Bug 1087088 - (CVE-2018-8897) VUL-0: CVE-2018-8897: POP SS
(CVE-2018-8897)
VUL-0: CVE-2018-8897: POP SS
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Security Team bot
Security Team bot
CVSSv3:SUSE:CVE-2018-3694:5.5:(AV:L/A...
:
Depends on:
Blocks: 1087078
  Show dependency treegraph
 
Reported: 2018-03-27 13:28 UTC by Marcus Meissner
Modified: 2019-12-20 07:41 UTC (History)
12 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 5 Marcus Meissner 2018-04-16 19:01:43 UTC
Probable
CRD: 2018-05-08
Comment 7 Swamp Workflow Management 2018-04-17 16:16:04 UTC
openSUSE-SU-2018:0972-1: An update that solves three vulnerabilities and has 52 fixes is now available.

Category: security (important)
Bug References: 1012382,1019695,1019699,1022604,1031717,1046610,1060799,1064206,1068032,1073059,1073069,1075428,1076033,1077560,1081358,1083574,1083745,1083836,1084223,1084310,1084328,1084353,1084452,1084610,1084829,1084889,1084898,1084914,1084918,1084967,1085042,1085058,1085224,1085383,1085402,1085404,1085487,1085507,1085981,1086015,1086194,1086357,1086499,1086518,1086607,1087088,1087211,1087231,1087260,1087659,1087845,1087906,1087999,1088087,1088324
CVE References: CVE-2018-1091,CVE-2018-7740,CVE-2018-8043
Sources used:
openSUSE Leap 42.3 (src):    kernel-debug-4.4.126-48.2, kernel-default-4.4.126-48.2, kernel-docs-4.4.126-48.1, kernel-obs-build-4.4.126-48.2, kernel-obs-qa-4.4.126-48.1, kernel-source-4.4.126-48.1, kernel-syms-4.4.126-48.1, kernel-vanilla-4.4.126-48.2
Comment 11 Swamp Workflow Management 2018-04-23 19:16:16 UTC
SUSE-SU-2018:1048-1: An update that solves 5 vulnerabilities and has 62 fixes is now available.

Category: security (important)
Bug References: 1012382,1019695,1019699,1022604,1031717,1046610,1060799,1064206,1068032,1073059,1073069,1075428,1076033,1077560,1083574,1083745,1083836,1084223,1084310,1084328,1084353,1084452,1084610,1084699,1084829,1084889,1084898,1084914,1084918,1084967,1085042,1085058,1085224,1085383,1085402,1085404,1085487,1085507,1085511,1085679,1085981,1086015,1086162,1086194,1086357,1086499,1086518,1086607,1087088,1087211,1087231,1087260,1087274,1087659,1087845,1087906,1087999,1088050,1088087,1088241,1088267,1088313,1088324,1088600,1088684,1088871,802154
CVE References: CVE-2017-18257,CVE-2018-1091,CVE-2018-7740,CVE-2018-8043,CVE-2018-8822
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP3 (src):    kernel-default-4.4.126-94.22.1
SUSE Linux Enterprise Software Development Kit 12-SP3 (src):    kernel-docs-4.4.126-94.22.1, kernel-obs-build-4.4.126-94.22.1
SUSE Linux Enterprise Server 12-SP3 (src):    kernel-default-4.4.126-94.22.1, kernel-source-4.4.126-94.22.2, kernel-syms-4.4.126-94.22.1
SUSE Linux Enterprise Live Patching 12-SP3 (src):    kgraft-patch-SLE12-SP3_Update_11-1-4.5.1
SUSE Linux Enterprise High Availability 12-SP3 (src):    kernel-default-4.4.126-94.22.1
SUSE Linux Enterprise Desktop 12-SP3 (src):    kernel-default-4.4.126-94.22.1, kernel-source-4.4.126-94.22.2, kernel-syms-4.4.126-94.22.1
SUSE CaaS Platform ALL (src):    kernel-default-4.4.126-94.22.1
Comment 13 Marcus Meissner 2018-04-24 13:23:42 UTC
   Hello,

Red Hat has been made aware of a cross-platform memory corruption 
vulnerability involving the way in which Linux kernel handles exceptions under 
certain conditions like, exceptions raised after mov/pop ss instructions.

