SUSE-SU-2018:1048-1
Vulnerability from csaf_suse - Published: 2018-04-23 15:08 - Updated: 2018-04-23 15:08Summary
Security update for the Linux Kernel
Severity
Important
Notes
Title of the patch: Security update for the Linux Kernel
Description of the patch:
The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.126 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-1091: In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path, leading to a denial of service (bnc#1087231).
- CVE-2018-7740: The resv_map_release function in mm/hugetlb.c allowed local users to cause a denial of service (BUG) via a crafted application that made mmap system calls and has a large pgoff argument to the remap_file_pages system call (bnc#1084353).
- CVE-2018-8043: The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c did not validate certain resource availability, which allowed local users to cause a denial of service (NULL pointer dereference) (bnc#1084829).
- CVE-2017-18257: The __get_data_block function in fs/f2fs/data.c allowed local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl. (bnc#1088241)
- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).
The following non-security bugs were fixed:
- acpica: Add header support for TPM2 table changes (bsc#1084452).
- acpica: Add support for new SRAT subtable (bsc#1085981).
- acpica: iasl: Update to IORT SMMUv3 disassembling (bsc#1085981).
- acpi/iort: numa: Add numa node mapping for smmuv3 devices (bsc#1085981).
- acpi, numa: fix pxm to online numa node associations (bnc#1012382).
- acpi / pmic: xpower: Fix power_table addresses (bnc#1012382).
- acpi/processor: Fix error handling in __acpi_processor_start() (bnc#1012382).
- acpi/processor: Replace racy task affinity logic (bnc#1012382).
- add mainline tag to various patches to be able to get further work done
- af_iucv: enable control sends in case of SEND_SHUTDOWN (bnc#1085507, LTC#165135).
- agp/intel: Flush all chipset writes after updating the GGTT (bnc#1012382).
- ahci: Add PCI-id for the Highpoint Rocketraid 644L card (bnc#1012382).
- alsa: aloop: Fix access to not-yet-ready substream via cable (bnc#1012382).
- alsa: aloop: Sync stale timer before release (bnc#1012382).
- alsa: firewire-digi00x: handle all MIDI messages on streaming packets (bnc#1012382).
- alsa: hda: Add a power_save blacklist (bnc#1012382).
- alsa: hda: add dock and led support for HP EliteBook 820 G3 (bnc#1012382).
- alsa: hda: add dock and led support for HP ProBook 640 G2 (bnc#1012382).
- alsa: hda/realtek - Always immediately update mute LED with pin VREF (bnc#1012382).
- alsa: hda/realtek - Fix dock line-out volume on Dell Precision 7520 (bnc#1012382).
- alsa: hda/realtek - Fix speaker no sound after system resume (bsc#1031717).
- alsa: hda - Revert power_save option default value (git-fixes).
- alsa: pcm: Fix UAF in snd_pcm_oss_get_formats() (bnc#1012382).
- alsa: usb-audio: Add a quirck for B&W PX headphones (bnc#1012382).
- alsa: usb-audio: Fix parsing descriptor of UAC2 processing unit (bnc#1012382).
- apparmor: Make path_max parameter readonly (bnc#1012382).
- arm64: Add ARM_SMCCC_ARCH_WORKAROUND_1 BP hardening support (bsc#1068032).
- arm64: Add missing Falkor part number for branch predictor hardening (bsc#1068032).
- arm64: capabilities: Handle duplicate entries for a capability (bsc#1068032).
- arm64: cpufeature: __this_cpu_has_cap() shouldn't stop early (bsc#1068032).
- arm64 / cpuidle: Use new cpuidle macro for entering retention state (bsc#1084328).
- arm64: Enforce BBM for huge IO/VMAP mappings (bsc#1088313).
- arm64: fix smccc compilation (bsc#1068032).
- arm64: Kill PSCI_GET_VERSION as a variant-2 workaround (bsc#1068032).
- arm64: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling (bsc#1068032).
- arm64: KVM: Increment PC after handling an SMC trap (bsc#1068032).
- arm64: KVM: Report SMCCC_ARCH_WORKAROUND_1 BP hardening support (bsc#1068032).
- arm64: mm: do not write garbage into TTBR1_EL1 register (bsc#1085487).
- arm64: mm: fix thinko in non-global page table attribute check (bsc#1088050).
- arm64: Relax ARM_SMCCC_ARCH_WORKAROUND_1 discovery (bsc#1068032).
- arm: 8668/1: ftrace: Fix dynamic ftrace with DEBUG_RODATA and !FRAME_POINTER (bnc#1012382).
- arm/arm64: KVM: Add PSCI_VERSION helper (bsc#1068032).
- arm/arm64: KVM: Add smccc accessors to PSCI code (bsc#1068032).
- arm/arm64: KVM: Advertise SMCCC v1.1 (bsc#1068032).
- arm/arm64: KVM: Consolidate the PSCI include files (bsc#1068032).
- arm/arm64: KVM: Implement PSCI 1.0 support (bsc#1068032).
- arm/arm64: KVM: Turn kvm_psci_version into a static inline (bsc#1068032).
- arm/arm64: smccc: Implement SMCCC v1.1 inline primitive (bsc#1068032).
- arm/arm64: smccc: Make function identifiers an unsigned quantity (bsc#1068032).
- arm: DRA7: clockdomain: Change the CLKTRCTRL of CM_PCIE_CLKSTCTRL to SW_WKUP (bnc#1012382).
- arm: dts: Adjust moxart IRQ controller and flags (bnc#1012382).
- arm: dts: am335x-pepper: Fix the audio CODEC's reset pin (bnc#1012382).
- arm: dts: exynos: Correct Trats2 panel reset line (bnc#1012382).
- arm: dts: koelsch: Correct clock frequency of X2 DU clock input (bnc#1012382).
- arm: dts: LogicPD Torpedo: Fix I2C1 pinmux (bnc#1012382).
- arm: dts: LogicPD Torpedo: Fix I2C1 pinmux (bnc#1012382).
- arm: dts: omap3-n900: Fix the audio CODEC's reset pin (bnc#1012382).
- arm: dts: r8a7790: Correct parent of SSI[0-9] clocks (bnc#1012382).
- arm: dts: r8a7791: Correct parent of SSI[0-9] clocks (bnc#1012382).
- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bnc#1012382).
- asoc: rcar: ssi: do not set SSICR.CKDV = 000 with SSIWSR.CONT (bnc#1012382).
- ath10k: disallow DFS simulation if DFS channel is not enabled (bnc#1012382).
- ath10k: fix invalid STS_CAP_OFFSET_MASK (bnc#1012382).
- ath10k: update tdls teardown state to target (bnc#1012382).
- ath: Fix updating radar flags for coutry code India (bnc#1012382).
- batman-adv: handle race condition for claims between gateways (bnc#1012382).
- bcache: do not attach backing with duplicate UUID (bnc#1012382).
- blkcg: fix double free of new_blkg in blkcg_init_queue (bnc#1012382).
- blk-throttle: make sure expire time isn't too big (bnc#1012382).
- block: do not assign cmd_flags in __blk_rq_prep_clone (bsc#1088087).
- block-mq: stop workqueue items in blk_mq_stop_hw_queue() (bsc#1084967).
- bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174 (bnc#1012382).
- bluetooth: hci_qca: Avoid setup failure on missing rampatch (bnc#1012382).
- bnx2x: Align RX buffers (bnc#1012382).
- bonding: refine bond_fold_stats() wrap detection (bnc#1012382).
- bpf: fix incorrect sign extension in check_alu_op() (bnc#1012382).
- bpf: skip unnecessary capability check (bnc#1012382).
- bpf, x64: implement retpoline for tail call (bnc#1012382).
- bpf, x64: increase number of passes (bnc#1012382).
- braille-console: Fix value returned by _braille_console_setup (bnc#1012382).
- brcmfmac: fix P2P_DEVICE ethernet address generation (bnc#1012382).
- bridge: check brport attr show in brport_show (bnc#1012382).
- btrfs: alloc_chunk: fix DUP stripe size handling (bnc#1012382).
- btrfs: Fix use-after-free when cleaning up fs_devs with a single stale device (bnc#1012382).
- btrfs: improve delayed refs iterations (bsc#1076033).
- btrfs: incremental send, fix invalid memory access (git-fixes).
- btrfs: preserve i_mode if __btrfs_set_acl() fails (bnc#1012382).
- btrfs: send, fix file hole not being preserved due to inline extent (bnc#1012382).
- can: cc770: Fix queue stall & dropped RTR reply (bnc#1012382).
- can: cc770: Fix stalls on rt-linux, remove redundant IRQ ack (bnc#1012382).
- can: cc770: Fix use after free in cc770_tx_interrupt() (bnc#1012382).
- ceph: only dirty ITER_IOVEC pages for direct read (bsc#1084898).
- ch9200: use skb_cow_head() to deal with cloned skbs (bsc#1088684).
- clk: bcm2835: Protect sections updating shared registers (bnc#1012382).
- clk: ns2: Correct SDIO bits (bnc#1012382).
- clk: qcom: msm8916: fix mnd_width for codec_digcodec (bnc#1012382).
- clk: si5351: Rename internal plls to avoid name collisions (bnc#1012382).
- coresight: Fix disabling of CoreSight TPIU (bnc#1012382).
- coresight: Fixes coresight DT parse to get correct output port ID (bnc#1012382).
- cpufreq: Fix governor module removal race (bnc#1012382).
- cpufreq: s3c24xx: Fix broken s3c_cpufreq_init() (bnc#1012382).
- cpufreq/sh: Replace racy task affinity logic (bnc#1012382).
- cpuidle: Add new macro to enter a retention idle state (bsc#1084328).
- cros_ec: fix nul-termination for firmware build info (bnc#1012382).
- crypto: cavium - fix memory leak on info (bsc#1086518).
- dcache: Add cond_resched in shrink_dentry_list (bsc#1086194).
- dccp: check sk for closed state in dccp_sendmsg() (bnc#1012382).
- dmaengine: imx-sdma: add 1ms delay to ensure SDMA channel is stopped (bnc#1012382).
- dmaengine: ti-dma-crossbar: Fix event mapping for TPCC_EVT_MUX_60_63 (bnc#1012382).
- dm: Always copy cmd_flags when cloning a request (bsc#1088087).
- driver: (adm1275) set the m,b and R coefficients correctly for power (bnc#1012382).
- drm: Allow determining if current task is output poll worker (bnc#1012382).
- drm/amdgpu/dce: Do not turn off DP sink when disconnected (bnc#1012382).
- drm/amdgpu: Fail fb creation from imported dma-bufs. (v2) (bnc#1012382).
- drm/amdgpu: Fix deadlock on runtime suspend (bnc#1012382).
- drm/amdgpu: fix KV harvesting (bnc#1012382).
- drm/amdgpu: Notify sbios device ready before send request (bnc#1012382).
- drm/amdkfd: Fix memory leaks in kfd topology (bnc#1012382).
- drm: Defer disabling the vblank IRQ until the next interrupt (for instant-off) (bnc#1012382).
- drm/edid: set ELD connector type in drm_edid_to_eld() (bnc#1012382).
- drm/i915/cmdparser: Do not check past the cmd length (bsc#1031717).
- drm/i915/psr: Check for the specific AUX_FRAME_SYNC cap bit (bsc#1031717).
- drm/msm: fix leak in failed get_pages (bnc#1012382).
- drm/nouveau: Fix deadlock on runtime suspend (bnc#1012382).
- drm/nouveau/kms: Increase max retries in scanout position queries (bnc#1012382).
- drm/omap: DMM: Check for DMM readiness after successful transaction commit (bnc#1012382).
- drm: qxl: Do not alloc fbdev if emulation is not supported (bnc#1012382).
- drm/radeon: Do not turn off DP sink when disconnected (bnc#1012382).
- drm/radeon: Fail fb creation from imported dma-bufs (bnc#1012382).
- drm/radeon: Fix deadlock on runtime suspend (bnc#1012382).
- drm/radeon: fix KV harvesting (bnc#1012382).
- drm: udl: Properly check framebuffer mmap offsets (bnc#1012382).
- drm/vmwgfx: Fix a destoy-while-held mutex problem (bnc#1012382).
- drm/vmwgfx: Fixes to vmwgfx_fb (bnc#1012382).
- e1000e: Avoid missed interrupts following ICR read (bsc#1075428).
- e1000e: Avoid receiver overrun interrupt bursts (bsc#1075428).
- e1000e: Fix check_for_link return value with autoneg off (bsc#1075428).
- e1000e: Fix link check race condition (bsc#1075428).
- e1000e: Fix queue interrupt re-raising in Other interrupt (bsc#1075428).
- e1000e: fix timing for 82579 Gigabit Ethernet controller (bnc#1012382).
- e1000e: Remove Other from EIAC (bsc#1075428).
- edac, sb_edac: Fix out of bound writes during DIMM configuration on KNL (git-fixes 3286d3eb906c).
- ext4: inplace xattr block update fails to deduplicate blocks (bnc#1012382).
- f2fs: relax node version check for victim data in gc (bnc#1012382).
- fib_semantics: Do not match route with mismatching tclassid (bnc#1012382).
- firmware/psci: Expose PSCI conduit (bsc#1068032).
- firmware/psci: Expose SMCCC version through psci_ops (bsc#1068032).
- fixup: sctp: verify size of a new chunk in _sctp_make_chunk() (bnc#1012382).
