Bugzilla – Bug 1076017
VUL-0: CVE-2018-1000004: kernel-source: ALSA: sequencer use-after-free / deadlock
Last modified: 2020-06-09 07:34:59 UTC
The URL of the preliminary fix: https://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git/commit/?id=b3defb791b26ea0683a93a4f49c77ec45ec96f10
Takashi, I had a look at our maintained kernel sources and the code in e.g. SLE-12 for seq_clientmgr.c looks very different from the current upstream kernel code. Can you help us determining which kernel versions are affected by this? Thank you.
(In reply to Matthias Gerstner from comment #4) > Takashi, I had a look at our maintained kernel sources and the code in e.g. > SLE-12 for seq_clientmgr.c looks very different from the current upstream > kernel code. > > Can you help us determining which kernel versions are affected by this? Basically all kernels are affected. The fix for older kernels would be simple: just put the new mutex_lock(&client->ioctl_lock) / unlock() around snd_seq_do_ioctl() call in snd_seq_ioctl() in seq_clientmgr.c.
Created attachment 756121 [details] The fix for older kernels For kernels < 4.9, this patch should be applicable. I'll send it to Greg once when my tree gets merged to Linus; the pull-request is planned in tomorrow or on Wednesday.
was posted by reporter to oss-sec PRODUCT243272 linux kernel VERSION243272 Most versions.some deadlock ,some uaf.2.6241243I tested 2.6 versions, 3.10 versions, and 4.12 PROBLEMTYPE: deadlock or uaf REFERENCES243272https://github.com/torvalds/linux/commit/b3defb791b26ea0683a93a4f49c77ec45ec96f10 DESCRIPTION243272 This vulnerability, which belong to UAF caused by race conditions, can impact the majority of linux distribution(audio system). In file seq_clientmgr.c, function snd_seq_write and snd_seq_ioctl_set_client_pool can cause conditional competition problems when multi-thread is used. snd_seq_write calls snd_seq_cell_alloc to allocate memories for cell from client->pool. When pool is exhausted, schedule is called to switch current thread to another thread, and add current thread to a queue for waiting. snd_seq_ioctl_set_client_pool calls snd_seq_pool_mark_closing to set client->pool->closeing to 1, in order to prevent re-entrant. It also calls snd_seq_queue_client_leave_cells to release cell. And it then calls snd_seq_pool_done, first to release pool and allocate new pool and second to set client->pool->closeing to 0. Function wake_up is both called in snd_seq_queue_client_leave_cells and snd_seq_pool_done, to wake up the thread in the waiting queue mentioned above, avoiding the use of any wild pointer. All is seemed to be well designed , but there is a trick: -- Thread A -- step 1: A calls snd_seq_write to exhaust pool. step 2: snd_seq_write calls func schedule to schedule threads, now go to Thread B. -- Thread B -- step 1: B calls snd_seq_ioctl_set_client_pool. step 2: snd_seq_ioctl_set_client_pool calls snd_seq_pool_mark_closing. snd_seq_pool_mark_closing sets client->pool->closeing to 1. step 3: Then snd_seq_ioctl_set_client_pool calls snd_seq_queue_client_leave_cells. snd_seq_queue_client_leave_cells release the memories of cells. snd_seq_queue_client_leave_cells calls wake_up, now back to Thread A. -- Back To Thread A -- step 1: A will find out that client->pool->closeing is 1, so snd_seq_cell_alloc fails. step 2: Returning from snd_seq_cell_alloc to snd_seq_write. snd_seq_write also fails. step 3: A now call snd_seq_ioctl_set_client_pool. step 4: snd_seq_ioctl_set_client_pool calls snd_seq_pool_mark_closing. snd_seq_pool_mark_closing sets client->pool->closeing to 1 again. step 5: Then snd_seq_ioctl_set_client_pool calls snd_seq_queue_client_leave_cells. cell is already release by B. And because no