SUSE-SU-2018:1048-1

Vulnerability from csaf_suse - Published: 2018-04-23 15:08 - Updated: 2018-04-23 15:08
Summary
Security update for the Linux Kernel
Severity
Important
Notes
Title of the patch: Security update for the Linux Kernel
Description of the patch: The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.126 to receive various security and bugfixes. The following security bugs were fixed: - CVE-2018-1091: In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path, leading to a denial of service (bnc#1087231). - CVE-2018-7740: The resv_map_release function in mm/hugetlb.c allowed local users to cause a denial of service (BUG) via a crafted application that made mmap system calls and has a large pgoff argument to the remap_file_pages system call (bnc#1084353). - CVE-2018-8043: The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c did not validate certain resource availability, which allowed local users to cause a denial of service (NULL pointer dereference) (bnc#1084829). - CVE-2017-18257: The __get_data_block function in fs/f2fs/data.c allowed local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl. (bnc#1088241) - CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162). The following non-security bugs were fixed: - acpica: Add header support for TPM2 table changes (bsc#1084452). - acpica: Add support for new SRAT subtable (bsc#1085981). - acpica: iasl: Update to IORT SMMUv3 disassembling (bsc#1085981). - acpi/iort: numa: Add numa node mapping for smmuv3 devices (bsc#1085981). - acpi, numa: fix pxm to online numa node associations (bnc#1012382). - acpi / pmic: xpower: Fix power_table addresses (bnc#1012382). - acpi/processor: Fix error handling in __acpi_processor_start() (bnc#1012382). - acpi/processor: Replace racy task affinity logic (bnc#1012382). - add mainline tag to various patches to be able to get further work done - af_iucv: enable control sends in case of SEND_SHUTDOWN (bnc#1085507, LTC#165135). - agp/intel: Flush all chipset writes after updating the GGTT (bnc#1012382). - ahci: Add PCI-id for the Highpoint Rocketraid 644L card (bnc#1012382). - alsa: aloop: Fix access to not-yet-ready substream via cable (bnc#1012382). - alsa: aloop: Sync stale timer before release (bnc#1012382). - alsa: firewire-digi00x: handle all MIDI messages on streaming packets (bnc#1012382). - alsa: hda: Add a power_save blacklist (bnc#1012382). - alsa: hda: add dock and led support for HP EliteBook 820 G3 (bnc#1012382). - alsa: hda: add dock and led support for HP ProBook 640 G2 (bnc#1012382). - alsa: hda/realtek - Always immediately update mute LED with pin VREF (bnc#1012382). - alsa: hda/realtek - Fix dock line-out volume on Dell Precision 7520 (bnc#1012382). - alsa: hda/realtek - Fix speaker no sound after system resume (bsc#1031717). - alsa: hda - Revert power_save option default value (git-fixes). - alsa: pcm: Fix UAF in snd_pcm_oss_get_formats() (bnc#1012382). - alsa: usb-audio: Add a quirck for B&W PX headphones (bnc#1012382). - alsa: usb-audio: Fix parsing descriptor of UAC2 processing unit (bnc#1012382). - apparmor: Make path_max parameter readonly (bnc#1012382). - arm64: Add ARM_SMCCC_ARCH_WORKAROUND_1 BP hardening support (bsc#1068032). - arm64: Add missing Falkor part number for branch predictor hardening (bsc#1068032). - arm64: capabilities: Handle duplicate entries for a capability (bsc#1068032). - arm64: cpufeature: __this_cpu_has_cap() shouldn't stop early (bsc#1068032). - arm64 / cpuidle: Use new cpuidle macro for entering retention state (bsc#1084328). - arm64: Enforce BBM for huge IO/VMAP mappings (bsc#1088313). - arm64: fix smccc compilation (bsc#1068032). - arm64: Kill PSCI_GET_VERSION as a variant-2 workaround (bsc#1068032). - arm64: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling (bsc#1068032). - arm64: KVM: Increment PC after handling an SMC trap (bsc#1068032). - arm64: KVM: Report SMCCC_ARCH_WORKAROUND_1 BP hardening support (bsc#1068032). - arm64: mm: do not write garbage into TTBR1_EL1 register (bsc#1085487). - arm64: mm: fix thinko in non-global page table attribute check (bsc#1088050). - arm64: Relax ARM_SMCCC_ARCH_WORKAROUND_1 discovery (bsc#1068032). - arm: 8668/1: ftrace: Fix dynamic ftrace with DEBUG_RODATA and !FRAME_POINTER (bnc#1012382). - arm/arm64: KVM: Add PSCI_VERSION helper (bsc#1068032). - arm/arm64: KVM: Add smccc accessors to PSCI code (bsc#1068032). - arm/arm64: KVM: Advertise SMCCC v1.1 (bsc#1068032). - arm/arm64: KVM: Consolidate the PSCI include files (bsc#1068032). - arm/arm64: KVM: Implement PSCI 1.0 support (bsc#1068032). - arm/arm64: KVM: Turn kvm_psci_version into a static inline (bsc#1068032). - arm/arm64: smccc: Implement SMCCC v1.1 inline primitive (bsc#1068032). - arm/arm64: smccc: Make function identifiers an unsigned quantity (bsc#1068032). - arm: DRA7: clockdomain: Change the CLKTRCTRL of CM_PCIE_CLKSTCTRL to SW_WKUP (bnc#1012382). - arm: dts: Adjust moxart IRQ controller and flags (bnc#1012382). - arm: dts: am335x-pepper: Fix the audio CODEC's reset pin (bnc#1012382). - arm: dts: exynos: Correct Trats2 panel reset line (bnc#1012382). - arm: dts: koelsch: Correct clock frequency of X2 DU clock input (bnc#1012382). - arm: dts: LogicPD Torpedo: Fix I2C1 pinmux (bnc#1012382). - arm: dts: LogicPD Torpedo: Fix I2C1 pinmux (bnc#1012382). - arm: dts: omap3-n900: Fix the audio CODEC's reset pin (bnc#1012382). - arm: dts: r8a7790: Correct parent of SSI[0-9] clocks (bnc#1012382). - arm: dts: r8a7791: Correct parent of SSI[0-9] clocks (bnc#1012382). - arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bnc#1012382). - asoc: rcar: ssi: do not set SSICR.CKDV = 000 with SSIWSR.CONT (bnc#1012382). - ath10k: disallow DFS simulation if DFS channel is not enabled (bnc#1012382). - ath10k: fix invalid STS_CAP_OFFSET_MASK (bnc#1012382). - ath10k: update tdls teardown state to target (bnc#1012382). - ath: Fix updating radar flags for coutry code India (bnc#1012382). - batman-adv: handle race condition for claims between gateways (bnc#1012382). - bcache: do not attach backing with duplicate UUID (bnc#1012382). - blkcg: fix double free of new_blkg in blkcg_init_queue (bnc#1012382). - blk-throttle: make sure expire time isn't too big (bnc#1012382). - block: do not assign cmd_flags in __blk_rq_prep_clone (bsc#1088087). - block-mq: stop workqueue items in blk_mq_stop_hw_queue() (bsc#1084967). - bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174 (bnc#1012382). - bluetooth: hci_qca: Avoid setup failure on missing rampatch (bnc#1012382). - bnx2x: Align RX buffers (bnc#1012382). - bonding: refine bond_fold_stats() wrap detection (bnc#1012382). - bpf: fix incorrect sign extension in check_alu_op() (bnc#1012382). - bpf: skip unnecessary capability check (bnc#1012382). - bpf, x64: implement retpoline for tail call (bnc#1012382). - bpf, x64: increase number of passes (bnc#1012382). - braille-console: Fix value returned by _braille_console_setup (bnc#1012382). - brcmfmac: fix P2P_DEVICE ethernet address generation (bnc#1012382). - bridge: check brport attr show in brport_show (bnc#1012382). - btrfs: alloc_chunk: fix DUP stripe size handling (bnc#1012382). - btrfs: Fix use-after-free when cleaning up fs_devs with a single stale device (bnc#1012382). - btrfs: improve delayed refs iterations (bsc#1076033). - btrfs: incremental send, fix invalid memory access (git-fixes). - btrfs: preserve i_mode if __btrfs_set_acl() fails (bnc#1012382). - btrfs: send, fix file hole not being preserved due to inline extent (bnc#1012382). - can: cc770: Fix queue stall & dropped RTR reply (bnc#1012382). - can: cc770: Fix stalls on rt-linux, remove redundant IRQ ack (bnc#1012382). - can: cc770: Fix use after free in cc770_tx_interrupt() (bnc#1012382). - ceph: only dirty ITER_IOVEC pages for direct read (bsc#1084898). - ch9200: use skb_cow_head() to deal with cloned skbs (bsc#1088684). - clk: bcm2835: Protect sections updating shared registers (bnc#1012382). - clk: ns2: Correct SDIO bits (bnc#1012382). - clk: qcom: msm8916: fix mnd_width for codec_digcodec (bnc#1012382). - clk: si5351: Rename internal plls to avoid name collisions (bnc#1012382). - coresight: Fix disabling of CoreSight TPIU (bnc#1012382). - coresight: Fixes coresight DT parse to get correct output port ID (bnc#1012382). - cpufreq: Fix governor module removal race (bnc#1012382). - cpufreq: s3c24xx: Fix broken s3c_cpufreq_init() (bnc#1012382). - cpufreq/sh: Replace racy task affinity logic (bnc#1012382). - cpuidle: Add new macro to enter a retention idle state (bsc#1084328). - cros_ec: fix nul-termination for firmware build info (bnc#1012382). - crypto: cavium - fix memory leak on info (bsc#1086518). - dcache: Add cond_resched in shrink_dentry_list (bsc#1086194). - dccp: check sk for closed state in dccp_sendmsg() (bnc#1012382). - dmaengine: imx-sdma: add 1ms delay to ensure SDMA channel is stopped (bnc#1012382). - dmaengine: ti-dma-crossbar: Fix event mapping for TPCC_EVT_MUX_60_63 (bnc#1012382). - dm: Always copy cmd_flags when cloning a request (bsc#1088087). - driver: (adm1275) set the m,b and R coefficients correctly for power (bnc#1012382). - drm: Allow determining if current task is output poll worker (bnc#1012382). - drm/amdgpu/dce: Do not turn off DP sink when disconnected (bnc#1012382). - drm/amdgpu: Fail fb creation from imported dma-bufs. (v2) (bnc#1012382). - drm/amdgpu: Fix deadlock on runtime suspend (bnc#1012382). - drm/amdgpu: fix KV harvesting (bnc#1012382). - drm/amdgpu: Notify sbios device ready before send request (bnc#1012382). - drm/amdkfd: Fix memory leaks in kfd topology (bnc#1012382). - drm: Defer disabling the vblank IRQ until the next interrupt (for instant-off) (bnc#1012382). - drm/edid: set ELD connector type in drm_edid_to_eld() (bnc#1012382). - drm/i915/cmdparser: Do not check past the cmd length (bsc#1031717). - drm/i915/psr: Check for the specific AUX_FRAME_SYNC cap bit (bsc#1031717). - drm/msm: fix leak in failed get_pages (bnc#1012382). - drm/nouveau: Fix deadlock on runtime suspend (bnc#1012382). - drm/nouveau/kms: Increase max retries in scanout position queries (bnc#1012382). - drm/omap: DMM: Check for DMM readiness after successful transaction commit (bnc#1012382). - drm: qxl: Do not alloc fbdev if emulation is not supported (bnc#1012382). - drm/radeon: Do not turn off DP sink when disconnected (bnc#1012382). - drm/radeon: Fail fb creation from imported dma-bufs (bnc#1012382). - drm/radeon: Fix deadlock on runtime suspend (bnc#1012382). - drm/radeon: fix KV harvesting (bnc#1012382). - drm: udl: Properly check framebuffer mmap offsets (bnc#1012382). - drm/vmwgfx: Fix a destoy-while-held mutex problem (bnc#1012382). - drm/vmwgfx: Fixes to vmwgfx_fb (bnc#1012382). - e1000e: Avoid missed interrupts following ICR read (bsc#1075428). - e1000e: Avoid receiver overrun interrupt bursts (bsc#1075428). - e1000e: Fix check_for_link return value with autoneg off (bsc#1075428). - e1000e: Fix link check race condition (bsc#1075428). - e1000e: Fix queue interrupt re-raising in Other interrupt (bsc#1075428). - e1000e: fix timing for 82579 Gigabit Ethernet controller (bnc#1012382). - e1000e: Remove Other from EIAC (bsc#1075428). - edac, sb_edac: Fix out of bound writes during DIMM configuration on KNL (git-fixes 3286d3eb906c). - ext4: inplace xattr block update fails to deduplicate blocks (bnc#1012382). - f2fs: relax node version check for victim data in gc (bnc#1012382). - fib_semantics: Do not match route with mismatching tclassid (bnc#1012382). - firmware/psci: Expose PSCI conduit (bsc#1068032). - firmware/psci: Expose SMCCC version through psci_ops (bsc#1068032). - fixup: sctp: verify size of a new chunk in _sctp_make_chunk() (bnc#1012382). - fs/aio: Add explicit RCU grace period when freeing kioctx (bnc#1012382). - fs/aio: Use RCU accessors for kioctx_table->table[] (bnc#1012382). - fs/hugetlbfs/inode.c: change put_page/unlock_page order in hugetlbfs_fallocate() (git-fixes, bsc#1083745). - fs: Teach path_connected to handle nfs filesystems with multiple roots (bnc#1012382). - genirq: Track whether the trigger type has been set (git-fixes). - genirq: Use irqd_get_trigger_type to compare the trigger type for shared IRQs (bnc#1012382). - hdlc_ppp: carrier detect ok, do not turn off negotiation (bnc#1012382). - hid: clamp input to logical range if no null state (bnc#1012382). - hid: reject input outside logical range only if null state is set (bnc#1012382). - hugetlbfs: fix offset overflow in hugetlbfs mmap (bnc#1084353). - hv_balloon: fix bugs in num_pages_onlined accounting (fate#323887). - hv_balloon: fix printk loglevel (fate#323887). - hv_balloon: simplify hv_online_page()/hv_page_online_one() (fate#323887). - i2c: i2c-scmi: add a MS HID (bnc#1012382). - i2c: xlp9xx: Check for Bus state before every transfer (bsc#1084310). - i2c: xlp9xx: Handle NACK on DATA properly (bsc#1084310). - i2c: xlp9xx: Handle transactions with I2C_M_RECV_LEN properly (bsc#1060799). - i2c: xlp9xx: return ENXIO on slave address NACK (bsc#1060799). - i40e: Acquire NVM lock before reads on all devices (bnc#1012382). - i40e: avoid NVM acquire deadlock during NVM update (git-fixes). - ia64: fix module loading for gcc-5.4 (bnc#1012382). - ib/ipoib: Avoid memory leak if the SA returns a different DGID (bnc#1012382). - ib/ipoib: Update broadcast object if PKey value was changed in index 0 (bnc#1012382). - ib/mlx4: Change vma from shared to private (bnc#1012382). - ib/mlx4: Take write semaphore when changing the vma struct (bnc#1012382). - ibmvfc: Avoid unnecessary port relogin (bsc#1085404). - ibmvnic: Disable irqs before exiting reset from closed state (bsc#1084610). - ibmvnic: Do not reset CRQ for Mobility driver resets (bsc#1088600). - ibmvnic: Fix DMA mapping mistakes (bsc#1088600). - ibmvnic: Fix failover case for non-redundant configuration (bsc#1088600). - ibmvnic: Fix reset return from closed state (bsc#1084610). - ibmvnic: Fix reset scheduler error handling (bsc#1088600). - ibmvnic: Potential NULL dereference in clean_one_tx_pool() (bsc#1085224, git-fixes). - ibmvnic: Remove unused TSO resources in TX pool structure (bsc#1085224). - ibmvnic: Update TX pool cleaning routine (bsc#1085224). - ibmvnic: Zero used TX descriptor counter on reset (bsc#1088600). - ib/umem: Fix use of npages/nmap fields (bnc#1012382). - ieee802154: 6lowpan: fix possible NULL deref in lowpan_device_event() (bnc#1012382). - iio: st_pressure: st_accel: Initialise sensor platform data properly (bnc#1012382). - iio: st_pressure: st_accel: pass correct platform data to init (git-fixes). - ima: relax requiring a file signature for new files with zero length (bnc#1012382). - infiniband/uverbs: Fix integer overflows (bnc#1012382). - input: matrix_keypad - fix race when disabling interrupts (bnc#1012382). - input: qt1070 - add OF device ID table (bnc#1012382). - input: tsc2007 - check for presence and power down tsc2007 during probe (bnc#1012382). - iommu/omap: Register driver before setting IOMMU ops (bnc#1012382). - iommu/vt-d: clean up pr_irq if request_threaded_irq fails (bnc#1012382). - ip6_vti: adjust vti mtu according to mtu of lower device (bnc#1012382). - ipmi: do not probe ACPI devices if si_tryacpi is unset (bsc#1060799). - ipmi: Fix the I2C address extraction from SPMI tables (bsc#1060799). - ipmi_ssif: Fix kernel panic at msg_done_handler (bsc#1088871). - ipmi_ssif: Fix logic around alert handling (bsc#1060799). - ipmi_ssif: remove redundant null check on array client->adapter->name (bsc#1060799). - ipmi_ssif: unlock on allocation failure (bsc#1060799). - ipmi:ssif: Use i2c_adapter_id instead of adapter->nr (bsc#1060799). - ipmi: Use the proper default value for register size in ACPI (bsc#1060799). - ipmi/watchdog: fix wdog hang on panic waiting for ipmi response (bnc#1012382). - ipv6: fix access to non-linear packet in ndisc_fill_redirect_hdr_option() (bnc#1012382). - ipv6 sit: work around bogus gcc-8 -Wrestrict warning (bnc#1012382). - ipvlan: add L2 check for packets arriving via virtual devices (bnc#1012382). - irqchip/gic-v3-its: Add ACPI NUMA node mapping (bsc#1085981). - irqchip/gic-v3-its: Allow GIC ITS number more than MAX_NUMNODES (bsc#1085981). - irqchip/gic-v3-its: Ensure nr_ites >= nr_lpis (bnc#1012382). - irqchip/gic-v3-its: Remove ACPICA version check for ACPI NUMA (bsc#1085981). - kbuild: disable clang's default use of -fmerge-all-constants (bnc#1012382). - kbuild: Handle builtin dtb file names containing hyphens (bnc#1012382). - kprobes/x86: Fix kprobe-booster not to boost far call instructions (bnc#1012382). - kprobes/x86: Fix to set RWX bits correctly before releasing trampoline (git-fixes). - kprobes/x86: Set kprobes pages read-only (bnc#1012382). - kvm: arm/arm64: Handle CPU_PM_ENTER_FAILED (bsc#1086499). - kvm: arm/arm64: vgic: Add missing irq_lock to vgic_mmio_read_pending (bsc#1086499). - kvm: arm/arm64: vgic: Do not populate multiple LRs with the same vintid (bsc#1086499). - kvm: arm/arm64: vgic-its: Check result of allocation before use (bsc#). - kvm: arm/arm64: vgic-its: Preserve the revious read from the pending table (bsc#1086499). - kvm: arm/arm64: vgic-v3: Tighten synchronization for guests using v2 on v3 (bsc#1086499). - kvm: mmu: Fix overlap between public and private memslots (bnc#1012382). - kvm: nVMX: fix nested tsc scaling (bsc1087999). - kvm: PPC: Book3S PR: Exit KVM on failed mapping (bnc#1012382). - kvm/x86: fix icebp instruction handling (bnc#1012382). - l2tp: do not accept arbitrary sockets (bnc#1012382). - libata: Apply NOLPM quirk to Crucial M500 480 and 960GB SSDs (bnc#1012382). - libata: Apply NOLPM quirk to Crucial MX100 512GB SSDs (bnc#1012382). - libata: disable LPM for Crucial BX100 SSD 500GB drive (bnc#1012382). - libata: Enable queued TRIM for Samsung SSD 860 (bnc#1012382). - libata: fix length validation of ATAPI-relayed SCSI commands (bnc#1012382). - libata: Make Crucial BX100 500GB LPM quirk apply to all firmware versions (bnc#1012382). - libata: Modify quirks for MX100 to limit NCQ_TRIM quirk to MU01 version (bnc#1012382). - libata: remove WARN() for DMA or PIO command without data (bnc#1012382). - lock_parent() needs to recheck if dentry got __dentry_kill'ed under it (bnc#1012382). - loop: Fix lost writes caused by missing flag (bnc#1012382). - lpfc: update version to 11.4.0.7-1 (bsc#1085383). - mac80211: do not parse encrypted management frames in ieee80211_frame_acked (bnc#1012382). - mac80211: do not WARN on bad WMM parameters from buggy APs (bsc#1031717). - mac80211_hwsim: enforce PS_MANUAL_POLL to be set after PS_ENABLED (bnc#1012382). - mac80211: remove BUG() when interface type is invalid (bnc#1012382). - md-cluster: fix wrong condition check in raid1_write_request (bsc#1085402). - md/raid10: skip spare disk as 'first' disk (bnc#1012382). - md/raid10: wait up frozen array in handle_write_completed (bnc#1012382). - md/raid6: Fix anomily when recovering a single device in RAID6 (bnc#1012382). - media: au0828: fix VIDEO_V4L2 dependency (bsc#1031717). - media: bt8xx: Fix err 'bt878_probe()' (bnc#1012382). - media: c8sectpfe: fix potential NULL pointer dereference in c8sectpfe_timer_interrupt (bnc#1012382). - media: cpia2: Fix a couple off by one bugs (bnc#1012382). - media: cx25821: prevent out-of-bounds read on array card (bsc#1031717). - media/dvb-core: Race condition when writing to CAM (bnc#1012382). - media: i2c/soc_camera: fix ov6650 sensor getting wrong clock (bnc#1012382). - media: m88ds3103: do not call a non-initalized function (bnc#1012382). - media: [RESEND] media: dvb-frontends: Add delay to Si2168 restart (bnc#1012382). - media: s3c-camif: fix out-of-bounds array access (bsc#1031717). - mfd: palmas: Reset the POWERHOLD mux during power off (bnc#1012382). - mmc: avoid removing non-removable hosts during suspend (bnc#1012382). - mmc: dw_mmc: fix falling from idmac to PIO mode when dw_mci_reset occurs (bnc#1012382). - mmc: dw_mmc: Fix the DTO/CTO timeout overflow calculation for 32-bit systems (bsc#1088267). - mmc: sdhci-of-esdhc: limit SD clock for ls1012a/ls1046a (bnc#1012382). - mm: Fix false-positive VM_BUG_ON() in page_cache_{get,add}_speculative() (bnc#1012382). - mm/hugetlb.c: do not call region_abort if region_chg fails (bnc#1084353). - mm/vmalloc: add interfaces to free unmapped page table (bnc#1012382). - mpls, nospec: Sanitize array index in mpls_label_ok() (bnc#1012382). - mt7601u: check return value of alloc_skb (bnc#1012382). - mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bnc#1012382). - mtd: nand: fsl_ifc: Fix nand waitfunc return value (bnc#1012382). - mtip32xx: use runtime tag to initialize command header (bnc#1012382). - net/8021q: create device with all possible features in wanted_features (bnc#1012382). - net: ethernet: arc: Fix a potential memory leak if an optional regulator is deferred (bnc#1012382). - net: ethernet: ti: cpsw: add check for in-band mode setting with RGMII PHY interface (bnc#1012382). - net/faraday: Add missing include of of.h (bnc#1012382). - net: fec: Fix unbalanced PM runtime calls (bnc#1012382). - netfilter: add back stackpointer size checks (bnc#1012382). - netfilter: bridge: ebt_among: add missing match size checks (bnc#1012382). - netfilter: IDLETIMER: be syzkaller friendly (bnc#1012382). - netfilter: ipv6: fix use-after-free Write in nf_nat_ipv6_manip_pkt (bnc#1012382). - netfilter: nat: cope with negative port range (bnc#1012382). - netfilter: use skb_to_full_sk in ip_route_me_harder (bnc#1012382). - netfilter: x_tables: fix missing timer initialization in xt_LED (bnc#1012382). - netfilter: xt_CT: fix refcnt leak on error path (bnc#1012382). - net: Fix hlist corruptions in inet_evict_bucket() (bnc#1012382). - net: fix race on decreasing number of TX queues (bnc#1012382). - net: hns: Fix ethtool private flags (bsc#1085511). - net: ipv4: avoid unused variable warning for sysctl (git-fixes). - net: ipv4: do not allow setting net.ipv4.route.min_pmtu below 68 (bnc#1012382). - net: ipv6: send unsolicited NA after DAD (git-fixes). - net: ipv6: send unsolicited NA on admin up (bnc#1012382). - net/iucv: Free memory obtained by kzalloc (bnc#1012382). - netlink: avoid a double skb free in genlmsg_mcast() (bnc#1012382). - netlink: ensure to loop over all netns in genlmsg_multicast_allns() (bnc#1012382). - net: mpls: Pull common label check into helper (bnc#1012382). - net: Only honor ifindex in IP_PKTINFO if non-0 (bnc#1012382). - net: systemport: Rewrite __bcm_sysport_tx_reclaim() (bnc#1012382). - net: xfrm: allow clearing socket xfrm policies (bnc#1012382). - nfc: nfcmrvl: double free on error path (bnc#1012382). - nfc: nfcmrvl: Include unaligned.h instead of access_ok.h (bnc#1012382). - nfsd4: permit layoutget of executable-only files (bnc#1012382). - nfs: Fix an incorrect type in struct nfs_direct_req (bnc#1012382). - nospec: Allow index argument to have const-qualified type (bnc#1012382). - nospec: Include <asm/barrier.h> dependency (bnc#1012382). - nvme: do not send keep-alive frames during reset (bsc#1084223). - nvme: do not send keep-alives to the discovery controller (bsc#1086607). - nvme: expand nvmf_check_if_ready checks (bsc#1085058). - nvme/rdma: do no start error recovery twice (bsc#1084967). - nvmet_fc: prevent new io rqsts in possible isr completions (bsc#1083574). - of: fix of_device_get_modalias returned length when truncating buffers (bnc#1012382). - openvswitch: Delete conntrack entry clashing with an expectation (bnc#1012382). - Partial revert 'e1000e: Avoid receiver overrun interrupt bursts' (bsc#1075428). - pci/ACPI: Fix bus range comparison in pci_mcfg_lookup() (bsc#1084699). - pci: Add function 1 DMA alias quirk for Highpoint RocketRAID 644L (bnc#1012382). - pci: Add pci_reset_function_locked() (bsc#1084889). - pci: Apply Cavium ACS quirk only to CN81xx/CN83xx/CN88xx devices (bsc#1084914). - pci: Avoid FLR for Intel 82579 NICs (bsc#1084889). - pci: Avoid slot reset if bridge itself is broken (bsc#1084918). - pci: Export pcie_flr() (bsc#1084889). - pci: hv: Fix 2 hang issues in hv_compose_msi_msg() (fate#323887, bsc#1087659, bsc#1087906). - pci: hv: Fix a comment typo in _hv_pcifront_read_config() (fate#323887, bsc#1087659). - pci: hv: Only queue new work items in hv_pci_devices_present() if necessary (fate#323887, bsc#1087659). - pci: hv: Remove the bogus test in hv_eject_device_work() (fate#323887, bsc#1087659). - pci: hv: Serialize the present and eject work items (fate#323887, bsc#1087659). - pci: Mark Haswell Power Control Unit as having non-compliant BARs (bsc#1086015). - pci/MSI: Stop disabling MSI/MSI-X in pci_device_shutdown() (bnc#1012382). - pci: Probe for device reset support during enumeration (bsc#1084889). - pci: Protect pci_error_handlers->reset_notify() usage