An unprivileged system user could use this flaw to crash the Linux kernel 
resulting in DoS issue. (CVE-2018-8897)

And an unprivileged KVM guest user could use this flaw to potentially escalate 
their privileges inside a guest. (CVE-2018-1087)

Upstream patches:
   -> https://git.kernel.org/linus/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9
   -> https://git.kernel.org/linus/32d43cd391bacb5f0814c2624399a5dad3501d09

Red Hat would like to thank Nick Peterson of Everdox Tech LLC for reporting 
this issue.

This issue is embargoed till: Tue, 08 May 2018, 17:00 UTC.

Thank you.
Comment 26 Marcus Meissner 2018-05-07 05:49:58 UTC
TID will be at
https://www.suse.com/support/kb/doc/?id=7022916
Comment 28 Marcus Meissner 2018-05-08 17:33:34 UTC
https://www.kb.cert.org/vuls/id/631579


Vulnerability Note VU#631579
Hardware debug exception documentation may result in unexpected behavior

Original Release date: 08 Mai 2018 | Last revised: 08 Mai 2018
Overview

In some circumstances, some operating systems or hypervisors may not expect or properly handle an Intel architecture hardware debug exception. The error appears to be due to developer interpretation of existing documentation for certain Intel architecture interrupt/exception instructions, namely MOV to SS and POP to SS.
Description

CWE-703: Improper Check or Handling of Exceptional Conditions - CVE-2018-8897

The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself). Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol 3A; section 2.3).

If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at Current Privilege Level (CPL) < 3, a debug exception is delivered after the transfer to CPL < 3 is complete. Such deferred #DB exceptions by MOV SS and POP SS may result in unexpected behavior.

Therefore, in certain circumstances after the use of certain Intel x86-64 architecture instructions, a debug exception pointing to data in a lower ring (for most operating systems, the kernel Ring 0 level) is made available to operating system components running in Ring 3. This may allow an attacker to utilize operating system APIs to gain access to sensitive memory information or control low-level operating system functions.

Several operating systems appear to incorrectly handle this exception due to interpretation of potentially unclear existing documentation and guidance on the use of these instructions.
Impact

An authenticated attacker may be able to read sensitive data in memory or control low-level operating system functions,
Solution

Apply an update

Check with your operating system or software vendor for updates to address this issue. There is no expected performance impact for applying an update. A list of affected vendors and currently-known updates is provided below.
Comment 29 Swamp Workflow Management 2018-05-08 22:08:12 UTC
SUSE-SU-2018:1171-1: An update that solves three vulnerabilities and has four fixes is now available.

Category: security (important)
Bug References: 1032084,1050431,1065726,1087088,1089665,1089668,1089752
CVE References: CVE-2018-10124,CVE-2018-1087,CVE-2018-8897
Sources used:
SUSE Linux Enterprise Software Development Kit 11-SP4 (src):    kernel-docs-3.0.101-108.41.1
SUSE Linux Enterprise Server 11-SP4 (src):    kernel-bigmem-3.0.101-108.41.1, kernel-default-3.0.101-108.41.1, kernel-ec2-3.0.101-108.41.1, kernel-pae-3.0.101-108.41.1, kernel-ppc64-3.0.101-108.41.1, kernel-source-3.0.101-108.41.1, kernel-syms-3.0.101-108.41.1, kernel-trace-3.0.101-108.41.1, kernel-xen-3.0.101-108.41.1
SUSE Linux Enterprise Server 11-EXTRA (src):    kernel-default-3.0.101-108.41.1, kernel-pae-3.0.101-108.41.1, kernel-ppc64-3.0.101-108.41.1, kernel-trace-3.0.101-108.41.1, kernel-xen-3.0.101-108.41.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    kernel-bigmem-3.0.101-108.41.1, kernel-default-3.0.101-108.41.1, kernel-ec2-3.0.101-108.41.1, kernel-pae-3.0.101-108.41.1, kernel-ppc64-3.0.101-108.41.1, kernel-trace-3.0.101-108.41.1, kernel-xen-3.0.101-108.41.1
Comment 30 Swamp Workflow Management 2018-05-08 22:13:00 UTC
SUSE-SU-2018:1172-1: An update that solves 20 vulnerabilities and has 11 fixes is now available.