- fs/aio: Add explicit RCU grace period when freeing kioctx (bnc#1012382).
- fs/aio: Use RCU accessors for kioctx_table->table[] (bnc#1012382).
- fs/hugetlbfs/inode.c: change put_page/unlock_page order in hugetlbfs_fallocate() (git-fixes, bsc#1083745).
- fs: Teach path_connected to handle nfs filesystems with multiple roots (bnc#1012382).
- genirq: Track whether the trigger type has been set (git-fixes).
- genirq: Use irqd_get_trigger_type to compare the trigger type for shared IRQs (bnc#1012382).
- hdlc_ppp: carrier detect ok, do not turn off negotiation (bnc#1012382).
- hid: clamp input to logical range if no null state (bnc#1012382).
- hid: reject input outside logical range only if null state is set (bnc#1012382).
- hugetlbfs: fix offset overflow in hugetlbfs mmap (bnc#1084353).
- hv_balloon: fix bugs in num_pages_onlined accounting (fate#323887).
- hv_balloon: fix printk loglevel (fate#323887).
- hv_balloon: simplify hv_online_page()/hv_page_online_one() (fate#323887).
- i2c: i2c-scmi: add a MS HID (bnc#1012382).
- i2c: xlp9xx: Check for Bus state before every transfer (bsc#1084310).
- i2c: xlp9xx: Handle NACK on DATA properly (bsc#1084310).
- i2c: xlp9xx: Handle transactions with I2C_M_RECV_LEN properly (bsc#1060799).
- i2c: xlp9xx: return ENXIO on slave address NACK (bsc#1060799).
- i40e: Acquire NVM lock before reads on all devices (bnc#1012382).
- i40e: avoid NVM acquire deadlock during NVM update (git-fixes).
- ia64: fix module loading for gcc-5.4 (bnc#1012382).
- ib/ipoib: Avoid memory leak if the SA returns a different DGID (bnc#1012382).
- ib/ipoib: Update broadcast object if PKey value was changed in index 0 (bnc#1012382).
- ib/mlx4: Change vma from shared to private (bnc#1012382).
- ib/mlx4: Take write semaphore when changing the vma struct (bnc#1012382).
- ibmvfc: Avoid unnecessary port relogin (bsc#1085404).
- ibmvnic: Disable irqs before exiting reset from closed state (bsc#1084610).
- ibmvnic: Do not reset CRQ for Mobility driver resets (bsc#1088600).
- ibmvnic: Fix DMA mapping mistakes (bsc#1088600).
- ibmvnic: Fix failover case for non-redundant configuration (bsc#1088600).
- ibmvnic: Fix reset return from closed state (bsc#1084610).
- ibmvnic: Fix reset scheduler error handling (bsc#1088600).
- ibmvnic: Potential NULL dereference in clean_one_tx_pool() (bsc#1085224, git-fixes).
- ibmvnic: Remove unused TSO resources in TX pool structure (bsc#1085224).
- ibmvnic: Update TX pool cleaning routine (bsc#1085224).
- ibmvnic: Zero used TX descriptor counter on reset (bsc#1088600).
- ib/umem: Fix use of npages/nmap fields (bnc#1012382).
- ieee802154: 6lowpan: fix possible NULL deref in lowpan_device_event() (bnc#1012382).
- iio: st_pressure: st_accel: Initialise sensor platform data properly (bnc#1012382).
- iio: st_pressure: st_accel: pass correct platform data to init (git-fixes).
- ima: relax requiring a file signature for new files with zero length (bnc#1012382).
- infiniband/uverbs: Fix integer overflows (bnc#1012382).
- input: matrix_keypad - fix race when disabling interrupts (bnc#1012382).
- input: qt1070 - add OF device ID table (bnc#1012382).
- input: tsc2007 - check for presence and power down tsc2007 during probe (bnc#1012382).
- iommu/omap: Register driver before setting IOMMU ops (bnc#1012382).
- iommu/vt-d: clean up pr_irq if request_threaded_irq fails (bnc#1012382).
- ip6_vti: adjust vti mtu according to mtu of lower device (bnc#1012382).
- ipmi: do not probe ACPI devices if si_tryacpi is unset (bsc#1060799).
- ipmi: Fix the I2C address extraction from SPMI tables (bsc#1060799).
- ipmi_ssif: Fix kernel panic at msg_done_handler (bsc#1088871).
- ipmi_ssif: Fix logic around alert handling (bsc#1060799).
- ipmi_ssif: remove redundant null check on array client->adapter->name (bsc#1060799).
- ipmi_ssif: unlock on allocation failure (bsc#1060799).
- ipmi:ssif: Use i2c_adapter_id instead of adapter->nr (bsc#1060799).
- ipmi: Use the proper default value for register size in ACPI (bsc#1060799).
- ipmi/watchdog: fix wdog hang on panic waiting for ipmi response (bnc#1012382).
- ipv6: fix access to non-linear packet in ndisc_fill_redirect_hdr_option() (bnc#1012382).
- ipv6 sit: work around bogus gcc-8 -Wrestrict warning (bnc#1012382).
- ipvlan: add L2 check for packets arriving via virtual devices (bnc#1012382).
- irqchip/gic-v3-its: Add ACPI NUMA node mapping (bsc#1085981).
- irqchip/gic-v3-its: Allow GIC ITS number more than MAX_NUMNODES (bsc#1085981).
- irqchip/gic-v3-its: Ensure nr_ites >= nr_lpis (bnc#1012382).
- irqchip/gic-v3-its: Remove ACPICA version check for ACPI NUMA (bsc#1085981).
- kbuild: disable clang's default use of -fmerge-all-constants (bnc#1012382).
- kbuild: Handle builtin dtb file names containing hyphens (bnc#1012382).
- kprobes/x86: Fix kprobe-booster not to boost far call instructions (bnc#1012382).
- kprobes/x86: Fix to set RWX bits correctly before releasing trampoline (git-fixes).
- kprobes/x86: Set kprobes pages read-only (bnc#1012382).
- kvm: arm/arm64: Handle CPU_PM_ENTER_FAILED (bsc#1086499).
- kvm: arm/arm64: vgic: Add missing irq_lock to vgic_mmio_read_pending (bsc#1086499).
- kvm: arm/arm64: vgic: Do not populate multiple LRs with the same vintid (bsc#1086499).
- kvm: arm/arm64: vgic-its: Check result of allocation before use (bsc#).
- kvm: arm/arm64: vgic-its: Preserve the revious read from the pending table (bsc#1086499).
- kvm: arm/arm64: vgic-v3: Tighten synchronization for guests using v2 on v3 (bsc#1086499).
- kvm: mmu: Fix overlap between public and private memslots (bnc#1012382).
- kvm: nVMX: fix nested tsc scaling (bsc1087999).
- kvm: PPC: Book3S PR: Exit KVM on failed mapping (bnc#1012382).
- kvm/x86: fix icebp instruction handling (bnc#1012382).
- l2tp: do not accept arbitrary sockets (bnc#1012382).
- libata: Apply NOLPM quirk to Crucial M500 480 and 960GB SSDs (bnc#1012382).
- libata: Apply NOLPM quirk to Crucial MX100 512GB SSDs (bnc#1012382).
- libata: disable LPM for Crucial BX100 SSD 500GB drive (bnc#1012382).
- libata: Enable queued TRIM for Samsung SSD 860 (bnc#1012382).
- libata: fix length validation of ATAPI-relayed SCSI commands (bnc#1012382).
- libata: Make Crucial BX100 500GB LPM quirk apply to all firmware versions (bnc#1012382).
- libata: Modify quirks for MX100 to limit NCQ_TRIM quirk to MU01 version (bnc#1012382).
- libata: remove WARN() for DMA or PIO command without data (bnc#1012382).
- lock_parent() needs to recheck if dentry got __dentry_kill'ed under it (bnc#1012382).
- loop: Fix lost writes caused by missing flag (bnc#1012382).
- lpfc: update version to 11.4.0.7-1 (bsc#1085383).
- mac80211: do not parse encrypted management frames in ieee80211_frame_acked (bnc#1012382).
- mac80211: do not WARN on bad WMM parameters from buggy APs (bsc#1031717).
- mac80211_hwsim: enforce PS_MANUAL_POLL to be set after PS_ENABLED (bnc#1012382).
- mac80211: remove BUG() when interface type is invalid (bnc#1012382).
- md-cluster: fix wrong condition check in raid1_write_request (bsc#1085402).
- md/raid10: skip spare disk as 'first' disk (bnc#1012382).
- md/raid10: wait up frozen array in handle_write_completed (bnc#1012382).
- md/raid6: Fix anomily when recovering a single device in RAID6 (bnc#1012382).
- media: au0828: fix VIDEO_V4L2 dependency (bsc#1031717).
- media: bt8xx: Fix err 'bt878_probe()' (bnc#1012382).
- media: c8sectpfe: fix potential NULL pointer dereference in c8sectpfe_timer_interrupt (bnc#1012382).
- media: cpia2: Fix a couple off by one bugs (bnc#1012382).
- media: cx25821: prevent out-of-bounds read on array card (bsc#1031717).
- media/dvb-core: Race condition when writing to CAM (bnc#1012382).
- media: i2c/soc_camera: fix ov6650 sensor getting wrong clock (bnc#1012382).
- media: m88ds3103: do not call a non-initalized function (bnc#1012382).
- media: [RESEND] media: dvb-frontends: Add delay to Si2168 restart (bnc#1012382).
- media: s3c-camif: fix out-of-bounds array access (bsc#1031717).
- mfd: palmas: Reset the POWERHOLD mux during power off (bnc#1012382).
- mmc: avoid removing non-removable hosts during suspend (bnc#1012382).
- mmc: dw_mmc: fix falling from idmac to PIO mode when dw_mci_reset occurs (bnc#1012382).
- mmc: dw_mmc: Fix the DTO/CTO timeout overflow calculation for 32-bit systems (bsc#1088267).
- mmc: sdhci-of-esdhc: limit SD clock for ls1012a/ls1046a (bnc#1012382).
- mm: Fix false-positive VM_BUG_ON() in page_cache_{get,add}_speculative() (bnc#1012382).
- mm/hugetlb.c: do not call region_abort if region_chg fails (bnc#1084353).
- mm/vmalloc: add interfaces to free unmapped page table (bnc#1012382).
- mpls, nospec: Sanitize array index in mpls_label_ok() (bnc#1012382).
- mt7601u: check return value of alloc_skb (bnc#1012382).
- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bnc#1012382).
- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bnc#1012382).
- mtip32xx: use runtime tag to initialize command header (bnc#1012382).
- net/8021q: create device with all possible features in wanted_features (bnc#1012382).
- net: ethernet: arc: Fix a potential memory leak if an optional regulator is deferred (bnc#1012382).
- net: ethernet: ti: cpsw: add check for in-band mode setting with RGMII PHY interface (bnc#1012382).
- net/faraday: Add missing include of of.h (bnc#1012382).
- net: fec: Fix unbalanced PM runtime calls (bnc#1012382).
- netfilter: add back stackpointer size checks (bnc#1012382).
- netfilter: bridge: ebt_among: add missing match size checks (bnc#1012382).
- netfilter: IDLETIMER: be syzkaller friendly (bnc#1012382).
- netfilter: ipv6: fix use-after-free Write in nf_nat_ipv6_manip_pkt (bnc#1012382).
- netfilter: nat: cope with negative port range (bnc#1012382).
- netfilter: use skb_to_full_sk in ip_route_me_harder (bnc#1012382).
- netfilter: x_tables: fix missing timer initialization in xt_LED (bnc#1012382).
- netfilter: xt_CT: fix refcnt leak on error path (bnc#1012382).
- net: Fix hlist corruptions in inet_evict_bucket() (bnc#1012382).
- net: fix race on decreasing number of TX queues (bnc#1012382).
- net: hns: Fix ethtool private flags (bsc#1085511).
- net: ipv4: avoid unused variable warning for sysctl (git-fixes).
- net: ipv4: do not allow setting net.ipv4.route.min_pmtu below 68 (bnc#1012382).
- net: ipv6: send unsolicited NA after DAD (git-fixes).
- net: ipv6: send unsolicited NA on admin up (bnc#1012382).
- net/iucv: Free memory obtained by kzalloc (bnc#1012382).
- netlink: avoid a double skb free in genlmsg_mcast() (bnc#1012382).
- netlink: ensure to loop over all netns in genlmsg_multicast_allns() (bnc#1012382).
- net: mpls: Pull common label check into helper (bnc#1012382).
- net: Only honor ifindex in IP_PKTINFO if non-0 (bnc#1012382).
- net: systemport: Rewrite __bcm_sysport_tx_reclaim() (bnc#1012382).
- net: xfrm: allow clearing socket xfrm policies (bnc#1012382).
- nfc: nfcmrvl: double free on error path (bnc#1012382).
- nfc: nfcmrvl: Include unaligned.h instead of access_ok.h (bnc#1012382).
- nfsd4: permit layoutget of executable-only files (bnc#1012382).
- nfs: Fix an incorrect type in struct nfs_direct_req (bnc#1012382).
- nospec: Allow index argument to have const-qualified type (bnc#1012382).
- nospec: Include <asm/barrier.h> dependency (bnc#1012382).
- nvme: do not send keep-alive frames during reset (bsc#1084223).
- nvme: do not send keep-alives to the discovery controller (bsc#1086607).