with device_lock() (bsc#1084889). - pci: Protect restore with device lock to be consistent (bsc#1084889). - pci: Remove __pci_dev_reset() and pci_dev_reset() (bsc#1084889). - pci: Remove redundant probes for device reset support (bsc#1084889). - pci: Wait for up to 1000ms after FLR reset (bsc#1084889). - perf inject: Copy events when reordering events in pipe mode (bnc#1012382). - perf probe: Return errno when not hitting any event (bnc#1012382). - perf session: Do not rely on evlist in pipe mode (bnc#1012382). - perf sort: Fix segfault with basic block 'cycles' sort dimension (bnc#1012382). - perf tests kmod-path: Do not fail if compressed modules are not supported (bnc#1012382). - perf tools: Make perf_event__synthesize_mmap_events() scale (bnc#1012382). - perf/x86/intel: Do not accidentally clear high bits in bdw_limit_period() (bnc#1012382). - perf/x86/intel/uncore: Fix multi-domain PCI CHA enumeration bug on Skylake servers (bsc#1086357). - pinctrl: Really force states during suspend/resume (bnc#1012382). - platform/chrome: Use proper protocol transfer function (bnc#1012382). - platform/x86: asus-nb-wmi: Add wapf4 quirk for the X302UA (bnc#1012382). - power: supply: pda_power: move from timer to delayed_work (bnc#1012382). - ppp: prevent unregistered channels from connecting to PPP units (bnc#1012382). - pty: cancel pty slave port buf's work in tty_release (bnc#1012382). - pwm: tegra: Increase precision in PWM rate calculation (bnc#1012382). - qed: Free RoCE ILT Memory on rmmod qedr (bsc#1019695 FATE#321703 bsc#1019699 FATE#321702 bsc#1022604 FATE#321747). - qed: Use after free in qed_rdma_free() (bsc#1019695 FATE#321703 bsc#1019699 FATE#321702 bsc#1022604 FATE#321747). - qeth: repair SBAL elements calculation (bnc#1085507, LTC#165484). - qlcnic: fix unchecked return value (bnc#1012382). - rcutorture/configinit: Fix build directory error message (bnc#1012382). - rdma/cma: Use correct size when writing netlink stats (bnc#1012382). - rdma/core: Do not use invalid destination in determining port reuse (FATE#321231 FATE#321473 FATE#322153 FATE#322149). - rdma/iwpm: Fix uninitialized error code in iwpm_send_mapinfo() (bnc#1012382). - rdma/mlx5: Fix integer overflow while resizing CQ (bnc#1012382). - rdma/ocrdma: Fix permissions for OCRDMA_RESET_STATS (bnc#1012382). - rdma/ucma: Check that user does not overflow QP state (bnc#1012382). - rdma/ucma: Fix access to non-initialized CM_ID object (bnc#1012382). - rdma/ucma: Limit possible option size (bnc#1012382). - regmap: Do not use format_val in regmap_bulk_read (bsc#1031717). - regmap: Fix reversed bounds check in regmap_raw_write() (bsc#1031717). - regmap: Format data for raw write in regmap_bulk_write (bsc#1031717). - regmap-i2c: Off by one in regmap_i2c_smbus_i2c_read/write() (bsc#1031717). - regulator: anatop: set default voltage selector for pcie (bnc#1012382). - reiserfs: Make cancel_old_flush() reliable (bnc#1012382). - Revert 'ARM: dts: LogicPD Torpedo: Fix I2C1 pinmux' (bnc#1012382). - Revert 'e1000e: Separate signaling for link check/link up' (bsc#1075428). - Revert 'genirq: Use irqd_get_trigger_type to compare the trigger type for shared IRQs' (bnc#1012382). - Revert 'ipvlan: add L2 check for packets arriving via virtual devices' (reverted in upstream). - Revert 'led: core: Fix brightness setting when setting delay_off=0' (bnc#1012382). - rndis_wlan: add return value validation (bnc#1012382). - rtc: cmos: Do not assume irq 8 for rtc when there are no legacy irqs (bnc#1012382). - rtlwifi: rtl8723be: Fix loss of signal (bnc#1012382). - rtlwifi: rtl_pci: Fix the bug when inactiveps is enabled (bnc#1012382). - s390/mm: fix local TLB flushing vs. detach of an mm address space (bnc#1088324, LTC#166470). - s390/mm: fix race on mm->context.flush_mm (bnc#1088324, LTC#166470). - s390/mm: no local TLB flush for clearing-by-ASCE IDTE (bnc#1088324, LTC#166470). - s390/qeth: apply takeover changes when mode is toggled (bnc#1085507, LTC#165490). - s390/qeth: do not apply takeover changes to RXIP (bnc#1085507, LTC#165490). - s390/qeth: fix double-free on IP add/remove race (bnc#1085507, LTC#165491). - s390/qeth: fix IPA command submission race (bnc#1012382). - s390/qeth: fix IP address lookup for L3 devices (bnc#1085507, LTC#165491). - s390/qeth: fix IP removal on offline cards (bnc#1085507, LTC#165491). - s390/qeth: fix SETIP command handling (bnc#1012382). - s390/qeth: free netdevice when removing a card (bnc#1012382). - s390/qeth: improve error reporting on IP add/removal (bnc#1085507, LTC#165491). - s390/qeth: lock IP table while applying takeover changes (bnc#1085507, LTC#165490). - s390/qeth: lock read device while queueing next buffer (bnc#1012382). - s390/qeth: on channel error, reject further cmd requests (bnc#1012382). - s390/qeth: update takeover IPs after configuration change (bnc#1085507, LTC#165490). - s390/qeth: when thread completes, wake up all waiters (bnc#1012382). - sched: act_csum: do not mangle TCP and UDP GSO packets (bnc#1012382). - sched: Stop resched_cpu() from sending IPIs to offline CPUs (bnc#1012382). - sched: Stop switched_to_rt() from sending IPIs to offline CPUs (bnc#1012382). - scsi: core: scsi_get_device_flags_keyed(): Always return device flags (bnc#1012382). - scsi: devinfo: apply to HP XP the same flags as Hitachi VSP (bnc#1012382). - scsi: dh: add new rdac devices (bnc#1012382). - scsi: lpfc: Add missing unlock in WQ full logic (bsc#1085383). - scsi: lpfc: Code cleanup for 128byte wqe data type (bsc#1085383). - scsi: lpfc: Fix mailbox wait for POST_SGL mbox command (bsc#1085383). - scsi: lpfc: Fix NVME Initiator FirstBurst (bsc#1085383). - scsi: lpfc: Fix SCSI lun discovery when port configured for both SCSI and NVME (bsc#1085383). - scsi: lpfc: Memory allocation error during driver start-up on power8 (bsc#1085383). - scsi: mac_esp: Replace bogus memory barrier with spinlock (bnc#1012382). - scsi: sg: check for valid direction before starting the request (bnc#1012382). - scsi: sg: fix SG_DXFER_FROM_DEV transfers (bnc#1012382). - scsi: sg: fix static checker warning in sg_is_valid_dxfer (bnc#1012382). - scsi: sg: only check for dxfer_len greater than 256M (bnc#1012382 bsc#1064206). - scsi: virtio_scsi: always read VPD pages for multiqueue too (git-fixes). - scsi: virtio_scsi: Always try to read VPD pages (bnc#1012382). - sctp: fix dst refcnt leak in sctp_v4_get_dst (bnc#1012382). - sctp: fix dst refcnt leak in sctp_v6_get_dst() (bnc#1012382). - sctp: verify size of a new chunk in _sctp_make_chunk() (bnc#1012382). - selftests/x86: Add tests for the STR and SLDT instructions (bnc#1012382). - selftests/x86: Add tests for User-Mode Instruction Prevention (bnc#1012382). - selftests/x86/entry_from_vm86: Add test cases for POPF (bnc#1012382). - selftests/x86/entry_from_vm86: Exit with 1 if we fail (bnc#1012382). - selinux: check for address length in selinux_socket_bind() (bnc#1012382). - serial: 8250_pci: Add Brainboxes UC-260 4 port serial device (bnc#1012382). - serial: sh-sci: prevent lockup on full TTY buffers (bnc#1012382). - skbuff: Fix not waking applications when errors are enqueued (bnc#1012382). - sm501fb: do not return zero on failure path in sm501fb_start() (bnc#1012382). - solo6x10: release vb2 buffers in solo_stop_streaming() (bnc#1012382). - spi: dw: Disable clock after unregistering the host (bnc#1012382). - spi: omap2-mcspi: poll OMAP2_MCSPI_CHSTAT_RXS for PIO transfer (bnc#1012382). - spi: sun6i: disable/unprepare clocks on remove (bnc#1012382). - staging: android: ashmem: Fix lockdep issue during llseek (bnc#1012382). - staging: android: ashmem: Fix possible deadlock in ashmem_ioctl (bnc#1012382). - staging: comedi: fix comedi_nsamples_left (bnc#1012382). - staging: lustre: ptlrpc: kfree used instead of kvfree (bnc#1012382). - staging: ncpfs: memory corruption in ncp_read_kernel() (bnc#1012382). - staging: speakup: Replace BUG_ON() with WARN_ON() (bnc#1012382). - staging: unisys: visorhba: fix s-Par to boot with option CONFIG_VMAP_STACK set to y (bnc#1012382). - staging: wilc1000: add check for kmalloc allocation failure (bnc#1012382). - staging: wilc1000: fix unchecked return value (bnc#1012382). - sysrq: Reset the watchdog timers while displaying high-resolution timers (bnc#1012382). - target: prefer dbroot of /etc/target over /var/target (bsc#1087274). - tcm_fileio: Prevent information leak for short reads (bnc#1012382). - tcp: remove poll() flakes with FastOpen (bnc#1012382). - tcp: sysctl: Fix a race to avoid unexpected 0 window from space (bnc#1012382). - team: Fix double free in error path (bnc#1012382). - test_firmware: fix setting old custom fw path back on exit (bnc#1012382). - time: Change posix clocks ops interfaces to use timespec64 (bnc#1012382). - timers, sched_clock: Update timeout for clock wrap (bnc#1012382). - tools/usbip: fixes build with musl libc toolchain (bnc#1012382). - tpm_i2c_infineon: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382). - tpm_i2c_nuvoton: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382). - tpm: st33zp24: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382). - tpm/tpm_crb: Use start method value from ACPI table directly (bsc#1084452). - tracing: probeevent: Fix to support minus offset from symbol (bnc#1012382). - tty/serial: atmel: add new version check for usart (bnc#1012382). - tty: vt: fix up tabstops properly (bnc#1012382). - uas: fix comparison for error code (bnc#1012382). - ubi: Fix race condition between ubi volume creation and udev (bnc#1012382). - udplite: fix partial checksum initialization (bnc#1012382). - usb: Do not print a warning if interface driver rebind is deferred at resume (bsc#1087211). - usb: dwc2: Make sure we disconnect the gadget state (bnc#1012382). - usb: gadget: bdc: 64-bit pointer capability check (bnc#1012382). - usb: gadget: dummy_hcd: Fix wrong power status bit clear/reset in dummy_hub_control() (bnc#1012382). - usb: gadget: f_fs: Fix use-after-free in ffs_fs_kill_sb() (bnc#1012382). - usb: gadget: udc: Add missing platform_device_put() on error in bdc_pci_probe() (bnc#1012382). - usb: quirks: add control message delay for 1b1c:1b20 (bnc#1012382). - usb: storage: Add JMicron bridge 152d:2567 to unusual_devs.h (bnc#1012382). - usb: usbmon: Read text within supplied buffer size (bnc#1012382). - usb: usbmon: remove assignment from IS_ERR argument (bnc#1012382). - veth: set peer GSO values (bnc#1012382). - vgacon: Set VGA struct resource types (bnc#1012382). - video: ARM CLCD: fix dma allocation size (bnc#1012382). - video: fbdev: udlfb: Fix buffer on stack (bnc#1012382). - video/hdmi: Allow 'empty' HDMI infoframes (bnc#1012382). - vxlan: vxlan dev should inherit lowerdev's gso_max_size (bnc#1012382). - wan: pc300too: abort path on failure (bnc#1012382). - watchdog: hpwdt: Check source of NMI (bnc#1012382). - watchdog: hpwdt: fix unused variable warning (bnc#1012382). - watchdog: hpwdt: SMBIOS check (bnc#1012382). - watchdog: sbsa: use 32-bit read for WCV (bsc#1085679). - wil6210: fix memory access violation in wil_memcpy_from/toio_32 (bnc#1012382). - workqueue: Allow retrieval of current task's work struct (bnc#1012382). - x86/apic/vector: Handle legacy irq data correctly (bnc#1012382). - x86/boot/64: Verify alignment of the LOAD segment (bnc#1012382). - x86/build/64: Force the linker to use 2MB page size (bnc#1012382). - x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088). - x86: i8259: export legacy_pic symbol (bnc#1012382). - x86/kaiser: Duplicate cpu_tss for an entry trampoline usage (bsc#1077560 bsc#1083836). - x86/kaiser: enforce trampoline stack alignment (bsc#1087260). - x86/kaiser: Remove a user mapping of cpu_tss structure (bsc#1077560 bsc#1083836). - x86/kaiser: Use a per-CPU trampoline stack for kernel entry (bsc#1077560). - x86/MCE: Serialize sysfs changes (bnc#1012382). - x86/mm: Fix vmalloc_fault to use pXd_large (bnc#1012382). - x86/mm: implement free pmd/pte page interfaces (bnc#1012382). - x86/module: Detect and skip invalid relocations (bnc#1012382). - x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklist (bsc#1087845). - x86: Treat R_X86_64_PLT32 as R_X86_64_PC32 (bnc#1012382). - x86/vm86/32: Fix POPF emulation (bnc#1012382). - xen-blkfront: fix mq start/stop race (bsc#1085042). - xen-netback: use skb to determine number of required guest Rx requests (bsc#1046610).