Category: security (important)
Bug References: 1010470,1039348,1052943,1062568,1062840,1063416,1067118,1072689,1072865,1078669,1078672,1078673,1078674,1080464,1080757,1082424,1083242,1083483,1083494,1084536,1085331,1086162,1087088,1087209,1087260,1087762,1088147,1088260,1089608,1089752,940776
CVE References: CVE-2015-5156,CVE-2016-7915,CVE-2017-0861,CVE-2017-12190,CVE-2017-13166,CVE-2017-16644,CVE-2017-16911,CVE-2017-16912,CVE-2017-16913,CVE-2017-16914,CVE-2017-18203,CVE-2017-18208,CVE-2018-10087,CVE-2018-10124,CVE-2018-1087,CVE-2018-6927,CVE-2018-7566,CVE-2018-7757,CVE-2018-8822,CVE-2018-8897
Sources used:
SUSE Linux Enterprise Server 11-SP3-LTSS (src):    kernel-bigsmp-3.0.101-0.47.106.22.1, kernel-default-3.0.101-0.47.106.22.1, kernel-ec2-3.0.101-0.47.106.22.1, kernel-pae-3.0.101-0.47.106.22.1, kernel-source-3.0.101-0.47.106.22.1, kernel-syms-3.0.101-0.47.106.22.1, kernel-trace-3.0.101-0.47.106.22.1, kernel-xen-3.0.101-0.47.106.22.1
SUSE Linux Enterprise Server 11-EXTRA (src):    kernel-bigsmp-3.0.101-0.47.106.22.1, kernel-default-3.0.101-0.47.106.22.1, kernel-pae-3.0.101-0.47.106.22.1, kernel-ppc64-3.0.101-0.47.106.22.1, kernel-trace-3.0.101-0.47.106.22.1, kernel-xen-3.0.101-0.47.106.22.1
SUSE Linux Enterprise Point of Sale 11-SP3 (src):    kernel-default-3.0.101-0.47.106.22.1, kernel-ec2-3.0.101-0.47.106.22.1, kernel-pae-3.0.101-0.47.106.22.1, kernel-source-3.0.101-0.47.106.22.1, kernel-syms-3.0.101-0.47.106.22.1, kernel-trace-3.0.101-0.47.106.22.1, kernel-xen-3.0.101-0.47.106.22.1
SUSE Linux Enterprise Debuginfo 11-SP3 (src):    kernel-bigsmp-3.0.101-0.47.106.22.1, kernel-default-3.0.101-0.47.106.22.1, kernel-ec2-3.0.101-0.47.106.22.1, kernel-pae-3.0.101-0.47.106.22.1, kernel-trace-3.0.101-0.47.106.22.1, kernel-xen-3.0.101-0.47.106.22.1
Comment 31 Swamp Workflow Management 2018-05-08 22:19:12 UTC
SUSE-SU-2018:1173-1: An update that solves 9 vulnerabilities and has 27 fixes is now available.

Category: security (important)
Bug References: 1012382,1031717,1046610,1057734,1070536,1075428,1076847,1077560,1082153,1082299,1083125,1083745,1083836,1084353,1084610,1084721,1084829,1085042,1085185,1085224,1085402,1085404,1086162,1086194,1087088,1087260,1087845,1088241,1088242,1088600,1088684,1089198,1089608,1089644,1089752,1090643
CVE References: CVE-2017-18257,CVE-2018-10087,CVE-2018-10124,CVE-2018-1087,CVE-2018-7740,CVE-2018-8043,CVE-2018-8781,CVE-2018-8822,CVE-2018-8897
Sources used:
SUSE OpenStack Cloud 7 (src):    kernel-default-4.4.121-92.73.1, kernel-source-4.4.121-92.73.1, kernel-syms-4.4.121-92.73.1, kgraft-patch-SLE12-SP2_Update_21-1-3.3.1
SUSE Linux Enterprise Server for SAP 12-SP2 (src):    kernel-default-4.4.121-92.73.1, kernel-source-4.4.121-92.73.1, kernel-syms-4.4.121-92.73.1, kgraft-patch-SLE12-SP2_Update_21-1-3.3.1
SUSE Linux Enterprise Server 12-SP2-LTSS (src):    kernel-default-4.4.121-92.73.1, kernel-source-4.4.121-92.73.1, kernel-syms-4.4.121-92.73.1, kgraft-patch-SLE12-SP2_Update_21-1-3.3.1
SUSE Enterprise Storage 4 (src):    kernel-default-4.4.121-92.73.1, kernel-source-4.4.121-92.73.1, kernel-syms-4.4.121-92.73.1, kgraft-patch-SLE12-SP2_Update_21-1-3.3.1
OpenStack Cloud Magnum Orchestration 7 (src):    kernel-default-4.4.121-92.73.1
Comment 33 Swamp Workflow Management 2018-05-09 11:42:29 UTC
An update workflow for this issue was started.
This issue was rated as important.
Please submit fixed packages until 2018-05-16.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/64030
Comment 34 Swamp Workflow Management 2018-05-11 16:19:02 UTC
SUSE-SU-2018:1217-1: An update that solves 7 vulnerabilities and has 93 fixes is now available.