thread is in waiting queue, so wake_up will not be called. step 6: Then snd_seq_ioctl_set_client_pool calls snd_seq_pool_done. snd_seq_pool_done release pool and allocate new pool. snd_seq_pool_done sets client->pool->closeing to 0. Now it's become reentrant. step 8: So after a call to snd_seq_ioctl_set_client_pool, pool is new. Thread A can call snd_seq_write many times to exhaust the memories of pool. Then A go to sleep, now switch to thread B. -- Back To Thread B -- step 1: Back to snd_seq_queue_client_leave_cells, after previous call to wake_up. step 2: Return to snd_seq_ioctl_set_client_pool. snd_seq_ioctl_set_client_pool call snd_seq_pool_done. snd_seq_pool_done release and allocate new pool. now client->pool->closeing is already 0, and pool is new. -------------------------------------------------------------------- Now you see, the pool allocated by thread A is now released by thread B. And thread B allocate new pool, which is the 3rd pool. But in thread A, in snd_seq_cell_alloc called by snd_seq_write, the pool is actually the 2cd pool, and meet a dead loop: while (pool->free == NULL && ! nonblock && ! pool->closing) Note the 2cd pool is released by thread B in B's snd_seq_ioctl_set_client_pool. Further more, if serveral threads switch between sechedule and wake_up, there will be more obvious sequelae. ---------------------------------------------------- call stack: thread a: -> snd_seq_write -> snd_seq_client_enqueue_event -> snd_seq_event_dup -> snd_seq_cell_alloc -> schedule -> thread b thread b: -> snd_seq_ioctl_set_client_pool -> snd_seq_pool_mark_closing (set closeing to 1) -> snd_seq_queue_client_leave_cells (release cell) -> wake_up -> thread a thread a: -> snd_seq_ioctl_set_client_pool -> snd_seq_pool_mark_closing (set closeing to 1 again) -> snd_seq_queue_client_leave_cells (already release cell by thread b) -> snd_seq_pool_done (release pool and allocate new pool, 2cd pool; set closeing to 0) -> snd_seq_write -> snd_seq_client_enqueue_event -> snd_seq_event_dup -> snd_seq_cell_alloc -> schedule -> thread b thread b: back to snd_seq_queue_client_leave_cells, after func wake_up -> snd_seq_queue_client_leave_cells -> snd_seq_pool_done (release pool and allocate new pool, 3rd pool; set closeing to 0) (leave 2cd pool's cell unhandled) -> wake_up -> thread a: thread a: -> snd_seq_cell_alloc: while (pool->free == NULL && ! nonblock && ! pool->closing) meet dead loop, now pool in thread a is the 2cd pool, has been released, now is a wild pointer. ---EOF---
Created attachment 756261 [details] competition.c QA REPRODUCER: gcc -o competition competition.c -pthread -O2 ./competition not sure what should happen, not much happens here
(In reply to Marcus Meissner from comment #8) > not sure what should happen, not much happens here In most cases, the processes become unkillable.
No CVE assigned?
(In reply to meissner@suse.com from comment #8) > QA REPRODUCER: > > gcc -o competition competition.c -pthread -O2 > > ./competition > > not sure what should happen, not much happens here Since this is a race condition it will probably only show with good parallelization i.e. multiple processors involved. I was able to reproduce on SLES12-SP3 in a qemu VM started with `-smp 2`. The reproducer program will become "defunct", can't be killed any more and consumes a little CPU. Rebooting becomes difficult since the process can't be ended by systemd and a long timeout ensues.
Ok, I also saw it going defunct and unkillable. I asked for CVE assignment, should come today/tomorrow.
CVE-2018-1000004
The fix was backported to SLE12-SP2, SLE12-SP3, SLE15, stable, cve/linux-3.12, cve/linux-3.0, cve/linux-2.6.32 and cve/linux-2.6.16 branches. Reassigned back to security team.