- nvme: expand nvmf_check_if_ready checks (bsc#1085058).
- nvme/rdma: do no start error recovery twice (bsc#1084967).
- nvmet_fc: prevent new io rqsts in possible isr completions (bsc#1083574).
- of: fix of_device_get_modalias returned length when truncating buffers (bnc#1012382).
- openvswitch: Delete conntrack entry clashing with an expectation (bnc#1012382).
- Partial revert 'e1000e: Avoid receiver overrun interrupt bursts' (bsc#1075428).
- pci/ACPI: Fix bus range comparison in pci_mcfg_lookup() (bsc#1084699).
- pci: Add function 1 DMA alias quirk for Highpoint RocketRAID 644L (bnc#1012382).
- pci: Add pci_reset_function_locked() (bsc#1084889).
- pci: Apply Cavium ACS quirk only to CN81xx/CN83xx/CN88xx devices (bsc#1084914).
- pci: Avoid FLR for Intel 82579 NICs (bsc#1084889).
- pci: Avoid slot reset if bridge itself is broken (bsc#1084918).
- pci: Export pcie_flr() (bsc#1084889).
- pci: hv: Fix 2 hang issues in hv_compose_msi_msg() (fate#323887, bsc#1087659, bsc#1087906).
- pci: hv: Fix a comment typo in _hv_pcifront_read_config() (fate#323887, bsc#1087659).
- pci: hv: Only queue new work items in hv_pci_devices_present() if necessary (fate#323887, bsc#1087659).
- pci: hv: Remove the bogus test in hv_eject_device_work() (fate#323887, bsc#1087659).
- pci: hv: Serialize the present and eject work items (fate#323887, bsc#1087659).
- pci: Mark Haswell Power Control Unit as having non-compliant BARs (bsc#1086015).
- pci/MSI: Stop disabling MSI/MSI-X in pci_device_shutdown() (bnc#1012382).
- pci: Probe for device reset support during enumeration (bsc#1084889).
- pci: Protect pci_error_handlers->reset_notify() usage with device_lock() (bsc#1084889).
- pci: Protect restore with device lock to be consistent (bsc#1084889).
- pci: Remove __pci_dev_reset() and pci_dev_reset() (bsc#1084889).
- pci: Remove redundant probes for device reset support (bsc#1084889).
- pci: Wait for up to 1000ms after FLR reset (bsc#1084889).
- perf inject: Copy events when reordering events in pipe mode (bnc#1012382).
- perf probe: Return errno when not hitting any event (bnc#1012382).
- perf session: Do not rely on evlist in pipe mode (bnc#1012382).
- perf sort: Fix segfault with basic block 'cycles' sort dimension (bnc#1012382).
- perf tests kmod-path: Do not fail if compressed modules are not supported (bnc#1012382).
- perf tools: Make perf_event__synthesize_mmap_events() scale (bnc#1012382).
- perf/x86/intel: Do not accidentally clear high bits in bdw_limit_period() (bnc#1012382).
- perf/x86/intel/uncore: Fix multi-domain PCI CHA enumeration bug on Skylake servers (bsc#1086357).
- pinctrl: Really force states during suspend/resume (bnc#1012382).
- platform/chrome: Use proper protocol transfer function (bnc#1012382).
- platform/x86: asus-nb-wmi: Add wapf4 quirk for the X302UA (bnc#1012382).
- power: supply: pda_power: move from timer to delayed_work (bnc#1012382).
- ppp: prevent unregistered channels from connecting to PPP units (bnc#1012382).
- pty: cancel pty slave port buf's work in tty_release (bnc#1012382).
- pwm: tegra: Increase precision in PWM rate calculation (bnc#1012382).
- qed: Free RoCE ILT Memory on rmmod qedr (bsc#1019695 FATE#321703 bsc#1019699 FATE#321702 bsc#1022604 FATE#321747).
- qed: Use after free in qed_rdma_free() (bsc#1019695 FATE#321703 bsc#1019699 FATE#321702 bsc#1022604 FATE#321747).
- qeth: repair SBAL elements calculation (bnc#1085507, LTC#165484).
- qlcnic: fix unchecked return value (bnc#1012382).
- rcutorture/configinit: Fix build directory error message (bnc#1012382).
- rdma/cma: Use correct size when writing netlink stats (bnc#1012382).
- rdma/core: Do not use invalid destination in determining port reuse (FATE#321231 FATE#321473 FATE#322153 FATE#322149).
- rdma/iwpm: Fix uninitialized error code in iwpm_send_mapinfo() (bnc#1012382).
- rdma/mlx5: Fix integer overflow while resizing CQ (bnc#1012382).
- rdma/ocrdma: Fix permissions for OCRDMA_RESET_STATS (bnc#1012382).
- rdma/ucma: Check that user does not overflow QP state (bnc#1012382).
- rdma/ucma: Fix access to non-initialized CM_ID object (bnc#1012382).
- rdma/ucma: Limit possible option size (bnc#1012382).
- regmap: Do not use format_val in regmap_bulk_read (bsc#1031717).
- regmap: Fix reversed bounds check in regmap_raw_write() (bsc#1031717).
- regmap: Format data for raw write in regmap_bulk_write (bsc#1031717).
- regmap-i2c: Off by one in regmap_i2c_smbus_i2c_read/write() (bsc#1031717).
- regulator: anatop: set default voltage selector for pcie (bnc#1012382).
- reiserfs: Make cancel_old_flush() reliable (bnc#1012382).
- Revert 'ARM: dts: LogicPD Torpedo: Fix I2C1 pinmux' (bnc#1012382).
- Revert 'e1000e: Separate signaling for link check/link up' (bsc#1075428).
- Revert 'genirq: Use irqd_get_trigger_type to compare the trigger type for shared IRQs' (bnc#1012382).
- Revert 'ipvlan: add L2 check for packets arriving via virtual devices' (reverted in upstream).
- Revert 'led: core: Fix brightness setting when setting delay_off=0' (bnc#1012382).
- rndis_wlan: add return value validation (bnc#1012382).
- rtc: cmos: Do not assume irq 8 for rtc when there are no legacy irqs (bnc#1012382).
- rtlwifi: rtl8723be: Fix loss of signal (bnc#1012382).
- rtlwifi: rtl_pci: Fix the bug when inactiveps is enabled (bnc#1012382).
- s390/mm: fix local TLB flushing vs. detach of an mm address space (bnc#1088324, LTC#166470).
- s390/mm: fix race on mm->context.flush_mm (bnc#1088324, LTC#166470).
- s390/mm: no local TLB flush for clearing-by-ASCE IDTE (bnc#1088324, LTC#166470).
- s390/qeth: apply takeover changes when mode is toggled (bnc#1085507, LTC#165490).
- s390/qeth: do not apply takeover changes to RXIP (bnc#1085507, LTC#165490).
- s390/qeth: fix double-free on IP add/remove race (bnc#1085507, LTC#165491).
- s390/qeth: fix IPA command submission race (bnc#1012382).
- s390/qeth: fix IP address lookup for L3 devices (bnc#1085507, LTC#165491).
- s390/qeth: fix IP removal on offline cards (bnc#1085507, LTC#165491).
- s390/qeth: fix SETIP command handling (bnc#1012382).
- s390/qeth: free netdevice when removing a card (bnc#1012382).
- s390/qeth: improve error reporting on IP add/removal (bnc#1085507, LTC#165491).
- s390/qeth: lock IP table while applying takeover changes (bnc#1085507, LTC#165490).
- s390/qeth: lock read device while queueing next buffer (bnc#1012382).
- s390/qeth: on channel error, reject further cmd requests (bnc#1012382).
- s390/qeth: update takeover IPs after configuration change (bnc#1085507, LTC#165490).
- s390/qeth: when thread completes, wake up all waiters (bnc#1012382).
- sched: act_csum: do not mangle TCP and UDP GSO packets (bnc#1012382).
- sched: Stop resched_cpu() from sending IPIs to offline CPUs (bnc#1012382).
- sched: Stop switched_to_rt() from sending IPIs to offline CPUs (bnc#1012382).
- scsi: core: scsi_get_device_flags_keyed(): Always return device flags (bnc#1012382).
- scsi: devinfo: apply to HP XP the same flags as Hitachi VSP (bnc#1012382).
- scsi: dh: add new rdac devices (bnc#1012382).
- scsi: lpfc: Add missing unlock in WQ full logic (bsc#1085383).
- scsi: lpfc: Code cleanup for 128byte wqe data type (bsc#1085383).
- scsi: lpfc: Fix mailbox wait for POST_SGL mbox command (bsc#1085383).
- scsi: lpfc: Fix NVME Initiator FirstBurst (bsc#1085383).
- scsi: lpfc: Fix SCSI lun discovery when port configured for both SCSI and NVME (bsc#1085383).
- scsi: lpfc: Memory allocation error during driver start-up on power8 (bsc#1085383).
- scsi: mac_esp: Replace bogus memory barrier with spinlock (bnc#1012382).
- scsi: sg: check for valid direction before starting the request (bnc#1012382).
- scsi: sg: fix SG_DXFER_FROM_DEV transfers (bnc#1012382).
- scsi: sg: fix static checker warning in sg_is_valid_dxfer (bnc#1012382).
- scsi: sg: only check for dxfer_len greater than 256M (bnc#1012382 bsc#1064206).
- scsi: virtio_scsi: always read VPD pages for multiqueue too (git-fixes).
- scsi: virtio_scsi: Always try to read VPD pages (bnc#1012382).
- sctp: fix dst refcnt leak in sctp_v4_get_dst (bnc#1012382).
- sctp: fix dst refcnt leak in sctp_v6_get_dst() (bnc#1012382).
- sctp: verify size of a new chunk in _sctp_make_chunk() (bnc#1012382).
- selftests/x86: Add tests for the STR and SLDT instructions (bnc#1012382).
- selftests/x86: Add tests for User-Mode Instruction Prevention (bnc#1012382).
- selftests/x86/entry_from_vm86: Add test cases for POPF (bnc#1012382).
- selftests/x86/entry_from_vm86: Exit with 1 if we fail (bnc#1012382).
- selinux: check for address length in selinux_socket_bind() (bnc#1012382).
- serial: 8250_pci: Add Brainboxes UC-260 4 port serial device (bnc#1012382).
- serial: sh-sci: prevent lockup on full TTY buffers (bnc#1012382).
- skbuff: Fix not waking applications when errors are enqueued (bnc#1012382).
- sm501fb: do not return zero on failure path in sm501fb_start() (bnc#1012382).
- solo6x10: release vb2 buffers in solo_stop_streaming() (bnc#1012382).
- spi: dw: Disable clock after unregistering the host (bnc#1012382).
- spi: omap2-mcspi: poll OMAP2_MCSPI_CHSTAT_RXS for PIO transfer (bnc#1012382).
- spi: sun6i: disable/unprepare clocks on remove (bnc#1012382).
- staging: android: ashmem: Fix lockdep issue during llseek (bnc#1012382).
- staging: android: ashmem: Fix possible deadlock in ashmem_ioctl (bnc#1012382).
- staging: comedi: fix comedi_nsamples_left (bnc#1012382).
- staging: lustre: ptlrpc: kfree used instead of kvfree (bnc#1012382).
- staging: ncpfs: memory corruption in ncp_read_kernel() (bnc#1012382).
- staging: speakup: Replace BUG_ON() with WARN_ON() (bnc#1012382).
- staging: unisys: visorhba: fix s-Par to boot with option CONFIG_VMAP_STACK set to y (bnc#1012382).
- staging: wilc1000: add check for kmalloc allocation failure (bnc#1012382).
- staging: wilc1000: fix unchecked return value (bnc#1012382).
- sysrq: Reset the watchdog timers while displaying high-resolution timers (bnc#1012382).
- target: prefer dbroot of /etc/target over /var/target (bsc#1087274).
- tcm_fileio: Prevent information leak for short reads (bnc#1012382).
- tcp: remove poll() flakes with FastOpen (bnc#1012382).
- tcp: sysctl: Fix a race to avoid unexpected 0 window from space (bnc#1012382).
- team: Fix double free in error path (bnc#1012382).
- test_firmware: fix setting old custom fw path back on exit (bnc#1012382).
- time: Change posix clocks ops interfaces to use timespec64 (bnc#1012382).
- timers, sched_clock: Update timeout for clock wrap (bnc#1012382).
- tools/usbip: fixes build with musl libc toolchain (bnc#1012382).
- tpm_i2c_infineon: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).
- tpm_i2c_nuvoton: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).
- tpm: st33zp24: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).
- tpm/tpm_crb: Use start method value from ACPI table directly (bsc#1084452).
- tracing: probeevent: Fix to support minus offset from symbol (bnc#1012382).
- tty/serial: atmel: add new version check for usart (bnc#1012382).
- tty: vt: fix up tabstops properly (bnc#1012382).
- uas: fix comparison for error code (bnc#1012382).
- ubi: Fix race condition between ubi volume creation and udev (bnc#1012382).
- udplite: fix partial checksum initialization (bnc#1012382).
- usb: Do not print a warning if interface driver rebind is deferred at resume (bsc#1087211).
- usb: dwc2: Make sure we disconnect the gadget state (bnc#1012382).
- usb: gadget: bdc: 64-bit pointer capability check (bnc#1012382).
- usb: gadget: dummy_hcd: Fix wrong power status bit clear/reset in dummy_hub_control() (bnc#1012382).