Patchnames: SUSE-SLE-DESKTOP-12-SP3-2018-718,SUSE-SLE-HA-12-SP3-2018-718,SUSE-SLE-Live-Patching-12-SP3-2018-718,SUSE-SLE-SDK-12-SP3-2018-718,SUSE-SLE-SERVER-12-SP3-2018-718,SUSE-SLE-WE-12-SP3-2018-718
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
https://www.suse.com/support/security/rating/ external
https://ftp.suse.com/pub/projects/security/csaf/s… self
https://www.suse.com/support/update/announcement/… self
https://lists.suse.com/pipermail/sle-security-upd… self
https://bugzilla.suse.com/1012382 self
https://bugzilla.suse.com/1019695 self
https://bugzilla.suse.com/1019699 self
https://bugzilla.suse.com/1022604 self
https://bugzilla.suse.com/1031717 self
https://bugzilla.suse.com/1046610 self
https://bugzilla.suse.com/1060799 self
https://bugzilla.suse.com/1064206 self
https://bugzilla.suse.com/1068032 self
https://bugzilla.suse.com/1073059 self
https://bugzilla.suse.com/1073069 self
https://bugzilla.suse.com/1075428 self
https://bugzilla.suse.com/1076033 self
https://bugzilla.suse.com/1077560 self
https://bugzilla.suse.com/1083574 self
https://bugzilla.suse.com/1083745 self
https://bugzilla.suse.com/1083836 self
https://bugzilla.suse.com/1084223 self
https://bugzilla.suse.com/1084310 self
https://bugzilla.suse.com/1084328 self
https://bugzilla.suse.com/1084353 self
https://bugzilla.suse.com/1084452 self
https://bugzilla.suse.com/1084610 self
https://bugzilla.suse.com/1084699 self
https://bugzilla.suse.com/1084829 self
https://bugzilla.suse.com/1084889 self
https://bugzilla.suse.com/1084898 self
https://bugzilla.suse.com/1084914 self
https://bugzilla.suse.com/1084918 self
https://bugzilla.suse.com/1084967 self
https://bugzilla.suse.com/1085042 self
https://bugzilla.suse.com/1085058 self
https://bugzilla.suse.com/1085224 self
https://bugzilla.suse.com/1085383 self
https://bugzilla.suse.com/1085402 self
https://bugzilla.suse.com/1085404 self
https://bugzilla.suse.com/1085487 self
https://bugzilla.suse.com/1085507 self
https://bugzilla.suse.com/1085511 self
https://bugzilla.suse.com/1085679 self
https://bugzilla.suse.com/1085981 self
https://bugzilla.suse.com/1086015 self
https://bugzilla.suse.com/1086162 self
https://bugzilla.suse.com/1086194 self
https://bugzilla.suse.com/1086357 self
https://bugzilla.suse.com/1086499 self
https://bugzilla.suse.com/1086518 self
https://bugzilla.suse.com/1086607 self
https://bugzilla.suse.com/1087088 self
https://bugzilla.suse.com/1087211 self
https://bugzilla.suse.com/1087231 self
https://bugzilla.suse.com/1087260 self
https://bugzilla.suse.com/1087274 self
https://bugzilla.suse.com/1087659 self
https://bugzilla.suse.com/1087845 self
https://bugzilla.suse.com/1087906 self
https://bugzilla.suse.com/1087999 self
https://bugzilla.suse.com/1088050 self
https://bugzilla.suse.com/1088087 self
https://bugzilla.suse.com/1088241 self
https://bugzilla.suse.com/1088267 self
https://bugzilla.suse.com/1088313 self
https://bugzilla.suse.com/1088324 self
https://bugzilla.suse.com/1088600 self
https://bugzilla.suse.com/1088684 self
https://bugzilla.suse.com/1088871 self
https://bugzilla.suse.com/802154 self
https://www.suse.com/security/cve/CVE-2017-18257/ self
https://www.suse.com/security/cve/CVE-2018-1091/ self
https://www.suse.com/security/cve/CVE-2018-7740/ self
https://www.suse.com/security/cve/CVE-2018-8043/ self
https://www.suse.com/security/cve/CVE-2018-8822/ self
https://www.suse.com/security/cve/CVE-2017-18257 external
https://bugzilla.suse.com/1088241 external
https://www.suse.com/security/cve/CVE-2018-1091 external
https://bugzilla.suse.com/1087231 external
https://www.suse.com/security/cve/CVE-2018-7740 external
https://bugzilla.suse.com/1084353 external
https://www.suse.com/security/cve/CVE-2018-8043 external
https://bugzilla.suse.com/1084829 external
https://www.suse.com/security/cve/CVE-2018-8822 external
https://bugzilla.suse.com/1086162 external
https://bugzilla.suse.com/1090404 external
https://bugzilla.suse.com/1091815 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\n\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.126 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-1091: In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path, leading to a denial of service (bnc#1087231).\n- CVE-2018-7740: The resv_map_release function in mm/hugetlb.c allowed local users to cause a denial of service (BUG) via a crafted application that made mmap system calls and has a large pgoff argument to the remap_file_pages system call (bnc#1084353).\n- CVE-2018-8043: The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c did not validate certain resource availability, which allowed local users to cause a denial of service (NULL pointer dereference) (bnc#1084829).\n- CVE-2017-18257: The __get_data_block function in fs/f2fs/data.c allowed local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl. (bnc#1088241)\n- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).\n\n\nThe following non-security bugs were fixed:\n\n- acpica: Add header support for TPM2 table changes (bsc#1084452).\n- acpica: Add support for new SRAT subtable (bsc#1085981).\n- acpica: iasl: Update to IORT SMMUv3 disassembling (bsc#1085981).\n- acpi/iort: numa: Add numa node mapping for smmuv3 devices (bsc#1085981).\n- acpi, numa: fix pxm to online numa node associations (bnc#1012382).\n- acpi / pmic: xpower: Fix power_table addresses (bnc#1012382).\n- acpi/processor: Fix error handling in __acpi_processor_start() (bnc#1012382).\n- acpi/processor: Replace racy task affinity logic (bnc#1012382).\n- add mainline tag to various patches to be able to get further work done\n- af_iucv: enable control sends in case of SEND_SHUTDOWN (bnc#1085507, LTC#165135).\n- agp/intel: Flush all chipset writes after updating the GGTT (bnc#1012382).\n- ahci: Add PCI-id for the Highpoint Rocketraid 644L card (bnc#1012382).\n- alsa: aloop: Fix access to not-yet-ready substream via cable (bnc#1012382).\n- alsa: aloop: Sync stale timer before release (bnc#1012382).\n- alsa: firewire-digi00x: handle all MIDI messages on streaming packets (bnc#1012382).\n- alsa: hda: Add a power_save blacklist (bnc#1012382).\n- alsa: hda: add dock and led support for HP EliteBook 820 G3 (bnc#1012382).\n- alsa: hda: add dock and led support for HP ProBook 640 G2 (bnc#1012382).\n- alsa: hda/realtek - Always immediately update mute LED with pin VREF (bnc#1012382).\n- alsa: hda/realtek - Fix dock line-out volume on Dell Precision 7520 (bnc#1012382).\n- alsa: hda/realtek - Fix speaker no sound after system resume (bsc#1031717).\n- alsa: hda - Revert power_save option default value (git-fixes).\n- alsa: pcm: Fix UAF in snd_pcm_oss_get_formats() (bnc#1012382).\n- alsa: usb-audio: Add a quirck for B\u0026W PX headphones (bnc#1012382).\n- alsa: usb-audio: Fix parsing descriptor of UAC2 processing unit (bnc#1012382).\n- apparmor: Make path_max parameter readonly (bnc#1012382).\n- arm64: Add ARM_SMCCC_ARCH_WORKAROUND_1 BP hardening support (bsc#1068032).\n- arm64: Add missing Falkor part number for branch predictor hardening (bsc#1068032).\n- arm64: capabilities: Handle duplicate entries for a capability (bsc#1068032).\n- arm64: cpufeature: __this_cpu_has_cap() shouldn\u0027t stop early (bsc#1068032).\n- arm64 / cpuidle: Use new cpuidle macro for entering retention state (bsc#1084328).\n- arm64: Enforce BBM for huge IO/VMAP mappings (bsc#1088313).\n- arm64: fix smccc compilation (bsc#1068032).\n- arm64: Kill PSCI_GET_VERSION as a variant-2 workaround (bsc#1068032).\n- arm64: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling (bsc#1068032).\n- arm64: KVM: Increment PC after handling an SMC trap (bsc#1068032).\n- arm64: KVM: Report SMCCC_ARCH_WORKAROUND_1 BP hardening support (bsc#1068032).\n- arm64: mm: do not write garbage into TTBR1_EL1 register (bsc#1085487).\n- arm64: mm: fix thinko in non-global page table attribute check (bsc#1088050).\n- arm64: Relax ARM_SMCCC_ARCH_WORKAROUND_1 discovery (bsc#1068032).\n- arm: 8668/1: ftrace: Fix dynamic ftrace with DEBUG_RODATA and !FRAME_POINTER (bnc#1012382).\n- arm/arm64: KVM: Add PSCI_VERSION helper (bsc#1068032).\n- arm/arm64: KVM: Add smccc accessors to PSCI code (bsc#1068032).\n- arm/arm64: KVM: Advertise SMCCC v1.1 (bsc#1068032).\n- arm/arm64: KVM: Consolidate the PSCI include files (bsc#1068032).\n- arm/arm64: KVM: Implement PSCI 1.0 support (bsc#1068032).\n- arm/arm64: KVM: Turn kvm_psci_version into a static inline (bsc#1068032).\n- arm/arm64: smccc: Implement SMCCC v1.1 inline primitive (bsc#1068032).\n- arm/arm64: smccc: Make function identifiers an unsigned quantity (bsc#1068032).\n- arm: DRA7: clockdomain: Change the CLKTRCTRL of CM_PCIE_CLKSTCTRL to SW_WKUP (bnc#1012382).\n- arm: dts: Adjust moxart IRQ controller and flags (bnc#1012382).\n- arm: dts: am335x-pepper: Fix the audio CODEC\u0027s reset pin (bnc#1012382).\n- arm: dts: exynos: Correct Trats2 panel reset line (bnc#1012382).\n- arm: dts: koelsch: Correct clock frequency of X2 DU clock input (bnc#1012382).\n- arm: dts: LogicPD Torpedo: Fix I2C1 pinmux (bnc#1012382).\n- arm: dts: LogicPD Torpedo: Fix I2C1 pinmux (bnc#1012382).\n- arm: dts: omap3-n900: Fix the audio CODEC\u0027s reset pin (bnc#1012382).\n- arm: dts: r8a7790: Correct parent of SSI[0-9] clocks (bnc#1012382).\n- arm: dts: r8a7791: Correct parent of SSI[0-9] clocks (bnc#1012382).\n- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bnc#1012382).\n- asoc: rcar: ssi: do not set SSICR.CKDV = 000 with SSIWSR.CONT (bnc#1012382).\n- ath10k: disallow DFS simulation if DFS channel is not enabled (bnc#1012382).\n- ath10k: fix invalid STS_CAP_OFFSET_MASK (bnc#1012382).\n- ath10k: update tdls teardown state to target (bnc#1012382).\n- ath: Fix updating radar flags for coutry code India (bnc#1012382).\n- batman-adv: handle race condition for claims between gateways (bnc#1012382).\n- bcache: do not attach backing with duplicate UUID (bnc#1012382).\n- blkcg: fix double free of new_blkg in blkcg_init_queue (bnc#1012382).\n- blk-throttle: make sure expire time isn\u0027t too big (bnc#1012382).\n- block: do not assign cmd_flags in __blk_rq_prep_clone (bsc#1088087).\n- block-mq: stop workqueue items in blk_mq_stop_hw_queue() (bsc#1084967).\n- bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174 (bnc#1012382).\n- bluetooth: hci_qca: Avoid setup failure on missing rampatch (bnc#1012382).\n- bnx2x: Align RX buffers (bnc#1012382).\n- bonding: refine bond_fold_stats() wrap detection (bnc#1012382).\n- bpf: fix incorrect sign extension in check_alu_op() (bnc#1012382).\n- bpf: skip unnecessary capability check (bnc#1012382).\n- bpf, x64: implement retpoline for tail call (bnc#1012382).\n- bpf, x64: increase number of passes (bnc#1012382).\n- braille-console: Fix value returned by _braille_console_setup (bnc#1012382).\n- brcmfmac: fix P2P_DEVICE ethernet address generation (bnc#1012382).\n- bridge: check brport attr show in brport_show (bnc#1012382).\n- btrfs: alloc_chunk: fix DUP stripe size handling (bnc#1012382).\n- btrfs: Fix use-after-free when cleaning up fs_devs with a single stale device (bnc#1012382).\n- btrfs: improve delayed refs iterations (bsc#1076033).\n- btrfs: incremental send, fix invalid memory access (git-fixes).\n- btrfs: preserve i_mode if __btrfs_set_acl() fails (bnc#1012382).\n- btrfs: send, fix file hole not being preserved due to inline extent (bnc#1012382).\n- can: cc770: Fix queue stall \u0026 dropped RTR reply (bnc#1012382).\n- can: cc770: Fix stalls on rt-linux, remove redundant IRQ ack (bnc#1012382).\n- can: cc770: Fix use after free in cc770_tx_interrupt() (bnc#1012382).\n- ceph: only dirty ITER_IOVEC pages for direct read (bsc#1084898).\n- ch9200: use skb_cow_head() to deal with cloned skbs (bsc#1088684).\n- clk: bcm2835: Protect sections updating shared registers (bnc#1012382).\n- clk: ns2: Correct SDIO bits (bnc#1012382).\n- clk: qcom: msm8916: fix mnd_width for codec_digcodec (bnc#1012382).\n- clk: si5351: Rename internal plls to avoid name collisions (bnc#1012382).\n- coresight: Fix disabling of CoreSight TPIU (bnc#1012382).\n- coresight: Fixes coresight DT parse to get correct output port ID (bnc#1012382).\n- cpufreq: Fix governor module removal race (bnc#1012382).\n- cpufreq: s3c24xx: Fix broken s3c_cpufreq_init() (bnc#1012382).\n- cpufreq/sh: Replace racy task affinity logic (bnc#1012382).\n- cpuidle: Add new macro to enter a retention idle state (bsc#1084328).\n- cros_ec: fix nul-termination for firmware build info (bnc#1012382).\n- crypto: cavium - fix memory leak on info (bsc#1086518).\n- dcache: Add cond_resched in shrink_dentry_list (bsc#1086194).\n- dccp: check sk for closed state in dccp_sendmsg() (bnc#1012382).\n- dmaengine: imx-sdma: add 1ms delay to ensure SDMA channel is stopped (bnc#1012382).\n- dmaengine: ti-dma-crossbar: Fix event mapping for TPCC_EVT_MUX_60_63 (bnc#1012382).\n- dm: Always copy cmd_flags when cloning a request (bsc#1088087).\n- driver: (adm1275) set the m,b and R coefficients correctly for power (bnc#1012382).\n- drm: Allow determining if current task is output poll worker (bnc#1012382).\n- drm/amdgpu/dce: Do not turn off DP sink when disconnected (bnc#1012382).\n- drm/amdgpu: Fail fb creation from imported dma-bufs. (v2) (bnc#1012382).\n- drm/amdgpu: Fix deadlock on runtime suspend (bnc#1012382).\n- drm/amdgpu: fix KV harvesting (bnc#1012382).\n- drm/amdgpu: Notify sbios device ready before send request (bnc#1012382).\n- drm/amdkfd: Fix memory leaks in kfd topology (bnc#1012382).\n- drm: Defer disabling the vblank IRQ until the next interrupt (for instant-off) (bnc#1012382).\n- drm/edid: set ELD connector type in drm_edid_to_eld() (bnc#1012382).\n- drm/i915/cmdparser: Do not check past the cmd length (bsc#1031717).\n- drm/i915/psr: Check for the specific AUX_FRAME_SYNC cap bit (bsc#1031717).\n- drm/msm: fix leak in failed get_pages (bnc#1012382).\n- drm/nouveau: Fix deadlock on runtime suspend (bnc#1012382).\n- drm/nouveau/kms: Increase max retries in scanout position queries (bnc#1012382).\n- drm/omap: DMM: Check for DMM readiness after successful transaction commit (bnc#1012382).\n- drm: qxl: Do not alloc fbdev if emulation is not supported (bnc#1012382).\n- drm/radeon: Do not turn off DP sink when disconnected (bnc#1012382).\n- drm/radeon: Fail fb creation from imported dma-bufs (bnc#1012382).\n- drm/radeon: Fix deadlock on runtime suspend (bnc#1012382).\n- drm/radeon: fix KV harvesting (bnc#1012382).\n- drm: udl: Properly check framebuffer mmap offsets (bnc#1012382).