SUSE-SU-2018:0383-1: An update that solves 9 vulnerabilities and has 68 fixes is now available. Category: security (important) Bug References: 1005778,1005780,1005781,1012382,1012917,1015342,1015343,1019784,1022476,1022595,1022912,1024296,1024376,1031395,1031492,1031717,1037838,1038078,1038085,1040182,1043652,1048325,1048585,1053472,1060279,1062129,1066163,1066223,1068032,1068038,1068569,1068984,1069138,1069160,1070052,1070799,1072163,1072484,1073229,1073928,1074134,1074488,1074621,1074709,1074839,1074847,1075066,1075078,1075087,1075091,1075397,1075428,1075617,1075621,1075627,1075811,1075994,1076017,1076110,1076187,1076232,1076805,1076847,1076872,1076899,1077068,1077560,1077592,1077704,1077871,1078002,1078681,963844,966170,966172,973818,985025 CVE References: CVE-2017-15129,CVE-2017-17712,CVE-2017-17862,CVE-2017-17864,CVE-2017-18017,CVE-2017-5715,CVE-2018-1000004,CVE-2018-5332,CVE-2018-5333 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP3 (src): kernel-default-4.4.114-94.11.3 SUSE Linux Enterprise Software Development Kit 12-SP3 (src): kernel-docs-4.4.114-94.11.4, kernel-obs-build-4.4.114-94.11.3 SUSE Linux Enterprise Server 12-SP3 (src): kernel-default-4.4.114-94.11.3, kernel-source-4.4.114-94.11.2, kernel-syms-4.4.114-94.11.2 SUSE Linux Enterprise Live Patching 12-SP3 (src): kgraft-patch-SLE12-SP3_Update_8-1-4.3.5 SUSE Linux Enterprise High Availability 12-SP3 (src): kernel-default-4.4.114-94.11.3 SUSE Linux Enterprise Desktop 12-SP3 (src): kernel-default-4.4.114-94.11.3, kernel-source-4.4.114-94.11.2, kernel-syms-4.4.114-94.11.2 SUSE CaaS Platform ALL (src): kernel-default-4.4.114-94.11.3
openSUSE-SU-2018:0408-1: An update that solves 9 vulnerabilities and has 70 fixes is now available. Category: security (important) Bug References: 1012382,1015342,1015343,1019784,1022595,1022912,1024296,1024376,1031492,1031717,1037838,1038078,1038085,1040182,1043652,1048325,1048585,1053472,1060279,1062129,1066163,1066223,1068032,1068038,1068569,1068984,1069138,1069160,1070052,1070799,1072163,1072484,1073229,1073230,1073928,1074134,1074488,1074621,1074709,1074839,1074847,1075066,1075078,1075087,1075091,1075397,1075428,1075617,1075621,1075627,1075811,1075994,1076017,1076110,1076187,1076232,1076805,1076847,1076872,1076899,1077068,1077513,1077560,1077592,1077704,1077779,1077871,1078002,1078681,1078787,1079038,1079195,963844,966170,966172,969476,969477,973818,985025 CVE References: CVE-2017-15129,CVE-2017-17712,CVE-2017-17862,CVE-2017-17864,CVE-2017-18017,CVE-2017-5715,CVE-2018-1000004,CVE-2018-5332,CVE-2018-5333 Sources used: openSUSE Leap 42.3 (src): kernel-debug-4.4.114-42.1, kernel-default-4.4.114-42.1, kernel-docs-4.4.114-42.1, kernel-obs-build-4.4.114-42.1, kernel-obs-qa-4.4.114-42.1, kernel-source-4.4.114-42.1, kernel-syms-4.4.114-42.1, kernel-vanilla-4.4.114-42.1
SUSE-SU-2018:0416-1: An update that solves 9 vulnerabilities and has 44 fixes is now available. Category: security (important) Bug References: 1012382,1012917,1019784,1022476,1031717,1038078,1038085,1043652,1048585,1052360,1060279,1066223,1066842,1068032,1068038,1068569,1068984,1069160,1070799,1072163,1072484,1072589,1073229,1073928,1074134,1074392,1074488,1074621,1074709,1074839,1074847,1075066,1075078,1075087,1075091,1075428,1075617,1075621,1075627,1075994,1076017,1076110,1076806,1076809,1076872,1076899,1077068,1077560,1077592,1078526,1078681,963844,988524 CVE References: CVE-2017-15129,CVE-2017-17712,CVE-2017-17862,CVE-2017-17864,CVE-2017-18017,CVE-2017-5715,CVE-2018-1000004,CVE-2018-5332,CVE-2018-5333 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP2 (src): kernel-default-4.4.114-92.64.1 SUSE Linux Enterprise Software Development Kit 12-SP2 (src): kernel-docs-4.4.114-92.64.2, kernel-obs-build-4.4.114-92.64.1 