Category: security (important)
Bug References: 1005778,1005780,1005781,1012382,1015336,1015337,1015340,1015342,1015343,1019695,1019699,1022604,1022743,1024296,1031717,1046610,1060799,1064206,1068032,1073059,1073069,1075091,1075428,1075994,1076033,1077560,1083125,1083574,1083745,1083836,1084223,1084310,1084328,1084353,1084452,1084610,1084699,1084721,1084829,1084889,1084898,1084914,1084918,1084967,1085042,1085058,1085185,1085224,1085383,1085402,1085404,1085487,1085507,1085511,1085679,1085958,1085981,1086015,1086162,1086194,1086357,1086499,1086518,1086607,1087088,1087211,1087231,1087260,1087274,1087659,1087845,1087906,1087999,1088050,1088087,1088242,1088267,1088313,1088324,1088600,1088684,1088865,1088871,1089198,1089608,1089644,1089752,1089925,802154,810912,812592,813453,880131,966170,966172,966186,966191,969476,969477,981348
CVE References: CVE-2017-18257,CVE-2018-10087,CVE-2018-10124,CVE-2018-1091,CVE-2018-7740,CVE-2018-8043,CVE-2018-8822
Sources used:
SUSE Linux Enterprise Real Time Extension 12-SP3 (src):    kernel-rt-4.4.128-3.11.1, kernel-rt_debug-4.4.128-3.11.1, kernel-source-rt-4.4.128-3.11.1, kernel-syms-rt-4.4.128-3.11.1
Comment 35 Swamp Workflow Management 2018-05-11 19:09:39 UTC
SUSE-SU-2018:1220-1: An update that solves 11 vulnerabilities and has 7 fixes is now available.

Category: security (important)
Bug References: 1076537,1082299,1083125,1083242,1083275,1084536,1085279,1085331,1086162,1086194,1087088,1087260,1088147,1088260,1088261,1089608,1089752,1090643
CVE References: CVE-2017-0861,CVE-2017-11089,CVE-2017-13220,CVE-2017-18203,CVE-2018-10087,CVE-2018-10124,CVE-2018-1087,CVE-2018-7757,CVE-2018-8781,CVE-2018-8822,CVE-2018-8897
Sources used:
SUSE OpenStack Cloud 6 (src):    kernel-default-3.12.74-60.64.88.1, kernel-source-3.12.74-60.64.88.1, kernel-syms-3.12.74-60.64.88.1, kernel-xen-3.12.74-60.64.88.1, kgraft-patch-SLE12-SP1_Update_27-1-2.3.1
SUSE Linux Enterprise Server for SAP 12-SP1 (src):    kernel-default-3.12.74-60.64.88.1, kernel-source-3.12.74-60.64.88.1, kernel-syms-3.12.74-60.64.88.1, kernel-xen-3.12.74-60.64.88.1, kgraft-patch-SLE12-SP1_Update_27-1-2.3.1
SUSE Linux Enterprise Server 12-SP1-LTSS (src):    kernel-default-3.12.74-60.64.88.1, kernel-source-3.12.74-60.64.88.1, kernel-syms-3.12.74-60.64.88.1, kernel-xen-3.12.74-60.64.88.1, kgraft-patch-SLE12-SP1_Update_27-1-2.3.1
SUSE Linux Enterprise Module for Public Cloud 12 (src):    kernel-ec2-3.12.74-60.64.88.1
Comment 36 Swamp Workflow Management 2018-05-11 19:12:11 UTC
SUSE-SU-2018:1221-1: An update that solves 11 vulnerabilities and has 5 fixes is now available.

