "https://bugzilla.suse.com/1072484"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1072589",
        "url": "https://bugzilla.suse.com/1072589"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1073229",
        "url": "https://bugzilla.suse.com/1073229"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1073230",
        "url": "https://bugzilla.suse.com/1073230"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1073928",
        "url": "https://bugzilla.suse.com/1073928"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1074134",
        "url": "https://bugzilla.suse.com/1074134"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1074488",
        "url": "https://bugzilla.suse.com/1074488"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1074621",
        "url": "https://bugzilla.suse.com/1074621"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1074709",
        "url": "https://bugzilla.suse.com/1074709"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1074839",
        "url": "https://bugzilla.suse.com/1074839"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1074847",
        "url": "https://bugzilla.suse.com/1074847"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1075066",
        "url": "https://bugzilla.suse.com/1075066"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1075078",
        "url": "https://bugzilla.suse.com/1075078"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1075087",
        "url": "https://bugzilla.suse.com/1075087"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1075091",
        "url": "https://bugzilla.suse.com/1075091"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1075428",
        "url": "https://bugzilla.suse.com/1075428"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1075617",
        "url": "https://bugzilla.suse.com/1075617"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1075621",
        "url": "https://bugzilla.suse.com/1075621"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1075627",
        "url": "https://bugzilla.suse.com/1075627"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1075994",
        "url": "https://bugzilla.suse.com/1075994"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1076017",
        "url": "https://bugzilla.suse.com/1076017"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1076110",
        "url": "https://bugzilla.suse.com/1076110"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1076806",
        "url": "https://bugzilla.suse.com/1076806"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1076809",
        "url": "https://bugzilla.suse.com/1076809"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1076872",
        "url": "https://bugzilla.suse.com/1076872"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1076899",
        "url": "https://bugzilla.suse.com/1076899"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1077068",
        "url": "https://bugzilla.suse.com/1077068"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1077560",
        "url": "https://bugzilla.suse.com/1077560"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1077592",
        "url": "https://bugzilla.suse.com/1077592"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1077871",
        "url": "https://bugzilla.suse.com/1077871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1078526",
        "url": "https://bugzilla.suse.com/1078526"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1078681",
        "url": "https://bugzilla.suse.com/1078681"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 963844",
        "url": "https://bugzilla.suse.com/963844"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 988524",
        "url": "https://bugzilla.suse.com/988524"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-15129 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-15129/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-17712 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-17712/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-17862 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-17862/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-17864 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-17864/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-18017 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-18017/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5715 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5715/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-1000004 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-1000004/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-5332 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-5332/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-5333 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-5333/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2018-02-19T19:17:06Z",
      "generator": {
        "date": "2018-02-19T19:17:06Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2018:0482-1",
      "initial_release_date": "2018-02-19T19:17:06Z",
      "revision_history": [
        {
          "date": "2018-02-19T19:17:06Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-rt-4.4.114-27.1.noarch",
                "product": {
                  "name": "kernel-devel-rt-4.4.114-27.1.noarch",
                  "product_id": "kernel-devel-rt-4.4.114-27.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-rt-4.4.114-27.1.noarch",
                "product": {
                  "name": "kernel-source-rt-4.4.114-27.1.noarch",
                  "product_id": "kernel-source-rt-4.4.114-27.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt-4.4.114-27.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt-4.4.114-27.1.x86_64",
                  "product_id": "cluster-md-kmp-rt-4.4.114-27.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-network-kmp-rt-4.4.114-27.1.x86_64",
                "product": {
                  "name": "cluster-network-kmp-rt-4.4.114-27.1.x86_64",
                  "product_id": "cluster-network-kmp-rt-4.4.114-27.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt-4.4.114-27.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt-4.4.114-27.1.x86_64",
                  "product_id": "dlm-kmp-rt-4.4.114-27.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt-4.4.114-27.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt-4.4.114-27.1.x86_64",
                  "product_id": "gfs2-kmp-rt-4.4.114-27.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-4.4.114-27.1.x86_64",
                "product": {
                  "name": "kernel-rt-4.4.114-27.1.x86_64",
                  "product_id": "kernel-rt-4.4.114-27.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-base-4.4.114-27.1.x86_64",
                "product": {
                  "name": "kernel-rt-base-4.4.114-27.1.x86_64",
                  "product_id": "kernel-rt-base-4.4.114-27.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-4.4.114-27.1.x86_64",
                "product": {
                  "name": "kernel-rt-devel-4.4.114-27.1.x86_64",
                  "product_id": "kernel-rt-devel-4.4.114-27.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-devel-4.4.114-27.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-devel-4.4.114-27.1.x86_64",
                  "product_id": "kernel-rt_debug-devel-4.4.114-27.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-rt-4.4.114-27.1.x86_64",
                "product": {
                  "name": "kernel-syms-rt-4.4.114-27.1.x86_64",
                  "product_id": "kernel-syms-rt-4.4.114-27.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt-4.4.114-27.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt-4.4.114-27.1.x86_64",
                  "product_id": "ocfs2-kmp-rt-4.4.114-27.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Real Time 12 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Real Time 12 SP2",
                  "product_id": "SUSE Linux Enterprise Real Time 12 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-rt-4.4.114-27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-rt-4.4.114-27.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-network-kmp-rt-4.4.114-27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64"
        },
        "product_reference": "cluster-network-kmp-rt-4.4.114-27.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-rt-4.4.114-27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64"
        },
        "product_reference": "dlm-kmp-rt-4.4.114-27.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-rt-4.4.114-27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64"
        },
        "product_reference": "gfs2-kmp-rt-4.4.114-27.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-rt-4.4.114-27.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP2",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch"
        },
        "product_reference": "kernel-devel-rt-4.4.114-27.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-4.4.114-27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64"
        },
        "product_reference": "kernel-rt-4.4.114-27.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-base-4.4.114-27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64"
        },
        "product_reference": "kernel-rt-base-4.4.114-27.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-4.4.114-27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64"
        },
        "product_reference": "kernel-rt-devel-4.4.114-27.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-devel-4.4.114-27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-devel-4.4.114-27.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-4.4.114-27.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP2",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch"
        },