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src): kernel-default-4.4.114-92.64.1, kernel-source-4.4.114-92.64.1, kernel-syms-4.4.114-92.64.1 SUSE Linux Enterprise Server 12-SP2 (src): kernel-default-4.4.114-92.64.1, kernel-source-4.4.114-92.64.1, kernel-syms-4.4.114-92.64.1 SUSE Linux Enterprise Live Patching 12 (src): kgraft-patch-SLE12-SP2_Update_18-1-3.3.2 SUSE Linux Enterprise High Availability 12-SP2 (src): kernel-default-4.4.114-92.64.1 SUSE Linux Enterprise Desktop 12-SP2 (src): kernel-default-4.4.114-92.64.1, kernel-source-4.4.114-92.64.1, kernel-syms-4.4.114-92.64.1 OpenStack Cloud Magnum Orchestration 7 (src): kernel-default-4.4.114-92.64.1
SUSE-SU-2018:0437-1: An update that solves 8 vulnerabilities and has 13 fixes is now available. Category: security (important) Bug References: 1012382,1047626,1068032,1070623,1073311,1073792,1073874,1075091,1075908,1075994,1076017,1076110,1076154,1076278,1077355,1077560,1077922,893777,893949,902893,951638 CVE References: CVE-2015-1142857,CVE-2017-13215,CVE-2017-17741,CVE-2017-17805,CVE-2017-17806,CVE-2017-18079,CVE-2017-5715,CVE-2018-1000004 Sources used: SUSE Linux Enterprise Server 12-LTSS (src): kernel-default-3.12.61-52.119.1, kernel-source-3.12.61-52.119.1, kernel-syms-3.12.61-52.119.1, kernel-xen-3.12.61-52.119.1, kgraft-patch-SLE12_Update_31-1-1.7.1 SUSE Linux Enterprise Module for Public Cloud 12 (src): kernel-ec2-3.12.61-52.119.1
SUSE-SU-2018:0482-1: An update that solves 9 vulnerabilities and has 44 fixes is now available. Category: security (important) Bug References: 1012382,1019784,1031717,1036737,1038078,1038085,1043652,1048585,1052360,1060279,1066223,1066842,1068032,1068038,1068569,1068984,1069160,1070799,1072163,1072484,1072589,1073229,1073230,1073928,1074134,1074488,1074621,1074709,1074839,1074847,1075066,1075078,1075087,1075091,1075428,1075617,1075621,1075627,1075994,1076017,1076110,1076806,1076809,1076872,1076899,1077068,1077560,1077592,1077871,1078526,1078681,963844,988524 CVE References: CVE-2017-15129,CVE-2017-17712,CVE-2017-17862,CVE-2017-17864,CVE-2017-18017,CVE-2017-5715,CVE-2018-1000004,CVE-2018-5332,CVE-2018-5333 Sources used: SUSE Linux Enterprise Real Time Extension 12-SP2 (src): kernel-rt-4.4.114-27.1, kernel-rt_debug-4.4.114-27.1, kernel-source-rt-4.4.114-27.1, kernel-syms-rt-4.4.114-27.1
SUSE-SU-2018:0525-1: An update that solves 8 vulnerabilities and has 19 fixes is now available. Category: security (important) Bug References: 1012382,1047118,1047626,1068032,1070623,1073246,1073311,1073792,1073874,1074709,1075091,1075411,1075908,1075994,1076017,1076110,1076154,1076278,1077182,1077355,1077560,1077922,1081317,893777,893949,902893,951638 CVE References: CVE-2015-1142857,CVE-2017-13215,CVE-2017-17741,CVE-2017-17805,CVE-2017-17806,CVE-2017-18079,CVE-2017-5715,CVE-2018-1000004 Sources used: SUSE OpenStack Cloud 6 (src): kernel-default-3.12.74-60.64.82.1, kernel-source-3.12.74-60.64.82.1, kernel-syms-3.12.74-60.64.82.1, kernel-xen-3.12.74-60.64.82.1, kgraft-patch-SLE12-SP1_Update_25-1-2.9.1 SUSE Linux Enterprise Server for SAP 12-SP1 (src): kernel-default-3.12.74-60.64.82.1, kernel-source-3.12.74-60.64.82.1, kernel-syms-3.12.74-60.64.82.1, kernel-xen-3.12.74-60.64.82.1, kgraft-patch-SLE12-SP1_Update_25-1-2.9.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): kernel-default-3.12.74-60.64.82.1, kernel-source-3.12.74-60.64.82.1, kernel-syms-3.12.74-60.64.82.1, kernel-xen-3.12.74-60.64.82.1, kgraft-patch-SLE12-SP1_Update_25-1-2.9.1 SUSE Linux Enterprise Module for Public Cloud 12 (src): kernel-ec2-3.12.74-60.64.82.1