- usb: gadget: f_fs: Fix use-after-free in ffs_fs_kill_sb() (bnc#1012382).
- usb: gadget: udc: Add missing platform_device_put() on error in bdc_pci_probe() (bnc#1012382).
- usb: quirks: add control message delay for 1b1c:1b20 (bnc#1012382).
- usb: storage: Add JMicron bridge 152d:2567 to unusual_devs.h (bnc#1012382).
- usb: usbmon: Read text within supplied buffer size (bnc#1012382).
- usb: usbmon: remove assignment from IS_ERR argument (bnc#1012382).
- veth: set peer GSO values (bnc#1012382).
- vgacon: Set VGA struct resource types (bnc#1012382).
- video: ARM CLCD: fix dma allocation size (bnc#1012382).
- video: fbdev: udlfb: Fix buffer on stack (bnc#1012382).
- video/hdmi: Allow 'empty' HDMI infoframes (bnc#1012382).
- vxlan: vxlan dev should inherit lowerdev's gso_max_size (bnc#1012382).
- wan: pc300too: abort path on failure (bnc#1012382).
- watchdog: hpwdt: Check source of NMI (bnc#1012382).
- watchdog: hpwdt: fix unused variable warning (bnc#1012382).
- watchdog: hpwdt: SMBIOS check (bnc#1012382).
- watchdog: sbsa: use 32-bit read for WCV (bsc#1085679).
- wil6210: fix memory access violation in wil_memcpy_from/toio_32 (bnc#1012382).
- workqueue: Allow retrieval of current task's work struct (bnc#1012382).
- x86/apic/vector: Handle legacy irq data correctly (bnc#1012382).
- x86/boot/64: Verify alignment of the LOAD segment (bnc#1012382).
- x86/build/64: Force the linker to use 2MB page size (bnc#1012382).
- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).
- x86: i8259: export legacy_pic symbol (bnc#1012382).
- x86/kaiser: Duplicate cpu_tss for an entry trampoline usage (bsc#1077560 bsc#1083836).
- x86/kaiser: enforce trampoline stack alignment (bsc#1087260).
- x86/kaiser: Remove a user mapping of cpu_tss structure (bsc#1077560 bsc#1083836).
- x86/kaiser: Use a per-CPU trampoline stack for kernel entry (bsc#1077560).
- x86/MCE: Serialize sysfs changes (bnc#1012382).
- x86/mm: Fix vmalloc_fault to use pXd_large (bnc#1012382).
- x86/mm: implement free pmd/pte page interfaces (bnc#1012382).
- x86/module: Detect and skip invalid relocations (bnc#1012382).
- x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklist (bsc#1087845).
- x86: Treat R_X86_64_PLT32 as R_X86_64_PC32 (bnc#1012382).
- x86/vm86/32: Fix POPF emulation (bnc#1012382).
- xen-blkfront: fix mq start/stop race (bsc#1085042).
- xen-netback: use skb to determine number of required guest Rx requests (bsc#1046610).
Patchnames: SUSE-SLE-DESKTOP-12-SP3-2018-718,SUSE-SLE-HA-12-SP3-2018-718,SUSE-SLE-Live-Patching-12-SP3-2018-718,SUSE-SLE-SDK-12-SP3-2018-718,SUSE-SLE-SERVER-12-SP3-2018-718,SUSE-SLE-WE-12-SP3-2018-718
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.126 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-1091: In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path, leading to a denial of service (bnc#1087231).\n- CVE-2018-7740: The resv_map_release function in mm/hugetlb.c allowed local users to cause a denial of service (BUG) via a crafted application that made mmap system calls and has a large pgoff argument to the remap_file_pages system call (bnc#1084353).\n- CVE-2018-8043: The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c did not validate certain resource availability, which allowed local users to cause a denial of service (NULL pointer dereference) (bnc#1084829).\n- CVE-2017-18257: The __get_data_block function in fs/f2fs/data.c allowed local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl. (bnc#1088241)\n- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).\n\n\nThe following non-security bugs were fixed:\n\n- acpica: Add header support for TPM2 table changes (bsc#1084452).\n- acpica: Add support for new SRAT subtable (bsc#1085981).\n- acpica: iasl: Update to IORT SMMUv3 disassembling (bsc#1085981).\n- acpi/iort: numa: Add numa node mapping for smmuv3 devices (bsc#1085981).\n- acpi, numa: fix pxm to online numa node associations (bnc#1012382).\n- acpi / pmic: xpower: Fix power_table addresses (bnc#1012382).\n- acpi/processor: Fix error handling in __acpi_processor_start() (bnc#1012382).\n- acpi/processor: Replace racy task affinity logic (bnc#1012382).\n- add mainline tag to various patches to be able to get further work done\n- af_iucv: enable control sends in case of SEND_SHUTDOWN (bnc#1085507, LTC#165135).\n- agp/intel: Flush all chipset writes after updating the GGTT (bnc#1012382).\n- ahci: Add PCI-id for the Highpoint Rocketraid 644L card (bnc#1012382).\n- alsa: aloop: Fix access to not-yet-ready substream via cable (bnc#1012382).\n- alsa: aloop: Sync stale timer before release (bnc#1012382).\n- alsa: firewire-digi00x: handle all MIDI messages on streaming packets (bnc#1012382).\n- alsa: hda: Add a power_save blacklist (bnc#1012382).\n- alsa: hda: add dock and led support for HP EliteBook 820 G3 (bnc#1012382).\n- alsa: hda: add dock and led support for HP ProBook 640 G2 (bnc#1012382).\n- alsa: hda/realtek - Always immediately update mute LED with pin VREF (bnc#1012382).\n- alsa: hda/realtek - Fix dock line-out volume on Dell Precision 7520 (bnc#1012382).\n- alsa: hda/realtek - Fix speaker no sound after system resume (bsc#1031717).\n- alsa: hda - Revert power_save option default value (git-fixes).\n- alsa: pcm: Fix UAF in snd_pcm_oss_get_formats() (bnc#1012382).\n- alsa: usb-audio: Add a quirck for B\u0026W PX headphones (bnc#1012382).\n- alsa: usb-audio: Fix parsing descriptor of UAC2 processing unit (bnc#1012382).\n- apparmor: Make path_max parameter readonly (bnc#1012382).\n- arm64: Add ARM_SMCCC_ARCH_WORKAROUND_1 BP hardening support (bsc#1068032).\n- arm64: Add missing Falkor part number for branch predictor hardening (bsc#1068032).\n- arm64: capabilities: Handle duplicate entries for a capability (bsc#1068032).\n- arm64: cpufeature: __this_cpu_has_cap() shouldn\u0027t stop early (bsc#1068032).\n- arm64 / cpuidle: Use new cpuidle macro for entering retention state (bsc#1084328).\n- arm64: Enforce BBM for huge IO/VMAP mappings (bsc#1088313).\n- arm64: fix smccc compilation (bsc#1068032).\n- arm64: Kill PSCI_GET_VERSION as a variant-2 workaround (bsc#1068032).\n- arm64: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling (bsc#1068032).\n- arm64: KVM: Increment PC after handling an SMC trap (bsc#1068032).\n- arm64: KVM: Report SMCCC_ARCH_WORKAROUND_1 BP hardening support (bsc#1068032).\n- arm64: mm: do not write garbage into TTBR1_EL1 register (bsc#1085487).\n- arm64: mm: fix thinko in non-global page table attribute check (bsc#1088050).\n- arm64: Relax ARM_SMCCC_ARCH_WORKAROUND_1 discovery (bsc#1068032).\n- arm: 8668/1: ftrace: Fix dynamic ftrace with DEBUG_RODATA and !FRAME_POINTER (bnc#1012382).\n- arm/arm64: KVM: Add PSCI_VERSION helper (bsc#1068032).\n- arm/arm64: KVM: Add smccc accessors to PSCI code (bsc#1068032).\n- arm/arm64: KVM: Advertise SMCCC v1.1 (bsc#1068032).\n- arm/arm64: KVM: Consolidate the PSCI include files (bsc#1068032).\n- arm/arm64: KVM: Implement PSCI 1.0 support (bsc#1068032).\n- arm/arm64: KVM: Turn kvm_psci_version into a static inline (bsc#1068032).\n- arm/arm64: smccc: Implement SMCCC v1.1 inline primitive (bsc#1068032).\n- arm/arm64: smccc: Make function identifiers an unsigned quantity (bsc#1068032).\n- arm: DRA7: clockdomain: Change the CLKTRCTRL of CM_PCIE_CLKSTCTRL to SW_WKUP (bnc#1012382).\n- arm: dts: Adjust moxart IRQ controller and flags (bnc#1012382).\n- arm: dts: am335x-pepper: Fix the audio CODEC\u0027s reset pin (bnc#1012382).\n- arm: dts: exynos: Correct Trats2 panel reset line (bnc#1012382).\n- arm: dts: koelsch: Correct clock frequency of X2 DU clock input (bnc#1012382).\n- arm: dts: LogicPD Torpedo: Fix I2C1 pinmux (bnc#1012382).\n- arm: dts: LogicPD Torpedo: Fix I2C1 pinmux (bnc#1012382).\n- arm: dts: omap3-n900: Fix the audio CODEC\u0027s reset pin (bnc#1012382).\n- arm: dts: r8a7790: Correct parent of SSI[0-9] clocks (bnc#1012382).\n- arm: dts: r8a7791: Correct parent of SSI[0-9] clocks (bnc#1012382).\n- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bnc#1012382).\n- asoc: rcar: ssi: do not set SSICR.CKDV = 000 with SSIWSR.CONT (bnc#1012382).\n- ath10k: disallow DFS simulation if DFS channel is not enabled (bnc#1012382).\n- ath10k: fix invalid STS_CAP_OFFSET_MASK (bnc#1012382).\n- ath10k: update tdls teardown state to target (bnc#1012382).\n- ath: Fix updating radar flags for coutry code India (bnc#1012382).\n- batman-adv: handle race condition for claims between gateways (bnc#1012382).\n- bcache: do not attach backing with duplicate UUID (bnc#1012382).\n- blkcg: fix double free of new_blkg in blkcg_init_queue (bnc#1012382).\n- blk-throttle: make sure expire time isn\u0027t too big (bnc#1012382).\n- block: do not assign cmd_flags in __blk_rq_prep_clone (bsc#1088087).\n- block-mq: stop workqueue items in blk_mq_stop_hw_queue() (bsc#1084967).\n- bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174 (bnc#1012382).\n- bluetooth: hci_qca: Avoid setup failure on missing rampatch (bnc#1012382).\n- bnx2x: Align RX buffers (bnc#1012382).\n- bonding: refine bond_fold_stats() wrap detection (bnc#1012382).\n- bpf: fix incorrect sign extension in check_alu_op() (bnc#1012382).\n- bpf: skip unnecessary capability check (bnc#1012382).\n- bpf, x64: implement retpoline for tail call (bnc#1012382).\n- bpf, x64: increase number of passes (bnc#1012382).\n- braille-console: Fix value returned by _braille_console_setup (bnc#1012382).\n- brcmfmac: fix P2P_DEVICE ethernet address generation (bnc#1012382).\n- bridge: check brport attr show in brport_show (bnc#1012382).\n- btrfs: alloc_chunk: fix DUP stripe size handling (bnc#1012382).\n- btrfs: Fix use-after-free when cleaning up fs_devs with a single stale device (bnc#1012382).\n- btrfs: improve delayed refs iterations (bsc#1076033).\n- btrfs: incremental send, fix invalid memory access (git-fixes).\n- btrfs: preserve i_mode if __btrfs_set_acl() fails (bnc#1012382).\n- btrfs: send, fix file hole not being preserved due to inline extent (bnc#1012382).\n- can: cc770: Fix queue stall \u0026 dropped RTR reply (bnc#1012382).\n- can: cc770: Fix stalls on rt-linux, remove redundant IRQ ack (bnc#1012382).\n- can: cc770: Fix use after free in cc770_tx_interrupt() (bnc#1012382).\n- ceph: only dirty ITER_IOVEC pages for direct read (bsc#1084898).\n- ch9200: use skb_cow_head() to deal with cloned skbs (bsc#1088684).\n- clk: bcm2835: Protect sections updating shared registers (bnc#1012382).\n- clk: ns2: Correct SDIO bits (bnc#1012382).\n- clk: qcom: msm8916: fix mnd_width for codec_digcodec (bnc#1012382).\n- clk: si5351: Rename internal plls to avoid name collisions (bnc#1012382).\n- coresight: Fix disabling of CoreSight TPIU (bnc#1012382).\n- coresight: Fixes coresight DT parse to get correct output port ID (bnc#1012382).\n- cpufreq: Fix governor module removal race (bnc#1012382).\n- cpufreq: s3c24xx: Fix broken s3c_cpufreq_init() (bnc#1012382).\n- cpufreq/sh: Replace racy task affinity logic (bnc#1012382).\n- cpuidle: Add new macro to enter a retention idle state (bsc#1084328).\n- cros_ec: fix nul-termination for firmware build info (bnc#1012382).\n- crypto: cavium - fix memory leak on info (bsc#1086518).\n- dcache: Add cond_resched in shrink_dentry_list (bsc#1086194).\n- dccp: check sk for closed state in dccp_sendmsg() (bnc#1012382).\n- dmaengine: imx-sdma: add 1ms delay to ensure SDMA channel is stopped (bnc#1012382).\n- dmaengine: ti-dma-crossbar: Fix event mapping for TPCC_EVT_MUX_60_63 (bnc#1012382).\n- dm: Always copy cmd_flags when cloning a request (bsc#1088087).\n- driver: (adm1275) set the m,b and R coefficients correctly for power (bnc#1012382).\n- drm: Allow determining if current task is output poll worker (bnc#1012382).\n- drm/amdgpu/dce: Do not turn off DP sink when disconnected (bnc#1012382).\n- drm/amdgpu: Fail fb creation from imported dma-bufs. (v2) (bnc#1012382).\n- drm/amdgpu: Fix deadlock on runtime suspend (bnc#1012382).\n- drm/amdgpu: fix KV harvesting (bnc#1012382).\n- drm/amdgpu: Notify sbios device ready before send request (bnc#1012382).\n- drm/amdkfd: Fix memory leaks in kfd topology (bnc#1012382).\n- drm: Defer disabling the vblank IRQ until the next interrupt (for instant-off) (bnc#1012382).\n- drm/edid: set ELD connector type in drm_edid_to_eld() (bnc#1012382).\n- drm/i915/cmdparser: Do not check past the cmd length (bsc#1031717).\n- drm/i915/psr: Check for the specific AUX_FRAME_SYNC cap bit (bsc#1031717).\n- drm/msm: fix leak in failed get_pages (bnc#1012382).\n- drm/nouveau: Fix deadlock on runtime suspend (bnc#1012382).\n- drm/nouveau/kms: Increase max retries in scanout position queries (bnc#1012382).\n- drm/omap: DMM: Check for DMM readiness after successful transaction commit (bnc#1012382).\n- drm: qxl: Do not alloc fbdev if emulation is not supported (bnc#1012382).\n- drm/radeon: Do not turn off DP sink when disconnected (bnc#1012382).