\n- drm/vmwgfx: Fix a destoy-while-held mutex problem (bnc#1012382).\n- drm/vmwgfx: Fixes to vmwgfx_fb (bnc#1012382).\n- e1000e: Avoid missed interrupts following ICR read (bsc#1075428).\n- e1000e: Avoid receiver overrun interrupt bursts (bsc#1075428).\n- e1000e: Fix check_for_link return value with autoneg off (bsc#1075428).\n- e1000e: Fix link check race condition (bsc#1075428).\n- e1000e: Fix queue interrupt re-raising in Other interrupt (bsc#1075428).\n- e1000e: fix timing for 82579 Gigabit Ethernet controller (bnc#1012382).\n- e1000e: Remove Other from EIAC (bsc#1075428).\n- edac, sb_edac: Fix out of bound writes during DIMM configuration on KNL (git-fixes 3286d3eb906c).\n- ext4: inplace xattr block update fails to deduplicate blocks (bnc#1012382).\n- f2fs: relax node version check for victim data in gc (bnc#1012382).\n- fib_semantics: Do not match route with mismatching tclassid (bnc#1012382).\n- firmware/psci: Expose PSCI conduit (bsc#1068032).\n- firmware/psci: Expose SMCCC version through psci_ops (bsc#1068032).\n- fixup: sctp: verify size of a new chunk in _sctp_make_chunk() (bnc#1012382).\n- fs/aio: Add explicit RCU grace period when freeing kioctx (bnc#1012382).\n- fs/aio: Use RCU accessors for kioctx_table-\u003etable[] (bnc#1012382).\n- fs/hugetlbfs/inode.c: change put_page/unlock_page order in hugetlbfs_fallocate() (git-fixes, bsc#1083745).\n- fs: Teach path_connected to handle nfs filesystems with multiple roots (bnc#1012382).\n- genirq: Track whether the trigger type has been set (git-fixes).\n- genirq: Use irqd_get_trigger_type to compare the trigger type for shared IRQs (bnc#1012382).\n- hdlc_ppp: carrier detect ok, do not turn off negotiation (bnc#1012382).\n- hid: clamp input to logical range if no null state (bnc#1012382).\n- hid: reject input outside logical range only if null state is set (bnc#1012382).\n- hugetlbfs: fix offset overflow in hugetlbfs mmap (bnc#1084353).\n- hv_balloon: fix bugs in num_pages_onlined accounting (fate#323887).\n- hv_balloon: fix printk loglevel (fate#323887).\n- hv_balloon: simplify hv_online_page()/hv_page_online_one() (fate#323887).\n- i2c: i2c-scmi: add a MS HID (bnc#1012382).\n- i2c: xlp9xx: Check for Bus state before every transfer (bsc#1084310).\n- i2c: xlp9xx: Handle NACK on DATA properly (bsc#1084310).\n- i2c: xlp9xx: Handle transactions with I2C_M_RECV_LEN properly (bsc#1060799).\n- i2c: xlp9xx: return ENXIO on slave address NACK (bsc#1060799).\n- i40e: Acquire NVM lock before reads on all devices (bnc#1012382).\n- i40e: avoid NVM acquire deadlock during NVM update (git-fixes).\n- ia64: fix module loading for gcc-5.4 (bnc#1012382).\n- ib/ipoib: Avoid memory leak if the SA returns a different DGID (bnc#1012382).\n- ib/ipoib: Update broadcast object if PKey value was changed in index 0 (bnc#1012382).\n- ib/mlx4: Change vma from shared to private (bnc#1012382).\n- ib/mlx4: Take write semaphore when changing the vma struct (bnc#1012382).\n- ibmvfc: Avoid unnecessary port relogin (bsc#1085404).\n- ibmvnic: Disable irqs before exiting reset from closed state (bsc#1084610).\n- ibmvnic: Do not reset CRQ for Mobility driver resets (bsc#1088600).\n- ibmvnic: Fix DMA mapping mistakes (bsc#1088600).\n- ibmvnic: Fix failover case for non-redundant configuration (bsc#1088600).\n- ibmvnic: Fix reset return from closed state (bsc#1084610).\n- ibmvnic: Fix reset scheduler error handling (bsc#1088600).\n- ibmvnic: Potential NULL dereference in clean_one_tx_pool() (bsc#1085224, git-fixes).\n- ibmvnic: Remove unused TSO resources in TX pool structure (bsc#1085224).\n- ibmvnic: Update TX pool cleaning routine (bsc#1085224).\n- ibmvnic: Zero used TX descriptor counter on reset (bsc#1088600).\n- ib/umem: Fix use of npages/nmap fields (bnc#1012382).\n- ieee802154: 6lowpan: fix possible NULL deref in lowpan_device_event() (bnc#1012382).\n- iio: st_pressure: st_accel: Initialise sensor platform data properly (bnc#1012382).\n- iio: st_pressure: st_accel: pass correct platform data to init (git-fixes).\n- ima: relax requiring a file signature for new files with zero length (bnc#1012382).\n- infiniband/uverbs: Fix integer overflows (bnc#1012382).\n- input: matrix_keypad - fix race when disabling interrupts (bnc#1012382).\n- input: qt1070 - add OF device ID table (bnc#1012382).\n- input: tsc2007 - check for presence and power down tsc2007 during probe (bnc#1012382).\n- iommu/omap: Register driver before setting IOMMU ops (bnc#1012382).\n- iommu/vt-d: clean up pr_irq if request_threaded_irq fails (bnc#1012382).\n- ip6_vti: adjust vti mtu according to mtu of lower device (bnc#1012382).\n- ipmi: do not probe ACPI devices if si_tryacpi is unset (bsc#1060799).\n- ipmi: Fix the I2C address extraction from SPMI tables (bsc#1060799).\n- ipmi_ssif: Fix kernel panic at msg_done_handler (bsc#1088871).\n- ipmi_ssif: Fix logic around alert handling (bsc#1060799).\n- ipmi_ssif: remove redundant null check on array client-\u003eadapter-\u003ename (bsc#1060799).\n- ipmi_ssif: unlock on allocation failure (bsc#1060799).\n- ipmi:ssif: Use i2c_adapter_id instead of adapter-\u003enr (bsc#1060799).\n- ipmi: Use the proper default value for register size in ACPI (bsc#1060799).\n- ipmi/watchdog: fix wdog hang on panic waiting for ipmi response (bnc#1012382).\n- ipv6: fix access to non-linear packet in ndisc_fill_redirect_hdr_option() (bnc#1012382).\n- ipv6 sit: work around bogus gcc-8 -Wrestrict warning (bnc#1012382).\n- ipvlan: add L2 check for packets arriving via virtual devices (bnc#1012382).\n- irqchip/gic-v3-its: Add ACPI NUMA node mapping (bsc#1085981).\n- irqchip/gic-v3-its: Allow GIC ITS number more than MAX_NUMNODES (bsc#1085981).\n- irqchip/gic-v3-its: Ensure nr_ites \u003e= nr_lpis (bnc#1012382).\n- irqchip/gic-v3-its: Remove ACPICA version check for ACPI NUMA (bsc#1085981).\n- kbuild: disable clang\u0027s default use of -fmerge-all-constants (bnc#1012382).\n- kbuild: Handle builtin dtb file names containing hyphens (bnc#1012382).\n- kprobes/x86: Fix kprobe-booster not to boost far call instructions (bnc#1012382).\n- kprobes/x86: Fix to set RWX bits correctly before releasing trampoline (git-fixes).\n- kprobes/x86: Set kprobes pages read-only (bnc#1012382).\n- kvm: arm/arm64: Handle CPU_PM_ENTER_FAILED (bsc#1086499).\n- kvm: arm/arm64: vgic: Add missing irq_lock to vgic_mmio_read_pending (bsc#1086499).\n- kvm: arm/arm64: vgic: Do not populate multiple LRs with the same vintid (bsc#1086499).\n- kvm: arm/arm64: vgic-its: Check result of allocation before use (bsc#).\n- kvm: arm/arm64: vgic-its: Preserve the revious read from the pending table (bsc#1086499).\n- kvm: arm/arm64: vgic-v3: Tighten synchronization for guests using v2 on v3 (bsc#1086499).\n- kvm: mmu: Fix overlap between public and private memslots (bnc#1012382).\n- kvm: nVMX: fix nested tsc scaling (bsc1087999).\n- kvm: PPC: Book3S PR: Exit KVM on failed mapping (bnc#1012382).\n- kvm/x86: fix icebp instruction handling (bnc#1012382).\n- l2tp: do not accept arbitrary sockets (bnc#1012382).\n- libata: Apply NOLPM quirk to Crucial M500 480 and 960GB SSDs (bnc#1012382).\n- libata: Apply NOLPM quirk to Crucial MX100 512GB SSDs (bnc#1012382).\n- libata: disable LPM for Crucial BX100 SSD 500GB drive (bnc#1012382).\n- libata: Enable queued TRIM for Samsung SSD 860 (bnc#1012382).\n- libata: fix length validation of ATAPI-relayed SCSI commands (bnc#1012382).\n- libata: Make Crucial BX100 500GB LPM quirk apply to all firmware versions (bnc#1012382).\n- libata: Modify quirks for MX100 to limit NCQ_TRIM quirk to MU01 version (bnc#1012382).\n- libata: remove WARN() for DMA or PIO command without data (bnc#1012382).\n- lock_parent() needs to recheck if dentry got __dentry_kill\u0027ed under it (bnc#1012382).\n- loop: Fix lost writes caused by missing flag (bnc#1012382).\n- lpfc: update version to 11.4.0.7-1 (bsc#1085383).\n- mac80211: do not parse encrypted management frames in ieee80211_frame_acked (bnc#1012382).\n- mac80211: do not WARN on bad WMM parameters from buggy APs (bsc#1031717).\n- mac80211_hwsim: enforce PS_MANUAL_POLL to be set after PS_ENABLED (bnc#1012382).\n- mac80211: remove BUG() when interface type is invalid (bnc#1012382).\n- md-cluster: fix wrong condition check in raid1_write_request (bsc#1085402).\n- md/raid10: skip spare disk as \u0027first\u0027 disk (bnc#1012382).\n- md/raid10: wait up frozen array in handle_write_completed (bnc#1012382).\n- md/raid6: Fix anomily when recovering a single device in RAID6 (bnc#1012382).\n- media: au0828: fix VIDEO_V4L2 dependency (bsc#1031717).\n- media: bt8xx: Fix err \u0027bt878_probe()\u0027 (bnc#1012382).\n- media: c8sectpfe: fix potential NULL pointer dereference in c8sectpfe_timer_interrupt (bnc#1012382).\n- media: cpia2: Fix a couple off by one bugs (bnc#1012382).\n- media: cx25821: prevent out-of-bounds read on array card (bsc#1031717).\n- media/dvb-core: Race condition when writing to CAM (bnc#1012382).\n- media: i2c/soc_camera: fix ov6650 sensor getting wrong clock (bnc#1012382).\n- media: m88ds3103: do not call a non-initalized function (bnc#1012382).\n- media: [RESEND] media: dvb-frontends: Add delay to Si2168 restart (bnc#1012382).\n- media: s3c-camif: fix out-of-bounds array access (bsc#1031717).\n- mfd: palmas: Reset the POWERHOLD mux during power off (bnc#1012382).\n- mmc: avoid removing non-removable hosts during suspend (bnc#1012382).\n- mmc: dw_mmc: fix falling from idmac to PIO mode when dw_mci_reset occurs (bnc#1012382).\n- mmc: dw_mmc: Fix the DTO/CTO timeout overflow calculation for 32-bit systems (bsc#1088267).\n- mmc: sdhci-of-esdhc: limit SD clock for ls1012a/ls1046a (bnc#1012382).\n- mm: Fix false-positive VM_BUG_ON() in page_cache_{get,add}_speculative() (bnc#1012382).\n- mm/hugetlb.c: do not call region_abort if region_chg fails (bnc#1084353).\n- mm/vmalloc: add interfaces to free unmapped page table (bnc#1012382).\n- mpls, nospec: Sanitize array index in mpls_label_ok() (bnc#1012382).\n- mt7601u: check return value of alloc_skb (bnc#1012382).\n- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bnc#1012382).\n- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bnc#1012382).\n- mtip32xx: use runtime tag to initialize command header (bnc#1012382).\n- net/8021q: create device with all possible features in wanted_features (bnc#1012382).\n- net: ethernet: arc: Fix a potential memory leak if an optional regulator is deferred (bnc#1012382).\n- net: ethernet: ti: cpsw: add check for in-band mode setting with RGMII PHY interface (bnc#1012382).\n- net/faraday: Add missing include of of.h (bnc#1012382).\n- net: fec: Fix unbalanced PM runtime calls (bnc#1012382).\n- netfilter: add back stackpointer size checks (bnc#1012382).\n- netfilter: bridge: ebt_among: add missing match size checks (bnc#1012382).\n- netfilter: IDLETIMER: be syzkaller friendly (bnc#1012382).\n- netfilter: ipv6: fix use-after-free Write in nf_nat_ipv6_manip_pkt (bnc#1012382).\n- netfilter: nat: cope with negative port range (bnc#1012382).\n- netfilter: use skb_to_full_sk in ip_route_me_harder (bnc#1012382).\n- netfilter: x_tables: fix missing timer initialization in xt_LED (bnc#1012382).\n- netfilter: xt_CT: fix refcnt leak on error path (bnc#1012382).\n- net: Fix hlist corruptions in inet_evict_bucket() (bnc#1012382).\n- net: fix race on decreasing number of TX queues (bnc#1012382).\n- net: hns: Fix ethtool private flags (bsc#1085511).\n- net: ipv4: avoid unused variable warning for sysctl (git-fixes).\n- net: ipv4: do not allow setting net.ipv4.route.min_pmtu below 68 (bnc#1012382).\n- net: ipv6: send unsolicited NA after DAD (git-fixes).\n- net: ipv6: send unsolicited NA on admin up (bnc#1012382).\n- net/iucv: Free memory obtained by kzalloc (bnc#1012382).\n- netlink: avoid a double skb free in genlmsg_mcast() (bnc#1012382).\n- netlink: ensure to loop over all netns in genlmsg_multicast_allns() (bnc#1012382).\n- net: mpls: Pull common label check into helper (bnc#1012382).\n- net: Only honor ifindex in IP_PKTINFO if non-0 (bnc#1012382).\n- net: systemport: Rewrite __bcm_sysport_tx_reclaim() (bnc#1012382).\n- net: xfrm: allow clearing socket xfrm policies (bnc#1012382).\n- nfc: nfcmrvl: double free on error path (bnc#1012382).\n- nfc: nfcmrvl: Include unaligned.h instead of access_ok.h (bnc#1012382).\n- nfsd4: permit layoutget of executable-only files (bnc#1012382).\n- nfs: Fix an incorrect type in struct nfs_direct_req (bnc#1012382).\n- nospec: Allow index argument to have const-qualified type (bnc#1012382).\n- nospec: Include \u003casm/barrier.h\u003e dependency (bnc#1012382).\n- nvme: do not send keep-alive frames during reset (bsc#1084223).\n- nvme: do not send keep-alives to the discovery controller (bsc#1086607).\n- nvme: expand nvmf_check_if_ready checks (bsc#1085058).\n- nvme/rdma: do no start error recovery twice (bsc#1084967).\n- nvmet_fc: prevent new io rqsts in possible isr completions (bsc#1083574).\n- of: fix of_device_get_modalias returned length when truncating buffers (bnc#1012382).\n- openvswitch: Delete conntrack entry clashing with an expectation (bnc#1012382).\n- Partial revert \u0027e1000e: Avoid receiver overrun interrupt bursts\u0027 (bsc#1075428).\n- pci/ACPI: Fix bus range comparison in pci_mcfg_lookup() (bsc#1084699).\n- pci: Add function 1 DMA alias quirk for Highpoint RocketRAID 644L (bnc#1012382).\n- pci: Add pci_reset_function_locked() (bsc#1084889).\n- pci: Apply Cavium ACS quirk only to CN81xx/CN83xx/CN88xx devices (bsc#1084914).\n- pci: Avoid FLR for Intel 82579 NICs (bsc#1084889).\n- pci: Avoid slot reset if bridge itself is broken (bsc#1084918).\n- pci: Export pcie_flr() (bsc#1084889).\n- pci: hv: Fix 2 hang issues in hv_compose_msi_msg() (fate#323887, bsc#1087659, bsc#1087906).\n- pci: hv: Fix a comment typo in _hv_pcifront_read_config() (fate#323887, bsc#1087659).\n- pci: hv: Only queue new work items in hv_pci_devices_present() if necessary (fate#323887, bsc#1087659).\n- pci: hv: Remove the bogus test in hv_eject_device_work() (fate#323887, bsc#1087659).\n- pci: hv: Serialize the present and eject work items (fate#323887, bsc#1087659).\n- pci: Mark Haswell Power Control Unit as having non-compliant BARs (bsc#1086015).\n- pci/MSI: Stop disabling MSI/MSI-X in pci_device_shutdown() (bnc#1012382).\n- pci: Probe for device reset support during enumeration (bsc#1084889).\n- pci: Protect pci_error_handlers-\u003ereset_notify() usage with device_lock() (bsc#1084889).\n- pci: Protect restore with device lock to be consistent (bsc#1084889).