SUSE-SU-2018:0555-1: An update that solves 9 vulnerabilities and has 40 fixes is now available. Category: security (important) Bug References: 1012382,1045538,1048585,1050431,1054305,1059174,1060279,1060682,1063544,1064861,1068032,1068984,1069508,1070623,1070781,1073311,1074488,1074621,1074880,1075088,1075091,1075410,1075617,1075621,1075908,1075994,1076017,1076154,1076278,1076437,1076849,1077191,1077355,1077406,1077487,1077560,1077922,1078875,1079917,1080133,1080359,1080363,1080372,1080579,1080685,1080774,1081500,936530,962257 CVE References: CVE-2015-1142857,CVE-2017-13215,CVE-2017-17741,CVE-2017-18017,CVE-2017-18079,CVE-2017-5715,CVE-2018-1000004,CVE-2018-5332,CVE-2018-5333 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): kernel-docs-3.0.101-108.35.1 SUSE Linux Enterprise Server 11-SP4 (src): kernel-bigmem-3.0.101-108.35.1, kernel-default-3.0.101-108.35.1, kernel-ec2-3.0.101-108.35.1, kernel-pae-3.0.101-108.35.1, kernel-ppc64-3.0.101-108.35.1, kernel-source-3.0.101-108.35.1, kernel-syms-3.0.101-108.35.1, kernel-trace-3.0.101-108.35.1, kernel-xen-3.0.101-108.35.1 SUSE Linux Enterprise Server 11-EXTRA (src): kernel-default-3.0.101-108.35.1, kernel-pae-3.0.101-108.35.1, kernel-ppc64-3.0.101-108.35.1, kernel-trace-3.0.101-108.35.1, kernel-xen-3.0.101-108.35.1 SUSE Linux Enterprise Real Time Extension 11-SP4 (src): cluster-network-1.4-2.32.4.6, drbd-kmp-8.4.4-0.27.4.6, gfs2-2-0.24.4.6, ocfs2-1.6-0.28.5.6 SUSE Linux Enterprise High Availability Extension 11-SP4 (src): cluster-network-1.4-2.32.4.6, drbd-8.4.4-0.27.4.2, drbd-kmp-8.4.4-0.27.4.6, gfs2-2-0.24.4.6, ocfs2-1.6-0.28.5.6 SUSE Linux Enterprise Debuginfo 11-SP4 (src): drbd-8.4.4-0.27.4.2, kernel-bigmem-3.0.101-108.35.1, kernel-default-3.0.101-108.35.1, kernel-ec2-3.0.101-108.35.1, kernel-pae-3.0.101-108.35.1, kernel-ppc64-3.0.101-108.35.1, kernel-trace-3.0.101-108.35.1, kernel-xen-3.0.101-108.35.1
SUSE-SU-2018:0660-1: An update that solves 8 vulnerabilities and has 14 fixes is now available. Category: security (important) Bug References: 1012382,1054305,1060279,1068032,1068984,1070781,1073311,1074488,1074621,1075091,1075410,1075617,1075621,1075908,1075994,1076017,1076154,1076278,1076849,1077406,1077560,1077922 CVE References: CVE-2017-13215,CVE-2017-17741,CVE-2017-18017,CVE-2017-18079,CVE-2017-5715,CVE-2018-1000004,CVE-2018-5332,CVE-2018-5333 Sources used: SUSE Linux Enterprise Server 11-SP3-LTSS (src): kernel-bigsmp-3.0.101-0.47.106.19.1, kernel-default-3.0.101-0.47.106.19.1, kernel-ec2-3.0.101-0.47.106.19.1, kernel-pae-3.0.101-0.47.106.19.1, kernel-source-3.0.101-0.47.106.19.1, kernel-syms-3.0.101-0.47.106.19.1, kernel-trace-3.0.101-0.47.106.19.1, kernel-xen-3.0.101-0.47.106.19.1 SUSE Linux Enterprise Server 11-EXTRA (src): kernel-bigsmp-3.0.101-0.47.106.19.1, kernel-default-3.0.101-0.47.106.19.1, kernel-pae-3.0.101-0.47.106.19.1, kernel-ppc64-3.0.101-0.47.106.19.1, kernel-trace-3.0.101-0.47.106.19.1, kernel-xen-3.0.101-0.47.106.19.1 SUSE Linux Enterprise Point of Sale 11-SP3 (src): kernel-default-3.0.101-0.47.106.19.1, kernel-ec2-3.0.101-0.47.106.19.1, kernel-pae-3.0.101-0.47.106.19.1, kernel-source-3.0.101-0.47.106.19.1, kernel-syms-3.0.101-0.47.106.19.1, kernel-trace-3.0.101-0.47.106.19.1, kernel-xen-3.0.101-0.47.106.19.1 SUSE Linux Enterprise Debuginfo 11-SP3 (src): kernel-bigsmp-3.0.101-0.47.106.19.1, kernel-default-3.0.101-0.47.106.19.1, kernel-ec2-3.0.101-0.47.106.19.1, kernel-pae-3.0.101-0.47.106.19.1, kernel-trace-3.0.101-0.47.106.19.1, kernel-xen-3.0.101-0.47.106.19.1