\n- drm/radeon: Fail fb creation from imported dma-bufs (bnc#1012382).\n- drm/radeon: Fix deadlock on runtime suspend (bnc#1012382).\n- drm/radeon: fix KV harvesting (bnc#1012382).\n- drm: udl: Properly check framebuffer mmap offsets (bnc#1012382).\n- drm/vmwgfx: Fix a destoy-while-held mutex problem (bnc#1012382).\n- drm/vmwgfx: Fixes to vmwgfx_fb (bnc#1012382).\n- e1000e: Avoid missed interrupts following ICR read (bsc#1075428).\n- e1000e: Avoid receiver overrun interrupt bursts (bsc#1075428).\n- e1000e: Fix check_for_link return value with autoneg off (bsc#1075428).\n- e1000e: Fix link check race condition (bsc#1075428).\n- e1000e: Fix queue interrupt re-raising in Other interrupt (bsc#1075428).\n- e1000e: fix timing for 82579 Gigabit Ethernet controller (bnc#1012382).\n- e1000e: Remove Other from EIAC (bsc#1075428).\n- edac, sb_edac: Fix out of bound writes during DIMM configuration on KNL (git-fixes 3286d3eb906c).\n- ext4: inplace xattr block update fails to deduplicate blocks (bnc#1012382).\n- f2fs: relax node version check for victim data in gc (bnc#1012382).\n- fib_semantics: Do not match route with mismatching tclassid (bnc#1012382).\n- firmware/psci: Expose PSCI conduit (bsc#1068032).\n- firmware/psci: Expose SMCCC version through psci_ops (bsc#1068032).\n- fixup: sctp: verify size of a new chunk in _sctp_make_chunk() (bnc#1012382).\n- fs/aio: Add explicit RCU grace period when freeing kioctx (bnc#1012382).\n- fs/aio: Use RCU accessors for kioctx_table-\u003etable[] (bnc#1012382).\n- fs/hugetlbfs/inode.c: change put_page/unlock_page order in hugetlbfs_fallocate() (git-fixes, bsc#1083745).\n- fs: Teach path_connected to handle nfs filesystems with multiple roots (bnc#1012382).\n- genirq: Track whether the trigger type has been set (git-fixes).\n- genirq: Use irqd_get_trigger_type to compare the trigger type for shared IRQs (bnc#1012382).\n- hdlc_ppp: carrier detect ok, do not turn off negotiation (bnc#1012382).\n- hid: clamp input to logical range if no null state (bnc#1012382).\n- hid: reject input outside logical range only if null state is set (bnc#1012382).\n- hugetlbfs: fix offset overflow in hugetlbfs mmap (bnc#1084353).\n- hv_balloon: fix bugs in num_pages_onlined accounting (fate#323887).\n- hv_balloon: fix printk loglevel (fate#323887).\n- hv_balloon: simplify hv_online_page()/hv_page_online_one() (fate#323887).\n- i2c: i2c-scmi: add a MS HID (bnc#1012382).\n- i2c: xlp9xx: Check for Bus state before every transfer (bsc#1084310).\n- i2c: xlp9xx: Handle NACK on DATA properly (bsc#1084310).\n- i2c: xlp9xx: Handle transactions with I2C_M_RECV_LEN properly (bsc#1060799).\n- i2c: xlp9xx: return ENXIO on slave address NACK (bsc#1060799).\n- i40e: Acquire NVM lock before reads on all devices (bnc#1012382).\n- i40e: avoid NVM acquire deadlock during NVM update (git-fixes).\n- ia64: fix module loading for gcc-5.4 (bnc#1012382).\n- ib/ipoib: Avoid memory leak if the SA returns a different DGID (bnc#1012382).\n- ib/ipoib: Update broadcast object if PKey value was changed in index 0 (bnc#1012382).\n- ib/mlx4: Change vma from shared to private (bnc#1012382).\n- ib/mlx4: Take write semaphore when changing the vma struct (bnc#1012382).\n- ibmvfc: Avoid unnecessary port relogin (bsc#1085404).\n- ibmvnic: Disable irqs before exiting reset from closed state (bsc#1084610).\n- ibmvnic: Do not reset CRQ for Mobility driver resets (bsc#1088600).\n- ibmvnic: Fix DMA mapping mistakes (bsc#1088600).\n- ibmvnic: Fix failover case for non-redundant configuration (bsc#1088600).\n- ibmvnic: Fix reset return from closed state (bsc#1084610).\n- ibmvnic: Fix reset scheduler error handling (bsc#1088600).\n- ibmvnic: Potential NULL dereference in clean_one_tx_pool() (bsc#1085224, git-fixes).\n- ibmvnic: Remove unused TSO resources in TX pool structure (bsc#1085224).\n- ibmvnic: Update TX pool cleaning routine (bsc#1085224).\n- ibmvnic: Zero used TX descriptor counter on reset (bsc#1088600).\n- ib/umem: Fix use of npages/nmap fields (bnc#1012382).\n- ieee802154: 6lowpan: fix possible NULL deref in lowpan_device_event() (bnc#1012382).\n- iio: st_pressure: st_accel: Initialise sensor platform data properly (bnc#1012382).\n- iio: st_pressure: st_accel: pass correct platform data to init (git-fixes).\n- ima: relax requiring a file signature for new files with zero length (bnc#1012382).\n- infiniband/uverbs: Fix integer overflows (bnc#1012382).\n- input: matrix_keypad - fix race when disabling interrupts (bnc#1012382).\n- input: qt1070 - add OF device ID table (bnc#1012382).\n- input: tsc2007 - check for presence and power down tsc2007 during probe (bnc#1012382).\n- iommu/omap: Register driver before setting IOMMU ops (bnc#1012382).\n- iommu/vt-d: clean up pr_irq if request_threaded_irq fails (bnc#1012382).\n- ip6_vti: adjust vti mtu according to mtu of lower device (bnc#1012382).\n- ipmi: do not probe ACPI devices if si_tryacpi is unset (bsc#1060799).\n- ipmi: Fix the I2C address extraction from SPMI tables (bsc#1060799).\n- ipmi_ssif: Fix kernel panic at msg_done_handler (bsc#1088871).\n- ipmi_ssif: Fix logic around alert handling (bsc#1060799).\n- ipmi_ssif: remove redundant null check on array client-\u003eadapter-\u003ename (bsc#1060799).\n- ipmi_ssif: unlock on allocation failure (bsc#1060799).\n- ipmi:ssif: Use i2c_adapter_id instead of adapter-\u003enr (bsc#1060799).\n- ipmi: Use the proper default value for register size in ACPI (bsc#1060799).\n- ipmi/watchdog: fix wdog hang on panic waiting for ipmi response (bnc#1012382).\n- ipv6: fix access to non-linear packet in ndisc_fill_redirect_hdr_option() (bnc#1012382).\n- ipv6 sit: work around bogus gcc-8 -Wrestrict warning (bnc#1012382).\n- ipvlan: add L2 check for packets arriving via virtual devices (bnc#1012382).\n- irqchip/gic-v3-its: Add ACPI NUMA node mapping (bsc#1085981).\n- irqchip/gic-v3-its: Allow GIC ITS number more than MAX_NUMNODES (bsc#1085981).\n- irqchip/gic-v3-its: Ensure nr_ites \u003e= nr_lpis (bnc#1012382).\n- irqchip/gic-v3-its: Remove ACPICA version check for ACPI NUMA (bsc#1085981).\n- kbuild: disable clang\u0027s default use of -fmerge-all-constants (bnc#1012382).\n- kbuild: Handle builtin dtb file names containing hyphens (bnc#1012382).\n- kprobes/x86: Fix kprobe-booster not to boost far call instructions (bnc#1012382).\n- kprobes/x86: Fix to set RWX bits correctly before releasing trampoline (git-fixes).\n- kprobes/x86: Set kprobes pages read-only (bnc#1012382).\n- kvm: arm/arm64: Handle CPU_PM_ENTER_FAILED (bsc#1086499).\n- kvm: arm/arm64: vgic: Add missing irq_lock to vgic_mmio_read_pending (bsc#1086499).\n- kvm: arm/arm64: vgic: Do not populate multiple LRs with the same vintid (bsc#1086499).\n- kvm: arm/arm64: vgic-its: Check result of allocation before use (bsc#).\n- kvm: arm/arm64: vgic-its: Preserve the revious read from the pending table (bsc#1086499).\n- kvm: arm/arm64: vgic-v3: Tighten synchronization for guests using v2 on v3 (bsc#1086499).\n- kvm: mmu: Fix overlap between public and private memslots (bnc#1012382).\n- kvm: nVMX: fix nested tsc scaling (bsc1087999).\n- kvm: PPC: Book3S PR: Exit KVM on failed mapping (bnc#1012382).\n- kvm/x86: fix icebp instruction handling (bnc#1012382).\n- l2tp: do not accept arbitrary sockets (bnc#1012382).\n- libata: Apply NOLPM quirk to Crucial M500 480 and 960GB SSDs (bnc#1012382).\n- libata: Apply NOLPM quirk to Crucial MX100 512GB SSDs (bnc#1012382).\n- libata: disable LPM for Crucial BX100 SSD 500GB drive (bnc#1012382).\n- libata: Enable queued TRIM for Samsung SSD 860 (bnc#1012382).\n- libata: fix length validation of ATAPI-relayed SCSI commands (bnc#1012382).\n- libata: Make Crucial BX100 500GB LPM quirk apply to all firmware versions (bnc#1012382).\n- libata: Modify quirks for MX100 to limit NCQ_TRIM quirk to MU01 version (bnc#1012382).\n- libata: remove WARN() for DMA or PIO command without data (bnc#1012382).\n- lock_parent() needs to recheck if dentry got __dentry_kill\u0027ed under it (bnc#1012382).\n- loop: Fix lost writes caused by missing flag (bnc#1012382).\n- lpfc: update version to 11.4.0.7-1 (bsc#1085383).\n- mac80211: do not parse encrypted management frames in ieee80211_frame_acked (bnc#1012382).\n- mac80211: do not WARN on bad WMM parameters from buggy APs (bsc#1031717).\n- mac80211_hwsim: enforce PS_MANUAL_POLL to be set after PS_ENABLED (bnc#1012382).\n- mac80211: remove BUG() when interface type is invalid (bnc#1012382).\n- md-cluster: fix wrong condition check in raid1_write_request (bsc#1085402).\n- md/raid10: skip spare disk as \u0027first\u0027 disk (bnc#1012382).\n- md/raid10: wait up frozen array in handle_write_completed (bnc#1012382).\n- md/raid6: Fix anomily when recovering a single device in RAID6 (bnc#1012382).\n- media: au0828: fix VIDEO_V4L2 dependency (bsc#1031717).\n- media: bt8xx: Fix err \u0027bt878_probe()\u0027 (bnc#1012382).\n- media: c8sectpfe: fix potential NULL pointer dereference in c8sectpfe_timer_interrupt (bnc#1012382).\n- media: cpia2: Fix a couple off by one bugs (bnc#1012382).\n- media: cx25821: prevent out-of-bounds read on array card (bsc#1031717).\n- media/dvb-core: Race condition when writing to CAM (bnc#1012382).\n- media: i2c/soc_camera: fix ov6650 sensor getting wrong clock (bnc#1012382).\n- media: m88ds3103: do not call a non-initalized function (bnc#1012382).\n- media: [RESEND] media: dvb-frontends: Add delay to Si2168 restart (bnc#1012382).\n- media: s3c-camif: fix out-of-bounds array access (bsc#1031717).\n- mfd: palmas: Reset the POWERHOLD mux during power off (bnc#1012382).\n- mmc: avoid removing non-removable hosts during suspend (bnc#1012382).\n- mmc: dw_mmc: fix falling from idmac to PIO mode when dw_mci_reset occurs (bnc#1012382).\n- mmc: dw_mmc: Fix the DTO/CTO timeout overflow calculation for 32-bit systems (bsc#1088267).\n- mmc: sdhci-of-esdhc: limit SD clock for ls1012a/ls1046a (bnc#1012382).\n- mm: Fix false-positive VM_BUG_ON() in page_cache_{get,add}_speculative() (bnc#1012382).\n- mm/hugetlb.c: do not call region_abort if region_chg fails (bnc#1084353).\n- mm/vmalloc: add interfaces to free unmapped page table (bnc#1012382).\n- mpls, nospec: Sanitize array index in mpls_label_ok() (bnc#1012382).\n- mt7601u: check return value of alloc_skb (bnc#1012382).\n- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bnc#1012382).\n- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bnc#1012382).\n- mtip32xx: use runtime tag to initialize command header (bnc#1012382).\n- net/8021q: create device with all possible features in wanted_features (bnc#1012382).\n- net: ethernet: arc: Fix a potential memory leak if an optional regulator is deferred (bnc#1012382).\n- net: ethernet: ti: cpsw: add check for in-band mode setting with RGMII PHY interface (bnc#1012382).\n- net/faraday: Add missing include of of.h (bnc#1012382).\n- net: fec: Fix unbalanced PM runtime calls (bnc#1012382).\n- netfilter: add back stackpointer size checks (bnc#1012382).\n- netfilter: bridge: ebt_among: add missing match size checks (bnc#1012382).\n- netfilter: IDLETIMER: be syzkaller friendly (bnc#1012382).\n- netfilter: ipv6: fix use-after-free Write in nf_nat_ipv6_manip_pkt (bnc#1012382).\n- netfilter: nat: cope with negative port range (bnc#1012382).\n- netfilter: use skb_to_full_sk in ip_route_me_harder (bnc#1012382).\n- netfilter: x_tables: fix missing timer initialization in xt_LED (bnc#1012382).\n- netfilter: xt_CT: fix refcnt leak on error path (bnc#1012382).\n- net: Fix hlist corruptions in inet_evict_bucket() (bnc#1012382).\n- net: fix race on decreasing number of TX queues (bnc#1012382).\n- net: hns: Fix ethtool private flags (bsc#1085511).\n- net: ipv4: avoid unused variable warning for sysctl (git-fixes).\n- net: ipv4: do not allow setting net.ipv4.route.min_pmtu below 68 (bnc#1012382).\n- net: ipv6: send unsolicited NA after DAD (git-fixes).\n- net: ipv6: send unsolicited NA on admin up (bnc#1012382).\n- net/iucv: Free memory obtained by kzalloc (bnc#1012382).\n- netlink: avoid a double skb free in genlmsg_mcast() (bnc#1012382).\n- netlink: ensure to loop over all netns in genlmsg_multicast_allns() (bnc#1012382).\n- net: mpls: Pull common label check into helper (bnc#1012382).\n- net: Only honor ifindex in IP_PKTINFO if non-0 (bnc#1012382).\n- net: systemport: Rewrite __bcm_sysport_tx_reclaim() (bnc#1012382).\n- net: xfrm: allow clearing socket xfrm policies (bnc#1012382).\n- nfc: nfcmrvl: double free on error path (bnc#1012382).\n- nfc: nfcmrvl: Include unaligned.h instead of access_ok.h (bnc#1012382).\n- nfsd4: permit layoutget of executable-only files (bnc#1012382).\n- nfs: Fix an incorrect type in struct nfs_direct_req (bnc#1012382).\n- nospec: Allow index argument to have const-qualified type (bnc#1012382).\n- nospec: Include \u003casm/barrier.h\u003e dependency (bnc#1012382).\n- nvme: do not send keep-alive frames during reset (bsc#1084223).