\n- pci: Remove __pci_dev_reset() and pci_dev_reset() (bsc#1084889).\n- pci: Remove redundant probes for device reset support (bsc#1084889).\n- pci: Wait for up to 1000ms after FLR reset (bsc#1084889).\n- perf inject: Copy events when reordering events in pipe mode (bnc#1012382).\n- perf probe: Return errno when not hitting any event (bnc#1012382).\n- perf session: Do not rely on evlist in pipe mode (bnc#1012382).\n- perf sort: Fix segfault with basic block \u0027cycles\u0027 sort dimension (bnc#1012382).\n- perf tests kmod-path: Do not fail if compressed modules are not supported (bnc#1012382).\n- perf tools: Make perf_event__synthesize_mmap_events() scale (bnc#1012382).\n- perf/x86/intel: Do not accidentally clear high bits in bdw_limit_period() (bnc#1012382).\n- perf/x86/intel/uncore: Fix multi-domain PCI CHA enumeration bug on Skylake servers (bsc#1086357).\n- pinctrl: Really force states during suspend/resume (bnc#1012382).\n- platform/chrome: Use proper protocol transfer function (bnc#1012382).\n- platform/x86: asus-nb-wmi: Add wapf4 quirk for the X302UA (bnc#1012382).\n- power: supply: pda_power: move from timer to delayed_work (bnc#1012382).\n- ppp: prevent unregistered channels from connecting to PPP units (bnc#1012382).\n- pty: cancel pty slave port buf\u0027s work in tty_release (bnc#1012382).\n- pwm: tegra: Increase precision in PWM rate calculation (bnc#1012382).\n- qed: Free RoCE ILT Memory on rmmod qedr (bsc#1019695 FATE#321703 bsc#1019699 FATE#321702 bsc#1022604 FATE#321747).\n- qed: Use after free in qed_rdma_free() (bsc#1019695 FATE#321703 bsc#1019699 FATE#321702 bsc#1022604 FATE#321747).\n- qeth: repair SBAL elements calculation (bnc#1085507, LTC#165484).\n- qlcnic: fix unchecked return value (bnc#1012382).\n- rcutorture/configinit: Fix build directory error message (bnc#1012382).\n- rdma/cma: Use correct size when writing netlink stats (bnc#1012382).\n- rdma/core: Do not use invalid destination in determining port reuse (FATE#321231 FATE#321473 FATE#322153 FATE#322149).\n- rdma/iwpm: Fix uninitialized error code in iwpm_send_mapinfo() (bnc#1012382).\n- rdma/mlx5: Fix integer overflow while resizing CQ (bnc#1012382).\n- rdma/ocrdma: Fix permissions for OCRDMA_RESET_STATS (bnc#1012382).\n- rdma/ucma: Check that user does not overflow QP state (bnc#1012382).\n- rdma/ucma: Fix access to non-initialized CM_ID object (bnc#1012382).\n- rdma/ucma: Limit possible option size (bnc#1012382).\n- regmap: Do not use format_val in regmap_bulk_read (bsc#1031717).\n- regmap: Fix reversed bounds check in regmap_raw_write() (bsc#1031717).\n- regmap: Format data for raw write in regmap_bulk_write (bsc#1031717).\n- regmap-i2c: Off by one in regmap_i2c_smbus_i2c_read/write() (bsc#1031717).\n- regulator: anatop: set default voltage selector for pcie (bnc#1012382).\n- reiserfs: Make cancel_old_flush() reliable (bnc#1012382).\n- Revert \u0027ARM: dts: LogicPD Torpedo: Fix I2C1 pinmux\u0027 (bnc#1012382).\n- Revert \u0027e1000e: Separate signaling for link check/link up\u0027 (bsc#1075428).\n- Revert \u0027genirq: Use irqd_get_trigger_type to compare the trigger type for shared IRQs\u0027 (bnc#1012382).\n- Revert \u0027ipvlan: add L2 check for packets arriving via virtual devices\u0027 (reverted in upstream).\n- Revert \u0027led: core: Fix brightness setting when setting delay_off=0\u0027 (bnc#1012382).\n- rndis_wlan: add return value validation (bnc#1012382).\n- rtc: cmos: Do not assume irq 8 for rtc when there are no legacy irqs (bnc#1012382).\n- rtlwifi: rtl8723be: Fix loss of signal (bnc#1012382).\n- rtlwifi: rtl_pci: Fix the bug when inactiveps is enabled (bnc#1012382).\n- s390/mm: fix local TLB flushing vs. detach of an mm address space (bnc#1088324, LTC#166470).\n- s390/mm: fix race on mm-\u003econtext.flush_mm (bnc#1088324, LTC#166470).\n- s390/mm: no local TLB flush for clearing-by-ASCE IDTE (bnc#1088324, LTC#166470).\n- s390/qeth: apply takeover changes when mode is toggled (bnc#1085507, LTC#165490).\n- s390/qeth: do not apply takeover changes to RXIP (bnc#1085507, LTC#165490).\n- s390/qeth: fix double-free on IP add/remove race (bnc#1085507, LTC#165491).\n- s390/qeth: fix IPA command submission race (bnc#1012382).\n- s390/qeth: fix IP address lookup for L3 devices (bnc#1085507, LTC#165491).\n- s390/qeth: fix IP removal on offline cards (bnc#1085507, LTC#165491).\n- s390/qeth: fix SETIP command handling (bnc#1012382).\n- s390/qeth: free netdevice when removing a card (bnc#1012382).\n- s390/qeth: improve error reporting on IP add/removal (bnc#1085507, LTC#165491).\n- s390/qeth: lock IP table while applying takeover changes (bnc#1085507, LTC#165490).\n- s390/qeth: lock read device while queueing next buffer (bnc#1012382).\n- s390/qeth: on channel error, reject further cmd requests (bnc#1012382).\n- s390/qeth: update takeover IPs after configuration change (bnc#1085507, LTC#165490).\n- s390/qeth: when thread completes, wake up all waiters (bnc#1012382).\n- sched: act_csum: do not mangle TCP and UDP GSO packets (bnc#1012382).\n- sched: Stop resched_cpu() from sending IPIs to offline CPUs (bnc#1012382).\n- sched: Stop switched_to_rt() from sending IPIs to offline CPUs (bnc#1012382).\n- scsi: core: scsi_get_device_flags_keyed(): Always return device flags (bnc#1012382).\n- scsi: devinfo: apply to HP XP the same flags as Hitachi VSP (bnc#1012382).\n- scsi: dh: add new rdac devices (bnc#1012382).\n- scsi: lpfc: Add missing unlock in WQ full logic (bsc#1085383).\n- scsi: lpfc: Code cleanup for 128byte wqe data type (bsc#1085383).\n- scsi: lpfc: Fix mailbox wait for POST_SGL mbox command (bsc#1085383).\n- scsi: lpfc: Fix NVME Initiator FirstBurst (bsc#1085383).\n- scsi: lpfc: Fix SCSI lun discovery when port configured for both SCSI and NVME (bsc#1085383).\n- scsi: lpfc: Memory allocation error during driver start-up on power8 (bsc#1085383).\n- scsi: mac_esp: Replace bogus memory barrier with spinlock (bnc#1012382).\n- scsi: sg: check for valid direction before starting the request (bnc#1012382).\n- scsi: sg: fix SG_DXFER_FROM_DEV transfers (bnc#1012382).\n- scsi: sg: fix static checker warning in sg_is_valid_dxfer (bnc#1012382).\n- scsi: sg: only check for dxfer_len greater than 256M (bnc#1012382 bsc#1064206).\n- scsi: virtio_scsi: always read VPD pages for multiqueue too (git-fixes).\n- scsi: virtio_scsi: Always try to read VPD pages (bnc#1012382).\n- sctp: fix dst refcnt leak in sctp_v4_get_dst (bnc#1012382).\n- sctp: fix dst refcnt leak in sctp_v6_get_dst() (bnc#1012382).\n- sctp: verify size of a new chunk in _sctp_make_chunk() (bnc#1012382).\n- selftests/x86: Add tests for the STR and SLDT instructions (bnc#1012382).\n- selftests/x86: Add tests for User-Mode Instruction Prevention (bnc#1012382).\n- selftests/x86/entry_from_vm86: Add test cases for POPF (bnc#1012382).\n- selftests/x86/entry_from_vm86: Exit with 1 if we fail (bnc#1012382).\n- selinux: check for address length in selinux_socket_bind() (bnc#1012382).\n- serial: 8250_pci: Add Brainboxes UC-260 4 port serial device (bnc#1012382).\n- serial: sh-sci: prevent lockup on full TTY buffers (bnc#1012382).\n- skbuff: Fix not waking applications when errors are enqueued (bnc#1012382).\n- sm501fb: do not return zero on failure path in sm501fb_start() (bnc#1012382).\n- solo6x10: release vb2 buffers in solo_stop_streaming() (bnc#1012382).\n- spi: dw: Disable clock after unregistering the host (bnc#1012382).\n- spi: omap2-mcspi: poll OMAP2_MCSPI_CHSTAT_RXS for PIO transfer (bnc#1012382).\n- spi: sun6i: disable/unprepare clocks on remove (bnc#1012382).\n- staging: android: ashmem: Fix lockdep issue during llseek (bnc#1012382).\n- staging: android: ashmem: Fix possible deadlock in ashmem_ioctl (bnc#1012382).\n- staging: comedi: fix comedi_nsamples_left (bnc#1012382).\n- staging: lustre: ptlrpc: kfree used instead of kvfree (bnc#1012382).\n- staging: ncpfs: memory corruption in ncp_read_kernel() (bnc#1012382).\n- staging: speakup: Replace BUG_ON() with WARN_ON() (bnc#1012382).\n- staging: unisys: visorhba: fix s-Par to boot with option CONFIG_VMAP_STACK set to y (bnc#1012382).\n- staging: wilc1000: add check for kmalloc allocation failure (bnc#1012382).\n- staging: wilc1000: fix unchecked return value (bnc#1012382).\n- sysrq: Reset the watchdog timers while displaying high-resolution timers (bnc#1012382).\n- target: prefer dbroot of /etc/target over /var/target (bsc#1087274).\n- tcm_fileio: Prevent information leak for short reads (bnc#1012382).\n- tcp: remove poll() flakes with FastOpen (bnc#1012382).\n- tcp: sysctl: Fix a race to avoid unexpected 0 window from space (bnc#1012382).\n- team: Fix double free in error path (bnc#1012382).\n- test_firmware: fix setting old custom fw path back on exit (bnc#1012382).\n- time: Change posix clocks ops interfaces to use timespec64 (bnc#1012382).\n- timers, sched_clock: Update timeout for clock wrap (bnc#1012382).\n- tools/usbip: fixes build with musl libc toolchain (bnc#1012382).\n- tpm_i2c_infineon: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).\n- tpm_i2c_nuvoton: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).\n- tpm: st33zp24: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).\n- tpm/tpm_crb: Use start method value from ACPI table directly (bsc#1084452).\n- tracing: probeevent: Fix to support minus offset from symbol (bnc#1012382).\n- tty/serial: atmel: add new version check for usart (bnc#1012382).\n- tty: vt: fix up tabstops properly (bnc#1012382).\n- uas: fix comparison for error code (bnc#1012382).\n- ubi: Fix race condition between ubi volume creation and udev (bnc#1012382).\n- udplite: fix partial checksum initialization (bnc#1012382).\n- usb: Do not print a warning if interface driver rebind is deferred at resume (bsc#1087211).\n- usb: dwc2: Make sure we disconnect the gadget state (bnc#1012382).\n- usb: gadget: bdc: 64-bit pointer capability check (bnc#1012382).\n- usb: gadget: dummy_hcd: Fix wrong power status bit clear/reset in dummy_hub_control() (bnc#1012382).\n- usb: gadget: f_fs: Fix use-after-free in ffs_fs_kill_sb() (bnc#1012382).\n- usb: gadget: udc: Add missing platform_device_put() on error in bdc_pci_probe() (bnc#1012382).\n- usb: quirks: add control message delay for 1b1c:1b20 (bnc#1012382).\n- usb: storage: Add JMicron bridge 152d:2567 to unusual_devs.h (bnc#1012382).\n- usb: usbmon: Read text within supplied buffer size (bnc#1012382).\n- usb: usbmon: remove assignment from IS_ERR argument (bnc#1012382).\n- veth: set peer GSO values (bnc#1012382).\n- vgacon: Set VGA struct resource types (bnc#1012382).\n- video: ARM CLCD: fix dma allocation size (bnc#1012382).\n- video: fbdev: udlfb: Fix buffer on stack (bnc#1012382).\n- video/hdmi: Allow \u0027empty\u0027 HDMI infoframes (bnc#1012382).\n- vxlan: vxlan dev should inherit lowerdev\u0027s gso_max_size (bnc#1012382).\n- wan: pc300too: abort path on failure (bnc#1012382).\n- watchdog: hpwdt: Check source of NMI (bnc#1012382).\n- watchdog: hpwdt: fix unused variable warning (bnc#1012382).\n- watchdog: hpwdt: SMBIOS check (bnc#1012382).\n- watchdog: sbsa: use 32-bit read for WCV (bsc#1085679).\n- wil6210: fix memory access violation in wil_memcpy_from/toio_32 (bnc#1012382).\n- workqueue: Allow retrieval of current task\u0027s work struct (bnc#1012382).\n- x86/apic/vector: Handle legacy irq data correctly (bnc#1012382).\n- x86/boot/64: Verify alignment of the LOAD segment (bnc#1012382).\n- x86/build/64: Force the linker to use 2MB page size (bnc#1012382).\n- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).\n- x86: i8259: export legacy_pic symbol (bnc#1012382).\n- x86/kaiser: Duplicate cpu_tss for an entry trampoline usage (bsc#1077560 bsc#1083836).\n- x86/kaiser: enforce trampoline stack alignment (bsc#1087260).\n- x86/kaiser: Remove a user mapping of cpu_tss structure (bsc#1077560 bsc#1083836).\n- x86/kaiser: Use a per-CPU trampoline stack for kernel entry (bsc#1077560).\n- x86/MCE: Serialize sysfs changes (bnc#1012382).\n- x86/mm: Fix vmalloc_fault to use pXd_large (bnc#1012382).\n- x86/mm: implement free pmd/pte page interfaces (bnc#1012382).\n- x86/module: Detect and skip invalid relocations (bnc#1012382).\n- x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklist (bsc#1087845).\n- x86: Treat R_X86_64_PLT32 as R_X86_64_PC32 (bnc#1012382).\n- x86/vm86/32: Fix POPF emulation (bnc#1012382).\n- xen-blkfront: fix mq start/stop race (bsc#1085042).\n- xen-netback: use skb to determine number of required guest Rx requests (bsc#1046610).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-SLE-DESKTOP-12-SP3-2018-718,SUSE-SLE-HA-12-SP3-2018-718,SUSE-SLE-Live-Patching-12-SP3-2018-718,SUSE-SLE-SDK-12-SP3-2018-718,SUSE-SLE-SERVER-12-SP3-2018-718,SUSE-SLE-WE-12-SP3-2018-718",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1048-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2018:1048-1",
        "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181048-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2018:1048-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003954.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1012382",
        "url": "https://bugzilla.suse.com/1012382"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1019695",
        "url": "https://bugzilla.suse.com/1019695"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1019699",
        "url": "https://bugzilla.suse.com/1019699"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1022604",
        "url": "https://bugzilla.suse.com/1022604"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1031717",
        "url": "https://bugzilla.suse.com/1031717"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1046610",
        "url": "https://bugzilla.suse.com/1046610"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1060799",
        "url": "https://bugzilla.suse.com/1060799"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1064206",
        "url": "https://bugzilla.suse.com/1064206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1068032",
        "url": "https://bugzilla.suse.com/1068032"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1073059",
        "url": "https://bugzilla.suse.com/1073059"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1073069",
        "url": "https://bugzilla.suse.com/1073069"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1075428",
        "url": "https://bugzilla.suse.com/1075428"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1076033",