SUSE-SU-2018:0841-1: An update that solves 9 vulnerabilities and has 41 fixes is now available. Category: security (important) Bug References: 1012382,1045538,1048585,1049128,1050431,1054305,1059174,1060279,1060682,1063544,1064861,1068032,1068984,1069508,1070623,1070781,1073311,1074488,1074621,1074880,1075088,1075091,1075410,1075617,1075621,1075908,1075994,1076017,1076154,1076278,1076437,1076849,1077191,1077355,1077406,1077487,1077560,1077922,1078875,1079917,1080133,1080359,1080363,1080372,1080579,1080685,1080774,1081500,936530,962257 CVE References: CVE-2015-1142857,CVE-2017-13215,CVE-2017-17741,CVE-2017-18017,CVE-2017-18079,CVE-2017-5715,CVE-2018-1000004,CVE-2018-5332,CVE-2018-5333 Sources used: SUSE Linux Enterprise Real Time Extension 11-SP4 (src): kernel-rt-3.0.101.rt130-69.21.1, kernel-rt_trace-3.0.101.rt130-69.21.1, kernel-source-rt-3.0.101.rt130-69.21.1, kernel-syms-rt-3.0.101.rt130-69.21.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): kernel-rt-3.0.101.rt130-69.21.1, kernel-rt_debug-3.0.101.rt130-69.21.1, kernel-rt_trace-3.0.101.rt130-69.21.1
SUSE-SU-2018:0986-1: An update that solves 19 vulnerabilities and has 166 fixes is now available. Category: security (important) Bug References: 1006867,1012382,1015342,1015343,1019784,1020645,1022595,1022607,1022912,1024296,1024376,1027054,1031492,1031717,1033587,1034503,1037838,1038078,1038085,1040182,1042286,1043441,1043652,1043725,1043726,1048325,1048585,1053472,1060279,1062129,1065600,1065615,1066163,1066223,1067118,1068032,1068038,1068569,1068984,1069135,1069138,1069160,1070052,1070404,1070799,1071306,1071892,1072163,1072363,1072484,1072689,1072739,1072865,1073229,1073401,1073407,1073928,1074134,1074198,1074426,1074488,1074621,1074839,1074847,1075066,1075078,1075087,1075091,1075397,1075428,1075617,1075621,1075627,1075811,1075994,1076017,1076110,1076187,1076232,1076282,1076693,1076760,1076805,1076847,1076872,1076899,1076982,1077068,1077241,1077285,1077513,1077560,1077592,1077704,1077779,1077871,1078002,1078583,1078672,1078673,1078681,1078787,1079029,1079038,1079195,1079313,1079384,1079609,1079886,1079989,1080014,1080263,1080321,1080344,1080364,1080384,1080464,1080533,1080656,1080774,1080813,1080851,1081134,1081431,1081436,1081437,1081491,1081498,1081500,1081512,1081514,1081681,1081735,1082089,1082223,1082299,1082373,1082478,1082632,1082795,1082864,1082897,1082979,1082993,1083048,1083056,1083086,1083223,1083387,1083409,1083494,1083548,1083750,1083770,1084041,1084397,1084427,1084610,1084772,1084888,1084926,1084928,1084967,1085011,1085015,1085045,1085047,1085050,1085053,1085054,1085056,1085107,1085224,1085239,863764,963844,966170,966172,966328,969476,969477,973818,975772,983145,985025 CVE References: CVE-2017-13166,CVE-2017-15129,CVE-2017-15951,CVE-2017-16644,CVE-2017-16912,CVE-2017-16913,CVE-2017-17712,CVE-2017-17862,CVE-2017-17864,CVE-2017-17975,CVE-2017-18017,CVE-2017-18174,CVE-2017-18208,CVE-2017-5715,CVE-2018-1000004,CVE-2018-1000026,CVE-2018-5332,CVE-2018-5333,CVE-2018-8087 Sources used: SUSE Linux Enterprise Real Time Extension 12-SP3 (src): kernel-rt-4.4.120-3.8.1, kernel-rt_debug-4.4.120-3.8.1, kernel-source-rt-4.4.120-3.8.1, kernel-syms-rt-4.4.120-3.8.1
SUSE-SU-2018:0988-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server for SAP 12-SP1 (src): kgraft-patch-SLE12-SP1_Update_24-2-2.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): kgraft-patch-SLE12-SP1_Update_24-2-2.1
SUSE-SU-2018:0989-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1073230,1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server for SAP 12-SP2 (src): kgraft-patch-SLE12-SP2_Update_14-5-2.2 SUSE Linux Enterprise Server 12-SP2-LTSS (src): kgraft-patch-SLE12-SP2_Update_14-5-2.2
SUSE-SU-2018:0992-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server for SAP 12-SP1 (src): kgraft-patch-SLE12-SP1_Update_18-7-2.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): kgraft-patch-SLE12-SP1_Update_18-7-2.1