Category: security (important)
Bug References: 1076537,1082299,1083125,1083242,1084536,1085331,1086162,1087088,1087209,1087260,1088147,1088260,1088261,1089608,1089752,1090643
CVE References: CVE-2017-0861,CVE-2017-11089,CVE-2017-13220,CVE-2017-18203,CVE-2018-10087,CVE-2018-10124,CVE-2018-1087,CVE-2018-7757,CVE-2018-8781,CVE-2018-8822,CVE-2018-8897
Sources used:
SUSE Linux Enterprise Server 12-LTSS (src):    kernel-default-3.12.61-52.128.1, kernel-source-3.12.61-52.128.1, kernel-syms-3.12.61-52.128.1, kernel-xen-3.12.61-52.128.1, kgraft-patch-SLE12_Update_34-1-1.3.1
SUSE Linux Enterprise Module for Public Cloud 12 (src):    kernel-ec2-3.12.61-52.128.1
Comment 37 Marcus Meissner 2018-05-11 19:58:07 UTC
(note that 12-SP3 and openSUSE Leap 42.e were fixed with the 4.4.126 stable release.)
Comment 39 Swamp Workflow Management 2018-06-27 13:11:03 UTC
SUSE-SU-2018:1821-1: An update that solves one vulnerability and has 91 fixes is now available.

Category: security (important)
Bug References: 1046610,1052351,1068054,1079152,1080837,1083347,1087086,1087088,1088997,1088998,1088999,1089000,1089001,1089002,1089003,1089004,1089005,1089006,1089007,1089008,1089010,1089011,1089012,1089013,1089016,1089192,1089199,1089200,1089201,1089202,1089203,1089204,1089205,1089206,1089207,1089208,1089209,1089210,1089211,1089212,1089213,1089214,1089215,1089216,1089217,1089218,1089219,1089220,1089221,1089222,1089223,1089224,1089225,1089226,1089227,1089228,1089229,1089230,1089231,1089232,1089233,1089234,1089235,1089236,1089237,1089238,1089239,1089240,1089241,1093194,1093195,1093196,1093197,1093198,1094244,1094421,1094422,1094423,1094424,1094425,1094436,1094437,1095241,1096140,1096242,1096281,1096746,1097443,1097445,1097948,973378,989401
CVE References: CVE-2018-3665
Sources used:
SUSE Linux Enterprise Software Development Kit 11-SP4 (src):    kernel-docs-3.0.101-108.57.1
SUSE Linux Enterprise Server 11-SP4 (src):    kernel-bigmem-3.0.101-108.57.1, kernel-default-3.0.101-108.57.1, kernel-ec2-3.0.101-108.57.1, kernel-pae-3.0.101-108.57.1, kernel-ppc64-3.0.101-108.57.1, kernel-source-3.0.101-108.57.1, kernel-syms-3.0.101-108.57.1, kernel-trace-3.0.101-108.57.1, kernel-xen-3.0.101-108.57.1
SUSE Linux Enterprise Server 11-EXTRA (src):    kernel-default-3.0.101-108.57.1, kernel-pae-3.0.101-108.57.1, kernel-ppc64-3.0.101-108.57.1, kernel-trace-3.0.101-108.57.1, kernel-xen-3.0.101-108.57.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    kernel-bigmem-3.0.101-108.57.1, kernel-default-3.0.101-108.57.1, kernel-ec2-3.0.101-108.57.1, kernel-pae-3.0.101-108.57.1, kernel-ppc64-3.0.101-108.57.1, kernel-trace-3.0.101-108.57.1, kernel-xen-3.0.101-108.57.1
Comment 40 Swamp Workflow Management 2018-06-29 13:14:14 UTC
SUSE-SU-2018:1846-1: An update that solves four vulnerabilities and has 116 fixes is now available.