        "url": "https://bugzilla.suse.com/1076033"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1077560",
        "url": "https://bugzilla.suse.com/1077560"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1083574",
        "url": "https://bugzilla.suse.com/1083574"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1083745",
        "url": "https://bugzilla.suse.com/1083745"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1083836",
        "url": "https://bugzilla.suse.com/1083836"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1084223",
        "url": "https://bugzilla.suse.com/1084223"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1084310",
        "url": "https://bugzilla.suse.com/1084310"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1084328",
        "url": "https://bugzilla.suse.com/1084328"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1084353",
        "url": "https://bugzilla.suse.com/1084353"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1084452",
        "url": "https://bugzilla.suse.com/1084452"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1084610",
        "url": "https://bugzilla.suse.com/1084610"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1084699",
        "url": "https://bugzilla.suse.com/1084699"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1084829",
        "url": "https://bugzilla.suse.com/1084829"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1084889",
        "url": "https://bugzilla.suse.com/1084889"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1084898",
        "url": "https://bugzilla.suse.com/1084898"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1084914",
        "url": "https://bugzilla.suse.com/1084914"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1084918",
        "url": "https://bugzilla.suse.com/1084918"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1084967",
        "url": "https://bugzilla.suse.com/1084967"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085042",
        "url": "https://bugzilla.suse.com/1085042"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085058",
        "url": "https://bugzilla.suse.com/1085058"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085224",
        "url": "https://bugzilla.suse.com/1085224"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085383",
        "url": "https://bugzilla.suse.com/1085383"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085402",
        "url": "https://bugzilla.suse.com/1085402"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085404",
        "url": "https://bugzilla.suse.com/1085404"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085487",
        "url": "https://bugzilla.suse.com/1085487"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085507",
        "url": "https://bugzilla.suse.com/1085507"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085511",
        "url": "https://bugzilla.suse.com/1085511"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085679",
        "url": "https://bugzilla.suse.com/1085679"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085981",
        "url": "https://bugzilla.suse.com/1085981"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086015",
        "url": "https://bugzilla.suse.com/1086015"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086162",
        "url": "https://bugzilla.suse.com/1086162"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086194",
        "url": "https://bugzilla.suse.com/1086194"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086357",
        "url": "https://bugzilla.suse.com/1086357"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086499",
        "url": "https://bugzilla.suse.com/1086499"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086518",
        "url": "https://bugzilla.suse.com/1086518"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086607",
        "url": "https://bugzilla.suse.com/1086607"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1087088",
        "url": "https://bugzilla.suse.com/1087088"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1087211",
        "url": "https://bugzilla.suse.com/1087211"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1087231",
        "url": "https://bugzilla.suse.com/1087231"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1087260",
        "url": "https://bugzilla.suse.com/1087260"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1087274",
        "url": "https://bugzilla.suse.com/1087274"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1087659",
        "url": "https://bugzilla.suse.com/1087659"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1087845",
        "url": "https://bugzilla.suse.com/1087845"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1087906",
        "url": "https://bugzilla.suse.com/1087906"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1087999",
        "url": "https://bugzilla.suse.com/1087999"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1088050",
        "url": "https://bugzilla.suse.com/1088050"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1088087",
        "url": "https://bugzilla.suse.com/1088087"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1088241",
        "url": "https://bugzilla.suse.com/1088241"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1088267",
        "url": "https://bugzilla.suse.com/1088267"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1088313",
        "url": "https://bugzilla.suse.com/1088313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1088324",
        "url": "https://bugzilla.suse.com/1088324"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1088600",
        "url": "https://bugzilla.suse.com/1088600"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1088684",
        "url": "https://bugzilla.suse.com/1088684"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1088871",
        "url": "https://bugzilla.suse.com/1088871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 802154",
        "url": "https://bugzilla.suse.com/802154"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-18257 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-18257/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-1091 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-1091/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-7740 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-7740/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-8043 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-8043/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-8822 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-8822/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2018-04-23T15:08:46Z",
      "generator": {
        "date": "2018-04-23T15:08:46Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2018:1048-1",
      "initial_release_date": "2018-04-23T15:08:46Z",
      "revision_history": [
        {
          "date": "2018-04-23T15:08:46Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.4.126-94.22.1.aarch64",
                "product": {
                  "name": "kernel-obs-build-4.4.126-94.22.1.aarch64",
                  "product_id": "kernel-obs-build-4.4.126-94.22.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.4.126-94.22.1.aarch64",
                "product": {
                  "name": "kernel-default-4.4.126-94.22.1.aarch64",
                  "product_id": "kernel-default-4.4.126-94.22.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.4.126-94.22.1.aarch64",
                "product": {
                  "name": "kernel-default-base-4.4.126-94.22.1.aarch64",
                  "product_id": "kernel-default-base-4.4.126-94.22.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.4.126-94.22.1.aarch64",
                "product": {
                  "name": "kernel-default-devel-4.4.126-94.22.1.aarch64",
                  "product_id": "kernel-default-devel-4.4.126-94.22.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.4.126-94.22.1.aarch64",
                "product": {
                  "name": "kernel-syms-4.4.126-94.22.1.aarch64",
                  "product_id": "kernel-syms-4.4.126-94.22.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-4.4.126-94.22.2.noarch",
                "product": {
                  "name": "kernel-devel-4.4.126-94.22.2.noarch",
                  "product_id": "kernel-devel-4.4.126-94.22.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-4.4.126-94.22.2.noarch",
                "product": {
                  "name": "kernel-macros-4.4.126-94.22.2.noarch",
                  "product_id": "kernel-macros-4.4.126-94.22.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-4.4.126-94.22.2.noarch",
                "product": {
                  "name": "kernel-source-4.4.126-94.22.2.noarch",
                  "product_id": "kernel-source-4.4.126-94.22.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-4.4.126-94.22.1.noarch",
                "product": {
                  "name": "kernel-docs-4.4.126-94.22.1.noarch",
                  "product_id": "kernel-docs-4.4.126-94.22.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
                  "product_id": "cluster-md-kmp-default-4.4.126-94.22.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.4.126-94.22.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-4.4.126-94.22.1.ppc64le",
                  "product_id": "dlm-kmp-default-4.4.126-94.22.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
                  "product_id": "gfs2-kmp-default-4.4.126-94.22.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
                  "product_id": "ocfs2-kmp-default-4.4.126-94.22.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
                  "product_id": "kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.4.126-94.22.1.ppc64le",
                "product": {
                  "name": "kernel-obs-build-4.4.126-94.22.1.ppc64le",
                  "product_id": "kernel-obs-build-4.4.126-94.22.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.4.126-94.22.1.ppc64le",
                "product": {
                  "name": "kernel-default-4.4.126-94.22.1.ppc64le",
                  "product_id": "kernel-default-4.4.126-94.22.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.4.126-94.22.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-4.4.126-94.22.1.ppc64le",
                  "product_id": "kernel-default-base-4.4.126-94.22.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.4.126-94.22.1.ppc64le",
                "product": {
                  "name": "kernel-default-devel-4.4.126-94.22.1.ppc64le",
                  "product_id": "kernel-default-devel-4.4.126-94.22.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.4.126-94.22.1.ppc64le",
                "product": {
                  "name": "kernel-syms-4.4.126-94.22.1.ppc64le",
                  "product_id": "kernel-syms-4.4.126-94.22.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.4.126-94.22.1.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-4.4.126-94.22.1.s390x",
                  "product_id": "cluster-md-kmp-default-4.4.126-94.22.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.4.126-94.22.1.s390x",
                "product": {
                  "name": "dlm-kmp-default-4.4.126-94.22.1.s390x",
                  "product_id": "dlm-kmp-default-4.4.126-94.22.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.4.126-94.22.1.s390x",
                "product": {
                  "name": "gfs2-kmp-default-4.4.126-94.22.1.s390x",
                  "product_id": "gfs2-kmp-default-4.4.126-94.22.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.4.126-94.22.1.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-4.4.126-94.22.1.s390x",
                  "product_id": "ocfs2-kmp-default-4.4.126-94.22.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.4.126-94.22.1.s390x",
                "product": {
                  "name": "kernel-obs-build-4.4.126-94.22.1.s390x",
                  "product_id": "kernel-obs-build-4.4.126-94.22.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.4.126-94.22.1.s390x",
                "product": {
                  "name": "kernel-default-4.4.126-94.22.1.s390x",
                  "product_id": "kernel-default-4.4.126-94.22.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.4.126-94.22.1.s390x",
                "product": {
                  "name": "kernel-default-base-4.4.126-94.22.1.s390x",
                  "product_id": "kernel-default-base-4.4.126-94.22.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.4.126-94.22.1.s390x",
                "product": {
                  "name": "kernel-default-devel-4.4.126-94.22.1.s390x",
                  "product_id": "kernel-default-devel-4.4.126-94.22.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-4.4.126-94.22.1.s390x",
                "product": {
                  "name": "kernel-default-man-4.4.126-94.22.1.s390x",
                  "product_id": "kernel-default-man-4.4.126-94.22.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.4.126-94.22.1.s390x",
                "product": {
                  "name": "kernel-syms-4.4.126-94.22.1.s390x",
                  "product_id": "kernel-syms-4.4.126-94.22.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-default-4.4.126-94.22.1.x86_64",
                "product": {
                  "name": "kernel-default-4.4.126-94.22.1.x86_64",
                  "product_id": "kernel-default-4.4.126-94.22.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.4.126-94.22.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-4.4.126-94.22.1.x86_64",
                  "product_id": "kernel-default-devel-4.4.126-94.22.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.4.126-94.22.1.x86_64",
                "product": {
                  "name": "kernel-default-extra-4.4.126-94.22.1.x86_64",
                  "product_id": "kernel-default-extra-4.4.126-94.22.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.4.126-94.22.1.x86_64",
                "product": {
                  "name": "kernel-syms-4.4.126-94.22.1.x86_64",
                  "product_id": "kernel-syms-4.4.126-94.22.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