\n- nvme: do not send keep-alives to the discovery controller (bsc#1086607).\n- nvme: expand nvmf_check_if_ready checks (bsc#1085058).\n- nvme/rdma: do no start error recovery twice (bsc#1084967).\n- nvmet_fc: prevent new io rqsts in possible isr completions (bsc#1083574).\n- of: fix of_device_get_modalias returned length when truncating buffers (bnc#1012382).\n- openvswitch: Delete conntrack entry clashing with an expectation (bnc#1012382).\n- Partial revert \u0027e1000e: Avoid receiver overrun interrupt bursts\u0027 (bsc#1075428).\n- pci/ACPI: Fix bus range comparison in pci_mcfg_lookup() (bsc#1084699).\n- pci: Add function 1 DMA alias quirk for Highpoint RocketRAID 644L (bnc#1012382).\n- pci: Add pci_reset_function_locked() (bsc#1084889).\n- pci: Apply Cavium ACS quirk only to CN81xx/CN83xx/CN88xx devices (bsc#1084914).\n- pci: Avoid FLR for Intel 82579 NICs (bsc#1084889).\n- pci: Avoid slot reset if bridge itself is broken (bsc#1084918).\n- pci: Export pcie_flr() (bsc#1084889).\n- pci: hv: Fix 2 hang issues in hv_compose_msi_msg() (fate#323887, bsc#1087659, bsc#1087906).\n- pci: hv: Fix a comment typo in _hv_pcifront_read_config() (fate#323887, bsc#1087659).\n- pci: hv: Only queue new work items in hv_pci_devices_present() if necessary (fate#323887, bsc#1087659).\n- pci: hv: Remove the bogus test in hv_eject_device_work() (fate#323887, bsc#1087659).\n- pci: hv: Serialize the present and eject work items (fate#323887, bsc#1087659).\n- pci: Mark Haswell Power Control Unit as having non-compliant BARs (bsc#1086015).\n- pci/MSI: Stop disabling MSI/MSI-X in pci_device_shutdown() (bnc#1012382).\n- pci: Probe for device reset support during enumeration (bsc#1084889).\n- pci: Protect pci_error_handlers-\u003ereset_notify() usage with device_lock() (bsc#1084889).\n- pci: Protect restore with device lock to be consistent (bsc#1084889).\n- pci: Remove __pci_dev_reset() and pci_dev_reset() (bsc#1084889).\n- pci: Remove redundant probes for device reset support (bsc#1084889).\n- pci: Wait for up to 1000ms after FLR reset (bsc#1084889).\n- perf inject: Copy events when reordering events in pipe mode (bnc#1012382).\n- perf probe: Return errno when not hitting any event (bnc#1012382).\n- perf session: Do not rely on evlist in pipe mode (bnc#1012382).\n- perf sort: Fix segfault with basic block \u0027cycles\u0027 sort dimension (bnc#1012382).\n- perf tests kmod-path: Do not fail if compressed modules are not supported (bnc#1012382).\n- perf tools: Make perf_event__synthesize_mmap_events() scale (bnc#1012382).\n- perf/x86/intel: Do not accidentally clear high bits in bdw_limit_period() (bnc#1012382).\n- perf/x86/intel/uncore: Fix multi-domain PCI CHA enumeration bug on Skylake servers (bsc#1086357).\n- pinctrl: Really force states during suspend/resume (bnc#1012382).\n- platform/chrome: Use proper protocol transfer function (bnc#1012382).\n- platform/x86: asus-nb-wmi: Add wapf4 quirk for the X302UA (bnc#1012382).\n- power: supply: pda_power: move from timer to delayed_work (bnc#1012382).\n- ppp: prevent unregistered channels from connecting to PPP units (bnc#1012382).\n- pty: cancel pty slave port buf\u0027s work in tty_release (bnc#1012382).\n- pwm: tegra: Increase precision in PWM rate calculation (bnc#1012382).\n- qed: Free RoCE ILT Memory on rmmod qedr (bsc#1019695 FATE#321703 bsc#1019699 FATE#321702 bsc#1022604 FATE#321747).\n- qed: Use after free in qed_rdma_free() (bsc#1019695 FATE#321703 bsc#1019699 FATE#321702 bsc#1022604 FATE#321747).\n- qeth: repair SBAL elements calculation (bnc#1085507, LTC#165484).\n- qlcnic: fix unchecked return value (bnc#1012382).\n- rcutorture/configinit: Fix build directory error message (bnc#1012382).\n- rdma/cma: Use correct size when writing netlink stats (bnc#1012382).\n- rdma/core: Do not use invalid destination in determining port reuse (FATE#321231 FATE#321473 FATE#322153 FATE#322149).\n- rdma/iwpm: Fix uninitialized error code in iwpm_send_mapinfo() (bnc#1012382).\n- rdma/mlx5: Fix integer overflow while resizing CQ (bnc#1012382).\n- rdma/ocrdma: Fix permissions for OCRDMA_RESET_STATS (bnc#1012382).\n- rdma/ucma: Check that user does not overflow QP state (bnc#1012382).\n- rdma/ucma: Fix access to non-initialized CM_ID object (bnc#1012382).\n- rdma/ucma: Limit possible option size (bnc#1012382).\n- regmap: Do not use format_val in regmap_bulk_read (bsc#1031717).\n- regmap: Fix reversed bounds check in regmap_raw_write() (bsc#1031717).\n- regmap: Format data for raw write in regmap_bulk_write (bsc#1031717).\n- regmap-i2c: Off by one in regmap_i2c_smbus_i2c_read/write() (bsc#1031717).\n- regulator: anatop: set default voltage selector for pcie (bnc#1012382).\n- reiserfs: Make cancel_old_flush() reliable (bnc#1012382).\n- Revert \u0027ARM: dts: LogicPD Torpedo: Fix I2C1 pinmux\u0027 (bnc#1012382).\n- Revert \u0027e1000e: Separate signaling for link check/link up\u0027 (bsc#1075428).\n- Revert \u0027genirq: Use irqd_get_trigger_type to compare the trigger type for shared IRQs\u0027 (bnc#1012382).\n- Revert \u0027ipvlan: add L2 check for packets arriving via virtual devices\u0027 (reverted in upstream).\n- Revert \u0027led: core: Fix brightness setting when setting delay_off=0\u0027 (bnc#1012382).\n- rndis_wlan: add return value validation (bnc#1012382).\n- rtc: cmos: Do not assume irq 8 for rtc when there are no legacy irqs (bnc#1012382).\n- rtlwifi: rtl8723be: Fix loss of signal (bnc#1012382).\n- rtlwifi: rtl_pci: Fix the bug when inactiveps is enabled (bnc#1012382).\n- s390/mm: fix local TLB flushing vs. detach of an mm address space (bnc#1088324, LTC#166470).\n- s390/mm: fix race on mm-\u003econtext.flush_mm (bnc#1088324, LTC#166470).\n- s390/mm: no local TLB flush for clearing-by-ASCE IDTE (bnc#1088324, LTC#166470).\n- s390/qeth: apply takeover changes when mode is toggled (bnc#1085507, LTC#165490).\n- s390/qeth: do not apply takeover changes to RXIP (bnc#1085507, LTC#165490).\n- s390/qeth: fix double-free on IP add/remove race (bnc#1085507, LTC#165491).\n- s390/qeth: fix IPA command submission race (bnc#1012382).\n- s390/qeth: fix IP address lookup for L3 devices (bnc#1085507, LTC#165491).\n- s390/qeth: fix IP removal on offline cards (bnc#1085507, LTC#165491).\n- s390/qeth: fix SETIP command handling (bnc#1012382).\n- s390/qeth: free netdevice when removing a card (bnc#1012382).\n- s390/qeth: improve error reporting on IP add/removal (bnc#1085507, LTC#165491).\n- s390/qeth: lock IP table while applying takeover changes (bnc#1085507, LTC#165490).\n- s390/qeth: lock read device while queueing next buffer (bnc#1012382).\n- s390/qeth: on channel error, reject further cmd requests (bnc#1012382).\n- s390/qeth: update takeover IPs after configuration change (bnc#1085507, LTC#165490).\n- s390/qeth: when thread completes, wake up all waiters (bnc#1012382).\n- sched: act_csum: do not mangle TCP and UDP GSO packets (bnc#1012382).\n- sched: Stop resched_cpu() from sending IPIs to offline CPUs (bnc#1012382).\n- sched: Stop switched_to_rt() from sending IPIs to offline CPUs (bnc#1012382).\n- scsi: core: scsi_get_device_flags_keyed(): Always return device flags (bnc#1012382).\n- scsi: devinfo: apply to HP XP the same flags as Hitachi VSP (bnc#1012382).\n- scsi: dh: add new rdac devices (bnc#1012382).\n- scsi: lpfc: Add missing unlock in WQ full logic (bsc#1085383).\n- scsi: lpfc: Code cleanup for 128byte wqe data type (bsc#1085383).\n- scsi: lpfc: Fix mailbox wait for POST_SGL mbox command (bsc#1085383).\n- scsi: lpfc: Fix NVME Initiator FirstBurst (bsc#1085383).\n- scsi: lpfc: Fix SCSI lun discovery when port configured for both SCSI and NVME (bsc#1085383).\n- scsi: lpfc: Memory allocation error during driver start-up on power8 (bsc#1085383).\n- scsi: mac_esp: Replace bogus memory barrier with spinlock (bnc#1012382).\n- scsi: sg: check for valid direction before starting the request (bnc#1012382).\n- scsi: sg: fix SG_DXFER_FROM_DEV transfers (bnc#1012382).\n- scsi: sg: fix static checker warning in sg_is_valid_dxfer (bnc#1012382).\n- scsi: sg: only check for dxfer_len greater than 256M (bnc#1012382 bsc#1064206).\n- scsi: virtio_scsi: always read VPD pages for multiqueue too (git-fixes).\n- scsi: virtio_scsi: Always try to read VPD pages (bnc#1012382).\n- sctp: fix dst refcnt leak in sctp_v4_get_dst (bnc#1012382).\n- sctp: fix dst refcnt leak in sctp_v6_get_dst() (bnc#1012382).\n- sctp: verify size of a new chunk in _sctp_make_chunk() (bnc#1012382).\n- selftests/x86: Add tests for the STR and SLDT instructions (bnc#1012382).\n- selftests/x86: Add tests for User-Mode Instruction Prevention (bnc#1012382).\n- selftests/x86/entry_from_vm86: Add test cases for POPF (bnc#1012382).\n- selftests/x86/entry_from_vm86: Exit with 1 if we fail (bnc#1012382).\n- selinux: check for address length in selinux_socket_bind() (bnc#1012382).\n- serial: 8250_pci: Add Brainboxes UC-260 4 port serial device (bnc#1012382).\n- serial: sh-sci: prevent lockup on full TTY buffers (bnc#1012382).\n- skbuff: Fix not waking applications when errors are enqueued (bnc#1012382).\n- sm501fb: do not return zero on failure path in sm501fb_start() (bnc#1012382).\n- solo6x10: release vb2 buffers in solo_stop_streaming() (bnc#1012382).\n- spi: dw: Disable clock after unregistering the host (bnc#1012382).\n- spi: omap2-mcspi: poll OMAP2_MCSPI_CHSTAT_RXS for PIO transfer (bnc#1012382).\n- spi: sun6i: disable/unprepare clocks on remove (bnc#1012382).\n- staging: android: ashmem: Fix lockdep issue during llseek (bnc#1012382).\n- staging: android: ashmem: Fix possible deadlock in ashmem_ioctl (bnc#1012382).\n- staging: comedi: fix comedi_nsamples_left (bnc#1012382).\n- staging: lustre: ptlrpc: kfree used instead of kvfree (bnc#1012382).\n- staging: ncpfs: memory corruption in ncp_read_kernel() (bnc#1012382).\n- staging: speakup: Replace BUG_ON() with WARN_ON() (bnc#1012382).\n- staging: unisys: visorhba: fix s-Par to boot with option CONFIG_VMAP_STACK set to y (bnc#1012382).\n- staging: wilc1000: add check for kmalloc allocation failure (bnc#1012382).\n- staging: wilc1000: fix unchecked return value (bnc#1012382).\n- sysrq: Reset the watchdog timers while displaying high-resolution timers (bnc#1012382).\n- target: prefer dbroot of /etc/target over /var/target (bsc#1087274).\n- tcm_fileio: Prevent information leak for short reads (bnc#1012382).\n- tcp: remove poll() flakes with FastOpen (bnc#1012382).\n- tcp: sysctl: Fix a race to avoid unexpected 0 window from space (bnc#1012382).\n- team: Fix double free in error path (bnc#1012382).\n- test_firmware: fix setting old custom fw path back on exit (bnc#1012382).\n- time: Change posix clocks ops interfaces to use timespec64 (bnc#1012382).\n- timers, sched_clock: Update timeout for clock wrap (bnc#1012382).\n- tools/usbip: fixes build with musl libc toolchain (bnc#1012382).\n- tpm_i2c_infineon: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).\n- tpm_i2c_nuvoton: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).\n- tpm: st33zp24: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).\n- tpm/tpm_crb: Use start method value from ACPI table directly (bsc#1084452).\n- tracing: probeevent: Fix to support minus offset from symbol (bnc#1012382).\n- tty/serial: atmel: add new version check for usart (bnc#1012382).\n- tty: vt: fix up tabstops properly (bnc#1012382).\n- uas: fix comparison for error code (bnc#1012382).\n- ubi: Fix race condition between ubi volume creation and udev (bnc#1012382).\n- udplite: fix partial checksum initialization (bnc#1012382).\n- usb: Do not print a warning if interface driver rebind is deferred at resume (bsc#1087211).\n- usb: dwc2: Make sure we disconnect the gadget state (bnc#1012382).\n- usb: gadget: bdc: 64-bit pointer capability check (bnc#1012382).\n- usb: gadget: dummy_hcd: Fix wrong power status bit clear/reset in dummy_hub_control() (bnc#1012382).\n- usb: gadget: f_fs: Fix use-after-free in ffs_fs_kill_sb() (bnc#1012382).\n- usb: gadget: udc: Add missing platform_device_put() on error in bdc_pci_probe() (bnc#1012382).\n- usb: quirks: add control message delay for 1b1c:1b20 (bnc#1012382).\n- usb: storage: Add JMicron bridge 152d:2567 to unusual_devs.h (bnc#1012382).\n- usb: usbmon: Read text within supplied buffer size (bnc#1012382).\n- usb: usbmon: remove assignment from IS_ERR argument (bnc#1012382).\n- veth: set peer GSO values (bnc#1012382).\n- vgacon: Set VGA struct resource types (bnc#1012382).\n- video: ARM CLCD: fix dma allocation size (bnc#1012382).\n- video: fbdev: udlfb: Fix buffer on stack (bnc#1012382).\n- video/hdmi: Allow \u0027empty\u0027 HDMI infoframes (bnc#1012382).\n- vxlan: vxlan dev should inherit lowerdev\u0027s gso_max_size (bnc#1012382).\n- wan: pc300too: abort path on failure (bnc#1012382).\n- watchdog: hpwdt: Check source of NMI (bnc#1012382).\n- watchdog: hpwdt: fix unused variable warning (bnc#1012382).