Category: security (important)
Bug References: 1013018,1046610,1052351,1052943,1065726,1068032,1068054,1070404,1072689,1075087,1075088,1079152,1080157,1080837,1083347,1084760,1087082,1087086,1087088,1087092,1088343,1088997,1088998,1088999,1089000,1089001,1089002,1089003,1089004,1089005,1089006,1089007,1089008,1089010,1089011,1089012,1089013,1089016,1089192,1089199,1089200,1089201,1089202,1089203,1089204,1089205,1089206,1089207,1089208,1089209,1089210,1089211,1089212,1089213,1089214,1089215,1089216,1089217,1089218,1089219,1089220,1089221,1089222,1089223,1089224,1089225,1089226,1089227,1089228,1089229,1089230,1089231,1089232,1089233,1089234,1089235,1089236,1089237,1089238,1089239,1089240,1089241,1089386,1089895,1090607,1090630,1090888,1091041,1091659,1091671,1091755,1091815,1092372,1092497,1093194,1093195,1093196,1093197,1093198,1093600,1093710,1094019,1094244,1094421,1094422,1094423,1094424,1094425,1094436,1094437,1096140,1096242,1096281,1096746,1097443,1097445,1097948,919382,973378,989401
CVE References: CVE-2018-1000199,CVE-2018-10675,CVE-2018-3639,CVE-2018-3665
Sources used:
SUSE Linux Enterprise Real Time Extension 11-SP4 (src):    kernel-rt-3.0.101.rt130-69.27.1, kernel-rt_trace-3.0.101.rt130-69.27.1, kernel-source-rt-3.0.101.rt130-69.27.1, kernel-syms-rt-3.0.101.rt130-69.27.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    kernel-rt-3.0.101.rt130-69.27.1, kernel-rt_debug-3.0.101.rt130-69.27.1, kernel-rt_trace-3.0.101.rt130-69.27.1
Comment 41 Swamp Workflow Management 2018-06-29 13:32:47 UTC
SUSE-SU-2018:1849-1: An update that solves one vulnerability and has 8 fixes is now available.

Category: security (important)
Bug References: 1065600,1068032,1075091,1075994,1087086,1087088,1096140,1096242,1096281
CVE References: CVE-2018-3665
Sources used:
SUSE Linux Enterprise Server 11-SP3-LTSS (src):    kernel-bigsmp-3.0.101-0.47.106.35.1, kernel-default-3.0.101-0.47.106.35.1, kernel-ec2-3.0.101-0.47.106.35.1, kernel-pae-3.0.101-0.47.106.35.1, kernel-source-3.0.101-0.47.106.35.1, kernel-syms-3.0.101-0.47.106.35.1, kernel-trace-3.0.101-0.47.106.35.1, kernel-xen-3.0.101-0.47.106.35.1
SUSE Linux Enterprise Server 11-EXTRA (src):    kernel-bigsmp-3.0.101-0.47.106.35.1, kernel-default-3.0.101-0.47.106.35.1, kernel-pae-3.0.101-0.47.106.35.1, kernel-ppc64-3.0.101-0.47.106.35.1, kernel-trace-3.0.101-0.47.106.35.1, kernel-xen-3.0.101-0.47.106.35.1
SUSE Linux Enterprise Point of Sale 11-SP3 (src):    kernel-default-3.0.101-0.47.106.35.1, kernel-ec2-3.0.101-0.47.106.35.1, kernel-pae-3.0.101-0.47.106.35.1, kernel-source-3.0.101-0.47.106.35.1, kernel-syms-3.0.101-0.47.106.35.1, kernel-trace-3.0.101-0.47.106.35.1, kernel-xen-3.0.101-0.47.106.35.1
SUSE Linux Enterprise Debuginfo 11-SP3 (src):    kernel-bigsmp-3.0.101-0.47.106.35.1, kernel-default-3.0.101-0.47.106.35.1, kernel-ec2-3.0.101-0.47.106.35.1, kernel-pae-3.0.101-0.47.106.35.1, kernel-trace-3.0.101-0.47.106.35.1, kernel-xen-3.0.101-0.47.106.35.1
Comment 46 Swamp Workflow Management 2018-07-28 13:34:48 UTC
openSUSE-SU-2018:2119-1: An update that solves 23 vulnerabilities and has 283 fixes is now available.

