{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.73.1","kernel-default-base":"4.4.121-92.73.1","kernel-default-devel":"4.4.121-92.73.1","kernel-devel":"4.4.121-92.73.1","kernel-macros":"4.4.121-92.73.1","kernel-source":"4.4.121-92.73.1","kernel-syms":"4.4.121-92.73.1","kgraft-patch-4_4_121-92_73-default":"1-3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-BCL","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.121-92.73.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.73.1","kernel-default-base":"4.4.121-92.73.1","kernel-default-devel":"4.4.121-92.73.1","kernel-devel":"4.4.121-92.73.1","kernel-macros":"4.4.121-92.73.1","kernel-source":"4.4.121-92.73.1","kernel-syms":"4.4.121-92.73.1","kgraft-patch-4_4_121-92_73-default":"1-3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-BCL","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.121-92.73.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.73.1","kernel-default-base":"4.4.121-92.73.1","kernel-default-devel":"4.4.121-92.73.1","kernel-devel":"4.4.121-92.73.1","kernel-macros":"4.4.121-92.73.1","kernel-source":"4.4.121-92.73.1","kernel-syms":"4.4.121-92.73.1","kgraft-patch-4_4_121-92_73-default":"1-3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-BCL","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.121-92.73.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.73.1","kernel-default-base":"4.4.121-92.73.1","kernel-default-devel":"4.4.121-92.73.1","kernel-devel":"4.4.121-92.73.1","kernel-macros":"4.4.121-92.73.1","kernel-source":"4.4.121-92.73.1","kernel-syms":"4.4.121-92.73.1","kgraft-patch-4_4_121-92_73-default":"1-3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-BCL","name":"kgraft-patch-SLE12-SP2_Update_21","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_21&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-3.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\n\nThe SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to 4.4.121 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability that allowed local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bnc#1090643).\n- CVE-2018-10124: The kill_something_info function in kernel/signal.c might have allowed local users to cause a denial of service via an INT_MIN argument (bnc#1089752).\n- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).\n- CVE-2017-18257: The __get_data_block function in fs/f2fs/data.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl. (bnc#1088241)\n- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).\n- CVE-2018-8043: The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c did not validate certain resource availability, which allowed local users to cause a denial of service (NULL pointer dereference) (bnc#1084829).\n- CVE-2018-7740: The resv_map_release function in mm/hugetlb.c allowed local users to cause a denial of service (BUG) via a crafted application that made mmap system calls and has a large pgoff argument to the remap_file_pages system call (bnc#1084353).\n- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)\n- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)\n\nThe following non-security bugs were fixed:\n\n- alsa: hda/realtek - Fix speaker no sound after system resume (bsc#1031717).\n- alsa: hda: Add a power_save blacklist (bnc#1012382).\n- alsa: usb-audio: Add a quirck for B&W PX headphones (bnc#1012382).\n- arm: dts: LogicPD Torpedo: Fix I2C1 pinmux (bnc#1012382).\n- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bnc#1012382).\n- kvm: mmu: Fix overlap between public and private memslots (bnc#1012382).\n- Partial revert 'e1000e: Avoid receiver overrun interrupt bursts' (bsc#1075428).\n- Revert 'e1000e: Separate signaling for link check/link up' (bsc#1075428).\n- Revert 'led: core: Fix brightness setting when setting delay_off=0' (bnc#1012382).\n- Revert 'watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).' This reverts commit 5d4a2355a2a1c2ec6fdf9d18b68ca0a04ff73c70.\n- bpf, x64: implement retpoline for tail call (bnc#1012382).\n- bridge: check brport attr show in brport_show (bnc#1012382).\n- btrfs: Only check first key for committed tree blocks (bsc#1084721).\n- btrfs: Validate child tree block's level and first key (bsc#1084721).\n- btrfs: preserve i_mode if __btrfs_set_acl() fails (bnc#1012382).\n- ch9200: use skb_cow_head() to deal with cloned skbs (bsc#1088684).\n- cpufreq: s3c24xx: Fix broken s3c_cpufreq_init() (bnc#1012382).\n- dcache: Add cond_resched in shrink_dentry_list (bsc#1086194).\n- dm io: fix duplicate bio completion due to missing ref count (bnc#1012382).