\n- watchdog: hpwdt: SMBIOS check (bnc#1012382).\n- watchdog: sbsa: use 32-bit read for WCV (bsc#1085679).\n- wil6210: fix memory access violation in wil_memcpy_from/toio_32 (bnc#1012382).\n- workqueue: Allow retrieval of current task\u0027s work struct (bnc#1012382).\n- x86/apic/vector: Handle legacy irq data correctly (bnc#1012382).\n- x86/boot/64: Verify alignment of the LOAD segment (bnc#1012382).\n- x86/build/64: Force the linker to use 2MB page size (bnc#1012382).\n- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).\n- x86: i8259: export legacy_pic symbol (bnc#1012382).\n- x86/kaiser: Duplicate cpu_tss for an entry trampoline usage (bsc#1077560 bsc#1083836).\n- x86/kaiser: enforce trampoline stack alignment (bsc#1087260).\n- x86/kaiser: Remove a user mapping of cpu_tss structure (bsc#1077560 bsc#1083836).\n- x86/kaiser: Use a per-CPU trampoline stack for kernel entry (bsc#1077560).\n- x86/MCE: Serialize sysfs changes (bnc#1012382).\n- x86/mm: Fix vmalloc_fault to use pXd_large (bnc#1012382).\n- x86/mm: implement free pmd/pte page interfaces (bnc#1012382).\n- x86/module: Detect and skip invalid relocations (bnc#1012382).\n- x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklist (bsc#1087845).\n- x86: Treat R_X86_64_PLT32 as R_X86_64_PC32 (bnc#1012382).\n- x86/vm86/32: Fix POPF emulation (bnc#1012382).\n- xen-blkfront: fix mq start/stop race (bsc#1085042).\n- xen-netback: use skb to determine number of required guest Rx requests (bsc#1046610).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP3-2018-718,SUSE-SLE-HA-12-SP3-2018-718,SUSE-SLE-Live-Patching-12-SP3-2018-718,SUSE-SLE-SDK-12-SP3-2018-718,SUSE-SLE-SERVER-12-SP3-2018-718,SUSE-SLE-WE-12-SP3-2018-718",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1048-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1048-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181048-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1048-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003954.html"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1019695",
"url": "https://bugzilla.suse.com/1019695"
},
{
"category": "self",
"summary": "SUSE Bug 1019699",
"url": "https://bugzilla.suse.com/1019699"
},
{
"category": "self",
"summary": "SUSE Bug 1022604",
"url": "https://bugzilla.suse.com/1022604"
},
{
"category": "self",
"summary": "SUSE Bug 1031717",
"url": "https://bugzilla.suse.com/1031717"
},
{
"category": "self",
"summary": "SUSE Bug 1046610",
"url": "https://bugzilla.suse.com/1046610"
},
{
"category": "self",
"summary": "SUSE Bug 1060799",
"url": "https://bugzilla.suse.com/1060799"
},
{
"category": "self",
"summary": "SUSE Bug 1064206",
"url": "https://bugzilla.suse.com/1064206"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1073059",
"url": "https://bugzilla.suse.com/1073059"
},
{
"category": "self",
"summary": "SUSE Bug 1073069",
"url": "https://bugzilla.suse.com/1073069"
},
{
"category": "self",
"summary": "SUSE Bug 1075428",
"url": "https://bugzilla.suse.com/1075428"
},
{
"category": "self",
"summary": "SUSE Bug 1076033",
"url": "https://bugzilla.suse.com/1076033"
},
{
"category": "self",
"summary": "SUSE Bug 1077560",
"url": "https://bugzilla.suse.com/1077560"
},
{
"category": "self",
"summary": "SUSE Bug 1083574",
"url": "https://bugzilla.suse.com/1083574"
},
{
"category": "self",
"summary": "SUSE Bug 1083745",
"url": "https://bugzilla.suse.com/1083745"
},
{
"category": "self",
"summary": "SUSE Bug 1083836",
"url": "https://bugzilla.suse.com/1083836"
},
{
"category": "self",
"summary": "SUSE Bug 1084223",
"url": "https://bugzilla.suse.com/1084223"
},
{
"category": "self",
"summary": "SUSE Bug 1084310",
"url": "https://bugzilla.suse.com/1084310"
},
{
"category": "self",
"summary": "SUSE Bug 1084328",
"url": "https://bugzilla.suse.com/1084328"
},
{
"category": "self",
"summary": "SUSE Bug 1084353",
"url": "https://bugzilla.suse.com/1084353"
},
{
"category": "self",
"summary": "SUSE Bug 1084452",
"url": "https://bugzilla.suse.com/1084452"
},
{
"category": "self",
"summary": "SUSE Bug 1084610",
"url": "https://bugzilla.suse.com/1084610"
},
{
"category": "self",
"summary": "SUSE Bug 1084699",
"url": "https://bugzilla.suse.com/1084699"
},
{
"category": "self",
"summary": "SUSE Bug 1084829",
"url": "https://bugzilla.suse.com/1084829"
},
{
"category": "self",
"summary": "SUSE Bug 1084889",
"url": "https://bugzilla.suse.com/1084889"
},
{
"category": "self",
"summary": "SUSE Bug 1084898",
"url": "https://bugzilla.suse.com/1084898"
},
{
"category": "self",
"summary": "SUSE Bug 1084914",
"url": "https://bugzilla.suse.com/1084914"
},
{
"category": "self",
"summary": "SUSE Bug 1084918",
"url": "https://bugzilla.suse.com/1084918"
},
{
"category": "self",
"summary": "SUSE Bug 1084967",
"url": "https://bugzilla.suse.com/1084967"
},
{
"category": "self",
"summary": "SUSE Bug 1085042",
"url": "https://bugzilla.suse.com/1085042"
},
{
"category": "self",
"summary": "SUSE Bug 1085058",
"url": "https://bugzilla.suse.com/1085058"
},
{
"category": "self",
"summary": "SUSE Bug 1085224",
"url": "https://bugzilla.suse.com/1085224"
},
{
"category": "self",
"summary": "SUSE Bug 1085383",
"url": "https://bugzilla.suse.com/1085383"
},
{
"category": "self",
"summary": "SUSE Bug 1085402",
"url": "https://bugzilla.suse.com/1085402"
},
{
"category": "self",
"summary": "SUSE Bug 1085404",
"url": "https://bugzilla.suse.com/1085404"
},
{
"category": "self",
"summary": "SUSE Bug 1085487",
"url": "https://bugzilla.suse.com/1085487"
},
{
"category": "self",
"summary": "SUSE Bug 1085507",
"url": "https://bugzilla.suse.com/1085507"
},
{
"category": "self",
"summary": "SUSE Bug 1085511",
"url": "https://bugzilla.suse.com/1085511"
},
{
"category": "self",
"summary": "SUSE Bug 1085679",
"url": "https://bugzilla.suse.com/1085679"
},
{
"category": "self",
"summary": "SUSE Bug 1085981",
"url": "https://bugzilla.suse.com/1085981"
},
{
"category": "self",
"summary": "SUSE Bug 1086015",
"url": "https://bugzilla.suse.com/1086015"
},
{
"category": "self",
"summary": "SUSE Bug 1086162",
"url": "https://bugzilla.suse.com/1086162"
},
{
"category": "self",
"summary": "SUSE Bug 1086194",
"url": "https://bugzilla.suse.com/1086194"
},
{
"category": "self",
"summary": "SUSE Bug 1086357",
"url": "https://bugzilla.suse.com/1086357"
},
{
"category": "self",
"summary": "SUSE Bug 1086499",
"url": "https://bugzilla.suse.com/1086499"
},
{
"category": "self",
"summary": "SUSE Bug 1086518",
"url": "https://bugzilla.suse.com/1086518"
},
{
"category": "self",
"summary": "SUSE Bug 1086607",
"url": "https://bugzilla.suse.com/1086607"
},
{
"category": "self",
"summary": "SUSE Bug 1087088",
"url": "https://bugzilla.suse.com/1087088"
},
{
"category": "self",
"summary": "SUSE Bug 1087211",
"url": "https://bugzilla.suse.com/1087211"
},
{
"category": "self",
"summary": "SUSE Bug 1087231",
"url": "https://bugzilla.suse.com/1087231"
},
{
"category": "self",
"summary": "SUSE Bug 1087260",
"url": "https://bugzilla.suse.com/1087260"
},
{
"category": "self",
"summary": "SUSE Bug 1087274",
"url": "https://bugzilla.suse.com/1087274"
},
{
"category": "self",
"summary": "SUSE Bug 1087659",
"url": "https://bugzilla.suse.com/1087659"
},
{
"category": "self",
"summary": "SUSE Bug 1087845",
"url": "https://bugzilla.suse.com/1087845"
},
{
"category": "self",
"summary": "SUSE Bug 1087906",
"url": "https://bugzilla.suse.com/1087906"
},
{
"category": "self",
"summary": "SUSE Bug 1087999",
"url": "https://bugzilla.suse.com/1087999"
},
{
"category": "self",
"summary": "SUSE Bug 1088050",
"url": "https://bugzilla.suse.com/1088050"
},
{
"category": "self",
"summary": "SUSE Bug 1088087",
"url": "https://bugzilla.suse.com/1088087"
},
{
"category": "self",
"summary": "SUSE Bug 1088241",
"url": "https://bugzilla.suse.com/1088241"
},
{
"category": "self",
"summary": "SUSE Bug 1088267",
"url": "https://bugzilla.suse.com/1088267"
},
{
"category": "self",
"summary": "SUSE Bug 1088313",
"url": "https://bugzilla.suse.com/1088313"
},
{
"category": "self",
"summary": "SUSE Bug 1088324",
"url": "https://bugzilla.suse.com/1088324"
},
{
"category": "self",
"summary": "SUSE Bug 1088600",
"url": "https://bugzilla.suse.com/1088600"
},
{
"category": "self",
"summary": "SUSE Bug 1088684",
"url": "https://bugzilla.suse.com/1088684"
},
{
"category": "self",
"summary": "SUSE Bug 1088871",
"url": "https://bugzilla.suse.com/1088871"
},
{
"category": "self",
"summary": "SUSE Bug 802154",
"url": "https://bugzilla.suse.com/802154"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18257 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18257/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1091 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1091/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7740 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8043 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8043/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8822 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8822/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-04-23T15:08:46Z",
"generator": {
"date": "2018-04-23T15:08:46Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1048-1",
"initial_release_date": "2018-04-23T15:08:46Z",
"revision_history": [
{
"date": "2018-04-23T15:08:46Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-obs-build-4.4.126-94.22.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.126-94.22.1.aarch64",
"product_id": "kernel-obs-build-4.4.126-94.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.126-94.22.1.aarch64",
"product": {
"name": "kernel-default-4.4.126-94.22.1.aarch64",
"product_id": "kernel-default-4.4.126-94.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.126-94.22.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.126-94.22.1.aarch64",
"product_id": "kernel-default-base-4.4.126-94.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.126-94.22.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.126-94.22.1.aarch64",
"product_id": "kernel-default-devel-4.4.126-94.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.126-94.22.1.aarch64",
"product": {
"name": "kernel-syms-4.4.126-94.22.1.aarch64",
"product_id": "kernel-syms-4.4.126-94.22.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.126-94.22.2.noarch",
"product": {
"name": "kernel-devel-4.4.126-94.22.2.noarch",
"product_id": "kernel-devel-4.4.126-94.22.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.126-94.22.2.noarch",
"product": {
"name": "kernel-macros-4.4.126-94.22.2.noarch",
"product_id": "kernel-macros-4.4.126-94.22.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.126-94.22.2.noarch",
"product": {
"name": "kernel-source-4.4.126-94.22.2.noarch",
"product_id": "kernel-source-4.4.126-94.22.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.126-94.22.1.noarch",
"product": {
"name": "kernel-docs-4.4.126-94.22.1.noarch",
"product_id": "kernel-docs-4.4.126-94.22.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.126-94.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.126-94.22.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.126-94.22.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.126-94.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.126-94.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.126-94.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
"product_id": "kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.126-94.22.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.126-94.22.1.ppc64le",
"product_id": "kernel-obs-build-4.4.126-94.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.126-94.22.1.ppc64le",
"product": {
"name": "kernel-default-4.4.126-94.22.1.ppc64le",
"product_id": "kernel-default-4.4.126-94.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.126-94.22.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.126-94.22.1.ppc64le",
"product_id": "kernel-default-base-4.4.126-94.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.126-94.22.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.126-94.22.1.ppc64le",
"product_id": "kernel-default-devel-4.4.126-94.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.126-94.22.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.126-94.22.1.ppc64le",
"product_id": "kernel-syms-4.4.126-94.22.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.126-94.22.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.126-94.22.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.126-94.22.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.126-94.22.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.126-94.22.1.s390x",
"product_id": "dlm-kmp-default-4.4.126-94.22.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.126-94.22.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.126-94.22.1.s390x",