        "product_reference": "kernel-source-rt-4.4.114-27.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-rt-4.4.114-27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64"
        },
        "product_reference": "kernel-syms-rt-4.4.114-27.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-rt-4.4.114-27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-rt-4.4.114-27.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-15129",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-15129"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-15129",
          "url": "https://www.suse.com/security/cve/CVE-2017-15129"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074839 for CVE-2017-15129",
          "url": "https://bugzilla.suse.com/1074839"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-02-19T19:17:06Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-15129"
    },
    {
      "cve": "CVE-2017-17712",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-17712"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel through 4.14.6 has a race condition in inet-\u003ehdrincl that leads to uninitialized stack pointer usage; this allows a local user to execute code and gain privileges.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-17712",
          "url": "https://www.suse.com/security/cve/CVE-2017-17712"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1073229 for CVE-2017-17712",
          "url": "https://bugzilla.suse.com/1073229"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1073230 for CVE-2017-17712",
          "url": "https://bugzilla.suse.com/1073230"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-02-19T19:17:06Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-17712"
    },
    {
      "cve": "CVE-2017-17862",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-17862"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-17862",
          "url": "https://www.suse.com/security/cve/CVE-2017-17862"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1073928 for CVE-2017-17862",
          "url": "https://bugzilla.suse.com/1073928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-02-19T19:17:06Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-17862"
    },
    {
      "cve": "CVE-2017-17864",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-17864"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a \"pointer leak.\"",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-17864",
          "url": "https://www.suse.com/security/cve/CVE-2017-17864"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1073928 for CVE-2017-17864",
          "url": "https://bugzilla.suse.com/1073928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-02-19T19:17:06Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-17864"
    },
    {
      "cve": "CVE-2017-18017",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-18017"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-18017",
          "url": "https://www.suse.com/security/cve/CVE-2017-18017"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074488 for CVE-2017-18017",
          "url": "https://bugzilla.suse.com/1074488"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1080255 for CVE-2017-18017",
          "url": "https://bugzilla.suse.com/1080255"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1091815 for CVE-2017-18017",
          "url": "https://bugzilla.suse.com/1091815"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2017-18017",
          "url": "https://bugzilla.suse.com/1115893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 971126 for CVE-2017-18017",
          "url": "https://bugzilla.suse.com/971126"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-02-19T19:17:06Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-18017"
    },
    {
      "cve": "CVE-2017-5715",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5715"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5715",
          "url": "https://www.suse.com/security/cve/CVE-2017-5715"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1068032 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1068032"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074562 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1074562"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074578 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1074578"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074701 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1074701"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074741 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1074741"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074919 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1074919"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075006 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1075006"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075007 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1075007"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075262 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1075262"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075419 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1075419"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1076115 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1076115"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1076372 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1076372"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1076606 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1076606"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1078353 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1078353"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1080039 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1080039"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087887 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1087887"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087939 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1087939"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1088147 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1088147"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1089055 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1089055"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1091815 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1091815"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1095735 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1095735"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1102517 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1102517"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1105108 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1105108"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1126516 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1126516"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173489 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1173489"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1178658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201457 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1201457"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201877 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1201877"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203236 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1203236"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-02-19T19:17:06Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5715"
    },
    {
      "cve": "CVE-2018-1000004",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-1000004"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-1000004",
          "url": "https://www.suse.com/security/cve/CVE-2018-1000004"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1076017 for CVE-2018-1000004",
          "url": "https://bugzilla.suse.com/1076017"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1091815 for CVE-2018-1000004",
          "url": "https://bugzilla.suse.com/1091815"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-02-19T19:17:06Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-1000004"
    },
    {
      "cve": "CVE-2018-5332",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-5332"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-5332",
          "url": "https://www.suse.com/security/cve/CVE-2018-5332"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075621 for CVE-2018-5332",
          "url": "https://bugzilla.suse.com/1075621"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1091815 for CVE-2018-5332",
          "url": "https://bugzilla.suse.com/1091815"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2018-5332",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.6,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-02-19T19:17:06Z",
          "details": "low"
        }
      ],
      "title": "CVE-2018-5332"
    },
    {
      "cve": "CVE-2018-5333",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-5333"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-5333",
          "url": "https://www.suse.com/security/cve/CVE-2018-5333"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075617 for CVE-2018-5333",
          "url": "https://bugzilla.suse.com/1075617"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1091815 for CVE-2018-5333",
          "url": "https://bugzilla.suse.com/1091815"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.114-27.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.114-27.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.114-27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-02-19T19:17:06Z",
          "details": "low"
        }
      ],
      "title": "CVE-2018-5333"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…