\n- drm/i915/cmdparser: Do not check past the cmd length (bsc#1031717).\n- drm/i915/psr: Check for the specific AUX_FRAME_SYNC cap bit (bsc#1031717).\n- e1000e: Avoid missed interrupts following ICR read (bsc#1075428).\n- e1000e: Avoid receiver overrun interrupt bursts (bsc#1075428).\n- e1000e: Fix check_for_link return value with autoneg off (bsc#1075428).\n- e1000e: Fix link check race condition (bsc#1075428).\n- e1000e: Fix queue interrupt re-raising in Other interrupt (bsc#1075428).\n- e1000e: Remove Other from EIAC (bsc#1075428).\n- fib_semantics: Do not match route with mismatching tclassid (bnc#1012382).\n- fs/hugetlbfs/inode.c: change put_page/unlock_page order in hugetlbfs_fallocate() (git-fixes, bsc#1083745).\n- hdlc_ppp: carrier detect ok, do not turn off negotiation (bnc#1012382).\n- hugetlbfs: fix offset overflow in hugetlbfs mmap (bnc#1084353).\n- ibmvfc: Avoid unnecessary port relogin (bsc#1085404).\n- ibmvnic: Clear pending interrupt after device reset (bsc#1089644).\n- ibmvnic: Define vnic_login_client_data name field as unsized array (bsc#1089198).\n- ibmvnic: Disable irqs before exiting reset from closed state (bsc#1084610).\n- ibmvnic: Do not notify peers on parameter change resets (bsc#1089198).\n- ibmvnic: Do not reset CRQ for Mobility driver resets (bsc#1088600).\n- ibmvnic: Fix DMA mapping mistakes (bsc#1088600).\n- ibmvnic: Fix failover case for non-redundant configuration (bsc#1088600).\n- ibmvnic: Fix reset return from closed state (bsc#1084610).\n- ibmvnic: Fix reset scheduler error handling (bsc#1088600).\n- ibmvnic: Handle all login error conditions (bsc#1089198).\n- ibmvnic: Potential NULL dereference in clean_one_tx_pool() (bsc#1085224, git-fixes).\n- ibmvnic: Remove unused TSO resources in TX pool structure (bsc#1085224).\n- ibmvnic: Update TX pool cleaning routine (bsc#1085224).\n- ibmvnic: Zero used TX descriptor counter on reset (bsc#1088600).\n- ipv6 sit: work around bogus gcc-8 -Wrestrict warning (bnc#1012382).\n- kGraft: fix small race in reversion code (bsc#1083125).\n- kabi/severities: Ignore kgr_shadow_* kABI changes\n- kvm/x86: fix icebp instruction handling (bnc#1012382).\n- livepatch: Allow to call a custom callback when freeing shadow variables (bsc#1082299 fate#313296).\n- livepatch: Initialize shadow variables safely by a custom callback (bsc#1082299 fate#313296).\n- mac80211: do not WARN on bad WMM parameters from buggy APs (bsc#1031717).\n- md-cluster: fix wrong condition check in raid1_write_request (bsc#1085402).\n- media: au0828: fix VIDEO_V4L2 dependency (bsc#1031717).\n- media: cx25821: prevent out-of-bounds read on array card (bsc#1031717).\n- media: m88ds3103: do not call a non-initalized function (bnc#1012382).\n- media: s3c-camif: fix out-of-bounds array access (bsc#1031717).\n- mm/hugetlb.c: do not call region_abort if region_chg fails (bnc#1084353).\n- mpls, nospec: Sanitize array index in mpls_label_ok() (bnc#1012382).\n- net: fix race on decreasing number of TX queues (bnc#1012382).\n- net: ipv4: avoid unused variable warning for sysctl (git-fixes).\n- net: ipv4: do not allow setting net.ipv4.route.min_pmtu below 68 (bnc#1012382).\n- net: mpls: Pull common label check into helper (bnc#1012382).\n- netlink: ensure to loop over all netns in genlmsg_multicast_allns() (bnc#1012382).\n- nospec: Allow index argument to have const-qualified type (bnc#1012382).\n- perf/x86/intel: Add model number for Skylake Server to perf (FATE#321269).\n- powerpc/crash: Remove the test for cpu_online in the IPI callback (bsc#1088242).\n- powerpc: Do not send system reset request through the oops path (bsc#1088242).\n- powerpc: System reset avoid interleaving oops using die synchronisation (bsc#1088242).\n- ppp: prevent unregistered channels from connecting to PPP units (bnc#1012382).\n- regmap-i2c: Off by one in regmap_i2c_smbus_i2c_read/write() (bsc#1031717).\n- regmap: Do not use format_val in regmap_bulk_read (bsc#1031717).\n- regmap: Fix reversed bounds check in regmap_raw_write() (bsc#1031717).\n- regmap: Format data for raw write in regmap_bulk_write (bsc#1031717).\n- rpm/config.sh: ensure sorted patches.\n- s390/cpuinfo: show facilities as reported by stfle (bnc#1076847, LTC#163740).\n- s390/qeth: fix IPA command submission race (bnc#1012382).\n- s390/qeth: fix SETIP command handling (bnc#1012382).\n- sctp: fix dst refcnt leak in sctp_v4_get_dst (bnc#1012382).\n- sctp: fix dst refcnt leak in sctp_v6_get_dst() (bnc#1012382).\n- sctp: verify size of a new chunk in _sctp_make_chunk() (bnc#1012382).