"product_id": "gfs2-kmp-default-4.4.126-94.22.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.126-94.22.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.126-94.22.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.126-94.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.126-94.22.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.126-94.22.1.s390x",
"product_id": "kernel-obs-build-4.4.126-94.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.126-94.22.1.s390x",
"product": {
"name": "kernel-default-4.4.126-94.22.1.s390x",
"product_id": "kernel-default-4.4.126-94.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.126-94.22.1.s390x",
"product": {
"name": "kernel-default-base-4.4.126-94.22.1.s390x",
"product_id": "kernel-default-base-4.4.126-94.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.126-94.22.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.126-94.22.1.s390x",
"product_id": "kernel-default-devel-4.4.126-94.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.126-94.22.1.s390x",
"product": {
"name": "kernel-default-man-4.4.126-94.22.1.s390x",
"product_id": "kernel-default-man-4.4.126-94.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.126-94.22.1.s390x",
"product": {
"name": "kernel-syms-4.4.126-94.22.1.s390x",
"product_id": "kernel-syms-4.4.126-94.22.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.4.126-94.22.1.x86_64",
"product": {
"name": "kernel-default-4.4.126-94.22.1.x86_64",
"product_id": "kernel-default-4.4.126-94.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.126-94.22.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.126-94.22.1.x86_64",
"product_id": "kernel-default-devel-4.4.126-94.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.126-94.22.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.126-94.22.1.x86_64",
"product_id": "kernel-default-extra-4.4.126-94.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.126-94.22.1.x86_64",
"product": {
"name": "kernel-syms-4.4.126-94.22.1.x86_64",
"product_id": "kernel-syms-4.4.126-94.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.126-94.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.126-94.22.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.126-94.22.1.x86_64",
"product_id": "dlm-kmp-default-4.4.126-94.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.126-94.22.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.126-94.22.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.126-94.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.126-94.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
"product_id": "kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.126-94.22.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.126-94.22.1.x86_64",
"product_id": "kernel-obs-build-4.4.126-94.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.126-94.22.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.126-94.22.1.x86_64",
"product_id": "kernel-default-base-4.4.126-94.22.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64"
},
"product_reference": "kernel-default-4.4.126-94.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.126-94.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
},
"product_reference": "kernel-default-extra-4.4.126-94.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.126-94.22.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch"
},
"product_reference": "kernel-devel-4.4.126-94.22.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.126-94.22.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch"
},
"product_reference": "kernel-macros-4.4.126-94.22.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.126-94.22.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch"
},
"product_reference": "kernel-source-4.4.126-94.22.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64"
},
"product_reference": "kernel-syms-4.4.126-94.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.4.126-94.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.4.126-94.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x"
},
"product_reference": "dlm-kmp-default-4.4.126-94.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.4.126-94.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.4.126-94.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.4.126-94.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.4.126-94.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.4.126-94.22.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch"
},
"product_reference": "kernel-docs-4.4.126-94.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.126-94.22.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64"
},
"product_reference": "kernel-obs-build-4.4.126-94.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.4.126-94.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x"
},
"product_reference": "kernel-obs-build-4.4.126-94.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64"
},
"product_reference": "kernel-obs-build-4.4.126-94.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.126-94.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64"
},
"product_reference": "kernel-default-4.4.126-94.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le"
},
"product_reference": "kernel-default-4.4.126-94.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x"
},
"product_reference": "kernel-default-4.4.126-94.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64"
},
"product_reference": "kernel-default-4.4.126-94.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.126-94.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64"
},
"product_reference": "kernel-default-base-4.4.126-94.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.126-94.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x"
},
"product_reference": "kernel-default-base-4.4.126-94.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.126-94.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.126-94.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64"
},
"product_reference": "kernel-default-devel-4.4.126-94.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.126-94.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.126-94.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.126-94.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x"
},
"product_reference": "kernel-default-man-4.4.126-94.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.126-94.22.2.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch"
},
"product_reference": "kernel-devel-4.4.126-94.22.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.126-94.22.2.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch"
},
"product_reference": "kernel-macros-4.4.126-94.22.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.126-94.22.2.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch"
},
"product_reference": "kernel-source-4.4.126-94.22.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.126-94.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64"
},
"product_reference": "kernel-syms-4.4.126-94.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.126-94.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x"
},
"product_reference": "kernel-syms-4.4.126-94.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64"
},
"product_reference": "kernel-syms-4.4.126-94.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.126-94.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64"
},
"product_reference": "kernel-default-4.4.126-94.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le"
},
"product_reference": "kernel-default-4.4.126-94.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x"
},
"product_reference": "kernel-default-4.4.126-94.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64"
},
"product_reference": "kernel-default-4.4.126-94.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.126-94.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64"
},
"product_reference": "kernel-default-base-4.4.126-94.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.126-94.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x"
},
"product_reference": "kernel-default-base-4.4.126-94.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.126-94.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.126-94.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64"
},
"product_reference": "kernel-default-devel-4.4.126-94.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.126-94.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.126-94.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.126-94.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x"
},
"product_reference": "kernel-default-man-4.4.126-94.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.126-94.22.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch"
},
"product_reference": "kernel-devel-4.4.126-94.22.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.126-94.22.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch"
},
"product_reference": "kernel-macros-4.4.126-94.22.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.126-94.22.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch"
},
"product_reference": "kernel-source-4.4.126-94.22.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.126-94.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64"
},
"product_reference": "kernel-syms-4.4.126-94.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.126-94.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x"
},
"product_reference": "kernel-syms-4.4.126-94.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64"
},
"product_reference": "kernel-syms-4.4.126-94.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
},
"product_reference": "kernel-default-extra-4.4.126-94.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-18257",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18257"
}
],
"notes": [
{
"category": "general",
"text": "The __get_data_block function in fs/f2fs/data.c in the Linux kernel before 4.11 allows local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18257",
"url": "https://www.suse.com/security/cve/CVE-2017-18257"
},
{
"category": "external",
"summary": "SUSE Bug 1088241 for CVE-2017-18257",
"url": "https://bugzilla.suse.com/1088241"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-23T15:08:46Z",
"details": "moderate"
}
],
"title": "CVE-2017-18257"
},
{
"cve": "CVE-2018-1091",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1091"
}
],
"notes": [
{
"category": "general",
"text": "In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c in the Linux kernel before 4.13.5, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path, leading to a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1091",
"url": "https://www.suse.com/security/cve/CVE-2018-1091"
},
{
"category": "external",
"summary": "SUSE Bug 1087231 for CVE-2018-1091",
"url": "https://bugzilla.suse.com/1087231"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-23T15:08:46Z",
"details": "moderate"
}
],
"title": "CVE-2018-1091"
},
{
"cve": "CVE-2018-7740",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7740"
}
],
"notes": [
{
"category": "general",
"text": "The resv_map_release function in mm/hugetlb.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (BUG) via a crafted application that makes mmap system calls and has a large pgoff argument to the remap_file_pages system call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7740",
"url": "https://www.suse.com/security/cve/CVE-2018-7740"
},
{
"category": "external",
"summary": "SUSE Bug 1084353 for CVE-2018-7740",
"url": "https://bugzilla.suse.com/1084353"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-23T15:08:46Z",
"details": "moderate"
}
],
"title": "CVE-2018-7740"
},
{
"cve": "CVE-2018-8043",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8043"
}
],
"notes": [
{
"category": "general",
"text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8043",
"url": "https://www.suse.com/security/cve/CVE-2018-8043"
},
{
"category": "external",
"summary": "SUSE Bug 1084829 for CVE-2018-8043",
"url": "https://bugzilla.suse.com/1084829"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-23T15:08:46Z",
"details": "low"
}
],
"title": "CVE-2018-8043"
},
{
"cve": "CVE-2018-8822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8822"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8822",
"url": "https://www.suse.com/security/cve/CVE-2018-8822"
},
{
"category": "external",
"summary": "SUSE Bug 1086162 for CVE-2018-8822",
"url": "https://bugzilla.suse.com/1086162"
},
{
"category": "external",
"summary": "SUSE Bug 1090404 for CVE-2018-8822",
"url": "https://bugzilla.suse.com/1090404"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-8822",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-04-23T15:08:46Z",
"details": "moderate"
}
],
"title": "CVE-2018-8822"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…