                  "product_id": "cluster-md-kmp-default-4.4.126-94.22.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.4.126-94.22.1.x86_64",
                "product": {
                  "name": "dlm-kmp-default-4.4.126-94.22.1.x86_64",
                  "product_id": "dlm-kmp-default-4.4.126-94.22.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.4.126-94.22.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-4.4.126-94.22.1.x86_64",
                  "product_id": "gfs2-kmp-default-4.4.126-94.22.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
                  "product_id": "ocfs2-kmp-default-4.4.126-94.22.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
                "product": {
                  "name": "kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
                  "product_id": "kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.4.126-94.22.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-4.4.126-94.22.1.x86_64",
                  "product_id": "kernel-obs-build-4.4.126-94.22.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.4.126-94.22.1.x86_64",
                "product": {
                  "name": "kernel-default-base-4.4.126-94.22.1.x86_64",
                  "product_id": "kernel-default-base-4.4.126-94.22.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Desktop 12 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Desktop 12 SP3",
                  "product_id": "SUSE Linux Enterprise Desktop 12 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sled:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
                  "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-ha:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP3",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
                  "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-sdk:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP3",
                  "product_id": "SUSE Linux Enterprise Server 12 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Workstation Extension 12 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Workstation Extension 12 SP3",
                  "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-we:12:sp3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
          "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64"
        },
        "product_reference": "kernel-default-4.4.126-94.22.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
          "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.4.126-94.22.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
          "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
        },
        "product_reference": "kernel-default-extra-4.4.126-94.22.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.4.126-94.22.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
          "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch"
        },
        "product_reference": "kernel-devel-4.4.126-94.22.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.4.126-94.22.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
          "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch"
        },
        "product_reference": "kernel-macros-4.4.126-94.22.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.4.126-94.22.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
          "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch"
        },
        "product_reference": "kernel-source-4.4.126-94.22.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
          "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64"
        },
        "product_reference": "kernel-syms-4.4.126-94.22.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x"
        },
        "product_reference": "cluster-md-kmp-default-4.4.126-94.22.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le"
        },
        "product_reference": "dlm-kmp-default-4.4.126-94.22.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x"
        },
        "product_reference": "dlm-kmp-default-4.4.126-94.22.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-4.4.126-94.22.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x"
        },
        "product_reference": "gfs2-kmp-default-4.4.126-94.22.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-4.4.126-94.22.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x"
        },
        "product_reference": "ocfs2-kmp-default-4.4.126-94.22.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-4.4.126-94.22.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch"
        },
        "product_reference": "kernel-docs-4.4.126-94.22.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.4.126-94.22.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64"
        },
        "product_reference": "kernel-obs-build-4.4.126-94.22.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le"
        },
        "product_reference": "kernel-obs-build-4.4.126-94.22.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x"
        },
        "product_reference": "kernel-obs-build-4.4.126-94.22.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64"
        },
        "product_reference": "kernel-obs-build-4.4.126-94.22.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.126-94.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64"
        },
        "product_reference": "kernel-default-4.4.126-94.22.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le"
        },
        "product_reference": "kernel-default-4.4.126-94.22.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x"
        },
        "product_reference": "kernel-default-4.4.126-94.22.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64"
        },
        "product_reference": "kernel-default-4.4.126-94.22.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.126-94.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.4.126-94.22.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.4.126-94.22.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x"
        },
        "product_reference": "kernel-default-base-4.4.126-94.22.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.4.126-94.22.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.126-94.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.4.126-94.22.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.4.126-94.22.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x"
        },
        "product_reference": "kernel-default-devel-4.4.126-94.22.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.4.126-94.22.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x"
        },
        "product_reference": "kernel-default-man-4.4.126-94.22.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.4.126-94.22.2.noarch as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch"
        },
        "product_reference": "kernel-devel-4.4.126-94.22.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.4.126-94.22.2.noarch as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch"
        },
        "product_reference": "kernel-macros-4.4.126-94.22.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.4.126-94.22.2.noarch as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch"
        },
        "product_reference": "kernel-source-4.4.126-94.22.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.126-94.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64"
        },
        "product_reference": "kernel-syms-4.4.126-94.22.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.4.126-94.22.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x"
        },
        "product_reference": "kernel-syms-4.4.126-94.22.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64"
        },
        "product_reference": "kernel-syms-4.4.126-94.22.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.126-94.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64"
        },
        "product_reference": "kernel-default-4.4.126-94.22.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le"
        },
        "product_reference": "kernel-default-4.4.126-94.22.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x"
        },
        "product_reference": "kernel-default-4.4.126-94.22.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64"
        },
        "product_reference": "kernel-default-4.4.126-94.22.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.126-94.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.4.126-94.22.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.4.126-94.22.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x"
        },
        "product_reference": "kernel-default-base-4.4.126-94.22.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.4.126-94.22.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.126-94.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.4.126-94.22.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.4.126-94.22.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x"
        },
        "product_reference": "kernel-default-devel-4.4.126-94.22.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.4.126-94.22.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x"
        },
        "product_reference": "kernel-default-man-4.4.126-94.22.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.4.126-94.22.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch"
        },
        "product_reference": "kernel-devel-4.4.126-94.22.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.4.126-94.22.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch"
        },
        "product_reference": "kernel-macros-4.4.126-94.22.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.4.126-94.22.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch"
        },
        "product_reference": "kernel-source-4.4.126-94.22.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.126-94.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64"
        },
        "product_reference": "kernel-syms-4.4.126-94.22.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.126-94.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.4.126-94.22.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.126-94.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x"
        },
        "product_reference": "kernel-syms-4.4.126-94.22.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64"
        },
        "product_reference": "kernel-syms-4.4.126-94.22.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-4.4.126-94.22.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
        },
        "product_reference": "kernel-default-extra-4.4.126-94.22.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-18257",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-18257"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The __get_data_block function in fs/f2fs/data.c in the Linux kernel before 4.11 allows local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-18257",
          "url": "https://www.suse.com/security/cve/CVE-2017-18257"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1088241 for CVE-2017-18257",
          "url": "https://bugzilla.suse.com/1088241"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-04-23T15:08:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-18257"
    },
    {
      "cve": "CVE-2018-1091",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-1091"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c in the Linux kernel before 4.13.5, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path, leading to a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-1091",
          "url": "https://www.suse.com/security/cve/CVE-2018-1091"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087231 for CVE-2018-1091",
          "url": "https://bugzilla.suse.com/1087231"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-04-23T15:08:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-1091"
    },
    {
      "cve": "CVE-2018-7740",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-7740"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The resv_map_release function in mm/hugetlb.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (BUG) via a crafted application that makes mmap system calls and has a large pgoff argument to the remap_file_pages system call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-7740",
          "url": "https://www.suse.com/security/cve/CVE-2018-7740"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1084353 for CVE-2018-7740",
          "url": "https://bugzilla.suse.com/1084353"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-04-23T15:08:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-7740"
    },
    {
      "cve": "CVE-2018-8043",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-8043"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-8043",
          "url": "https://www.suse.com/security/cve/CVE-2018-8043"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1084829 for CVE-2018-8043",
          "url": "https://bugzilla.suse.com/1084829"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 0,
            "baseSeverity": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-04-23T15:08:46Z",
          "details": "low"
        }
      ],
      "title": "CVE-2018-8043"
    },
    {
      "cve": "CVE-2018-8822",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-8822"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-8822",
          "url": "https://www.suse.com/security/cve/CVE-2018-8822"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1086162 for CVE-2018-8822",
          "url": "https://bugzilla.suse.com/1086162"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1090404 for CVE-2018-8822",
          "url": "https://bugzilla.suse.com/1090404"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1091815 for CVE-2018-8822",
          "url": "https://bugzilla.suse.com/1091815"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-1-4.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.126-94.22.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.126-94.22.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.126-94.22.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.126-94.22.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-04-23T15:08:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-8822"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…