\n- storvsc: do not schedule work elements during host reset (bsc#1070536, bsc#1057734).\n- storvsc_drv: use embedded work structure for host rescan (bsc#1070536, bsc#1057734).\n- storvsc_drv: use separate workqueue for rescan (bsc#1070536, bsc#1057734).\n- swap: divide-by-zero when zero length swap file on ssd (bsc#1082153).\n- tpm: st33zp24: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).\n- tpm_i2c_infineon: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).\n- tpm_i2c_nuvoton: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).\n- udplite: fix partial checksum initialization (bnc#1012382).\n- watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).\n- x86/apic/vector: Handle legacy irq data correctly (bnc#1012382).\n- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).\n- x86/kaiser: Duplicate cpu_tss for an entry trampoline usage (bsc#1077560 bsc#1083836).\n- x86/kaiser: Remove a user mapping of cpu_tss structure (bsc#1077560 bsc#1083836).\n- x86/kaiser: Use a per-CPU trampoline stack for kernel entry (bsc#1077560).\n- x86/kaiser: enforce trampoline stack alignment (bsc#1087260).\n- x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklist (bsc#1087845).\n- xen-blkfront: fix mq start/stop race (bsc#1085042).\n- xen-netback: use skb to determine number of required guest Rx requests (bsc#1046610).\n","id":"SUSE-SU-2018:1173-2","modified":"2018-10-18T12:44:34Z","published":"2018-10-18T12:44:34Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20181173-2/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1012382"},{"type":"REPORT","url":"https://bugzilla.suse.com/1031717"},{"type":"REPORT","url":"https://bugzilla.suse.com/1046610"},{"type":"REPORT","url":"https://bugzilla.suse.com/1057734"},{"type":"REPORT","url":"https://bugzilla.suse.com/1070536"},{"type":"REPORT","url":"https://bugzilla.suse.com/1075428"},{"type":"REPORT","url":"https://bugzilla.suse.com/1076847"},{"type":"REPORT","url":"https://bugzilla.suse.com/1077560"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082153"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082299"},{"type":"REPORT","url":"https://bugzilla.suse.com/1083125"},{"type":"REPORT","url":"https://bugzilla.suse.com/1083745"},{"type":"REPORT","url":"https://bugzilla.suse.com/1083836"},{"type":"REPORT","url":"https://bugzilla.suse.com/1084353"},{"type":"REPORT","url":"https://bugzilla.suse.com/1084610"},{"type":"REPORT","url":"https://bugzilla.suse.com/1084721"},{"type":"REPORT","url":"https://bugzilla.suse.com/1084829"},{"type":"REPORT","url":"https://bugzilla.suse.com/1085042"},{"type":"REPORT","url":"https://bugzilla.suse.com/1085185"},{"type":"REPORT","url":"https://bugzilla.suse.com/1085224"},{"type":"REPORT","url":"https://bugzilla.suse.com/1085402"},{"type":"REPORT","url":"https://bugzilla.suse.com/1085404"},{"type":"REPORT","url":"https://bugzilla.suse.com/1086162"},{"type":"REPORT","url":"https://bugzilla.suse.com/1086194"},{"type":"REPORT","url":"https://bugzilla.suse.com/1087088"},{"type":"REPORT","url":"https://bugzilla.suse.com/1087260"},{"type":"REPORT","url":"https://bugzilla.suse.com/1087845"},{"type":"REPORT","url":"https://bugzilla.suse.com/1088241"},{"type":"REPORT","url":"https://bugzilla.suse.com/1088242"},{"type":"REPORT","url":"https://bugzilla.suse.com/1088600"},{"type":"REPORT","url":"https://bugzilla.suse.com/1088684"},{"type":"REPORT","url":"https://bugzilla.suse.com/1089198"},{"type":"REPORT","url":"https://bugzilla.suse.com/1089608"},{"type":"REPORT","url":"https://bugzilla.suse.com/1089644"},{"type":"REPORT","url":"https://bugzilla.suse.com/1089752"},{"type":"REPORT","url":"https://bugzilla.suse.com/1090643"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-18257"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-10087"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-10124"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-1087"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-7740"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-8043"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-8781"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-8822"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-8897"}],"related":["CVE-2017-18257","CVE-2018-10087","CVE-2018-10124","CVE-2018-1087","CVE-2018-7740","CVE-2018-8043","CVE-2018-8781","CVE-2018-8822","CVE-2018-8897"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2017-18257","CVE-2018-10087","CVE-2018-10124","CVE-2018-1087","CVE-2018-7740","CVE-2018-8043","CVE-2018-8781","CVE-2018-8822","CVE-2018-8897"]}