SUSE-SU-2018:0993-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1073230,1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server for SAP 12-SP2 (src): kgraft-patch-SLE12-SP2_Update_12-8-2.2 SUSE Linux Enterprise Server 12-SP2-LTSS (src): kgraft-patch-SLE12-SP2_Update_12-8-2.2
SUSE-SU-2018:0994-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server 12-LTSS (src): kgraft-patch-SLE12_Update_30-3-2.1
SUSE-SU-2018:0995-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server 12-LTSS (src): kgraft-patch-SLE12_Update_28-4-2.1
SUSE-SU-2018:0996-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server 12-LTSS (src): kgraft-patch-SLE12_Update_24-7-2.1
SUSE-SU-2018:0997-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1073230,1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Live Patching 12-SP3 (src): kgraft-patch-SLE12-SP3_Update_2-6-2.1
SUSE-SU-2018:0999-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server 12-LTSS (src): kgraft-patch-SLE12_Update_22-9-2.1
SUSE-SU-2018:1000-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server 12-LTSS (src): kgraft-patch-SLE12_Update_26-7-2.1
SUSE-SU-2018:1001-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server 12-LTSS (src): kgraft-patch-SLE12_Update_27-6-2.1
SUSE-SU-2018:1004-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1073230,1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server for SAP 12-SP2 (src): kgraft-patch-SLE12-SP2_Update_16-4-2.2 SUSE Linux Enterprise Server 12-SP2-LTSS (src): kgraft-patch-SLE12-SP2_Update_16-4-2.2
SUSE-SU-2018:1005-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server for SAP 12-SP1 (src): kgraft-patch-SLE12-SP1_Update_20-7-2.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): kgraft-patch-SLE12-SP1_Update_20-7-2.1
SUSE-SU-2018:1006-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server 12-LTSS (src): kgraft-patch-SLE12_Update_23-8-2.1
SUSE-SU-2018:1007-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1073230,1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server for SAP 12-SP2 (src): kgraft-patch-SLE12-SP2_Update_13-7-2.2 SUSE Linux Enterprise Server 12-SP2-LTSS (src): kgraft-patch-SLE12-SP2_Update_13-7-2.2
SUSE-SU-2018:1008-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server for SAP 12-SP1 (src): kgraft-patch-SLE12-SP1_Update_16-9-2.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): kgraft-patch-SLE12-SP1_Update_16-9-2.1
SUSE-SU-2018:1009-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server 12-LTSS (src): kgraft-patch-SLE12_Update_25-7-2.1
SUSE-SU-2018:1010-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server 12-LTSS (src): kgraft-patch-SLE12_Update_21-9-2.1
SUSE-SU-2018:1011-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1073230,1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server for SAP 12-SP2 (src): kgraft-patch-SLE12-SP2_Update_15-5-2.2 SUSE Linux Enterprise Server 12-SP2-LTSS (src): kgraft-patch-SLE12-SP2_Update_15-5-2.2
SUSE-SU-2018:1012-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1073230,1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server for SAP 12-SP2 (src): kgraft-patch-SLE12-SP2_Update_7-10-2.2 SUSE Linux Enterprise Server 12-SP2-LTSS (src): kgraft-patch-SLE12-SP2_Update_7-10-2.2
SUSE-SU-2018:1013-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1073230,1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Live Patching 12-SP3 (src): kgraft-patch-SLE12-SP3_Update_4-5-2.1
SUSE-SU-2018:1014-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server for SAP 12-SP1 (src): kgraft-patch-SLE12-SP1_Update_21-6-2.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): kgraft-patch-SLE12-SP1_Update_21-6-2.1
SUSE-SU-2018:1015-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server for SAP 12-SP1 (src): kgraft-patch-SLE12-SP1_Update_17-8-2.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): kgraft-patch-SLE12-SP1_Update_17-8-2.1
SUSE-SU-2018:1018-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server for SAP 12-SP1 (src): kgraft-patch-SLE12-SP1_Update_23-3-2.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): kgraft-patch-SLE12-SP1_Update_23-3-2.1
SUSE-SU-2018:1019-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1073230,1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server for SAP 12-SP2 (src): kgraft-patch-SLE12-SP2_Update_8-10-2.2 SUSE Linux Enterprise Server 12-SP2-LTSS (src): kgraft-patch-SLE12-SP2_Update_8-10-2.2
SUSE-SU-2018:1020-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1073230,1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Live Patching 12-SP3 (src): kgraft-patch-SLE12-SP3_Update_3-6-2.1
SUSE-SU-2018:1021-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1073230,1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server for SAP 12-SP2 (src): kgraft-patch-SLE12-SP2_Update_9-9-2.2 SUSE Linux Enterprise Server 12-SP2-LTSS (src): kgraft-patch-SLE12-SP2_Update_9-9-2.2
SUSE-SU-2018:1022-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1073230,1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Live Patching 12-SP3 (src): kgraft-patch-SLE12-SP3_Update_7-4-2.1
SUSE-SU-2018:1023-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1073230,1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server for SAP 12-SP2 (src): kgraft-patch-SLE12-SP2_Update_11-8-2.2 SUSE Linux Enterprise Server 12-SP2-LTSS (src): kgraft-patch-SLE12-SP2_Update_11-8-2.2
SUSE-SU-2018:1024-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1073230,1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Live Patching 12-SP3 (src): kgraft-patch-SLE12-SP3_Update_1-7-2.1
SUSE-SU-2018:1025-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server for SAP 12-SP1 (src): kgraft-patch-SLE12-SP1_Update_15-9-2.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): kgraft-patch-SLE12-SP1_Update_15-9-2.1
SUSE-SU-2018:1027-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1073230,1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Live Patching 12-SP3 (src): kgraft-patch-SLE12-SP3_Update_6-4-2.1
SUSE-SU-2018:1028-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1073230,1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Live Patching 12-SP3 (src): kgraft-patch-SLE12-SP3_Update_5-4-2.1
SUSE-SU-2018:1029-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server 12-LTSS (src): kgraft-patch-SLE12_Update_29-4-2.1
SUSE-SU-2018:1031-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1073230,1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server for SAP 12-SP2 (src): kgraft-patch-SLE12-SP2_Update_17-4-2.2 SUSE Linux Enterprise Server 12-SP2-LTSS (src): kgraft-patch-SLE12-SP2_Update_17-4-2.2
SUSE-SU-2018:1032-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server for SAP 12-SP1 (src): kgraft-patch-SLE12-SP1_Update_19-7-2.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): kgraft-patch-SLE12-SP1_Update_19-7-2.1
SUSE-SU-2018:1033-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1073230,1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server for SAP 12-SP2 (src): kgraft-patch-SLE12-SP2_Update_10-9-2.2 SUSE Linux Enterprise Server 12-SP2-LTSS (src): kgraft-patch-SLE12-SP2_Update_10-9-2.2
SUSE-SU-2018:1034-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1076017,1083488,1085114,1085447 CVE References: CVE-2017-13166,CVE-2018-1000004,CVE-2018-1068,CVE-2018-7566 Sources used: SUSE Linux Enterprise Server for SAP 12-SP1 (src): kgraft-patch-SLE12-SP1_Update_22-4-2.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): kgraft-patch-SLE12-SP1_Update_22-4-2.1
released