Category: security (important)
Bug References: 1022476,1046303,1046305,1046306,1046307,1046540,1046542,1046543,1048129,1050242,1050252,1050529,1050536,1050538,1050545,1050549,1050662,1051510,1052766,1055117,1055186,1055968,1056427,1056643,1056651,1056653,1056657,1056658,1056662,1056686,1056787,1058115,1058513,1058659,1058717,1059336,1060463,1061024,1061840,1062897,1064802,1065600,1065729,1066110,1066129,1068032,1068054,1068546,1071218,1071995,1072829,1072856,1073513,1073765,1073960,1074562,1074578,1074701,1074741,1074873,1074919,1074984,1075006,1075007,1075262,1075419,1075748,1075876,1076049,1076115,1076372,1076830,1077338,1078248,1078353,1079152,1079747,1080039,1080157,1080542,1081599,1082485,1082504,1082869,1082962,1083647,1083684,1083900,1084001,1084570,1084721,1085308,1085341,1085400,1085539,1085626,1085933,1085936,1085937,1085938,1085939,1085941,1086224,1086282,1086283,1086286,1086288,1086319,1086323,1086400,1086467,1086652,1086739,1087084,1087088,1087092,1087205,1087210,1087213,1087214,1087284,1087405,1087458,1087939,1087978,1088273,1088354,1088374,1088690,1088704,1088713,1088722,1088796,1088804,1088821,1088866,1088872,1089074,1089086,1089115,1089141,1089198,1089268,1089271,1089467,1089608,1089644,1089663,1089664,1089667,1089669,1089752,1089753,1089762,1089878,1089889,1089977,1090098,1090150,1090457,1090522,1090534,1090535,1090605,1090643,1090646,1090658,1090717,1090734,1090818,1090888,1090953,1091101,1091158,1091171,1091264,1091424,1091532,1091543,1091594,1091666,1091678,1091686,1091781,1091782,1091815,1091860,1091960,1092100,1092289,1092472,1092566,1092710,1092772,1092888,1092904,1092975,1093023,1093027,1093035,1093118,1093148,1093158,1093184,1093205,1093273,1093290,1093604,1093641,1093649,1093653,1093655,1093657,1093663,1093721,1093728,1093904,1093990,1094244,1094356,1094420,1094541,1094575,1094751,1094825,1094840,1094978,1095042,1095094,1095104,1095115,1095155,1095265,1095321,1095337,1095467,1095573,1095735,1095893,1096065,1096480,1096529,1096696,1096705,1096728,1096753,1096790,1096793,1097034,1097105,1097234,1097356,1097373,1097439,1097465,1097468,1097470,1097471,1097472,1097551,1097780,1097796,1097800,1097941,1097961,1098016,1098043,1098050,1098174,1098176,1098236,1098401,1098425,1098435,1098599,1098626,1098706,1098983,1098995,1099029,1099041,1099109,1099142,1099183,1099715,1099792,1099918,1099924,1099966,1100132,1100209,1100340,1100362,1100382,1100416,1100418,1100491,1100602,1100633,1100734,1100843,1101296,1101315,1101324,971975,975772
CVE References: CVE-2017-5715,CVE-2017-5753,CVE-2018-1000200,CVE-2018-1000204,CVE-2018-10087,CVE-2018-10124,CVE-2018-10323,CVE-2018-1092,CVE-2018-1093,CVE-2018-1094,CVE-2018-1108,CVE-2018-1118,CVE-2018-1120,CVE-2018-1130,CVE-2018-12233,CVE-2018-13053,CVE-2018-13405,CVE-2018-13406,CVE-2018-5803,CVE-2018-5848,CVE-2018-7492,CVE-2018-8781,CVE-2018-9385
Sources used:
openSUSE Leap 15.0 (src):    kernel-debug-4.12.14-lp150.12.7.1, kernel-default-4.12.14-lp150.12.7.1, kernel-docs-4.12.14-lp150.12.7.1, kernel-kvmsmall-4.12.14-lp150.12.7.1, kernel-obs-build-4.12.14-lp150.12.7.1, kernel-obs-qa-4.12.14-lp150.12.7.1, kernel-source-4.12.14-lp150.12.7.1, kernel-syms-4.12.14-lp150.12.7.1, kernel-vanilla-4.12.14-lp150.12.7.1
Comment 48 Swamp Workflow Management 2018-10-18 17:41:51 UTC
SUSE-SU-2018:1173-2: An update that solves 9 vulnerabilities and has 27 fixes is now available.

Category: security (important)
Bug References: 1012382,1031717,1046610,1057734,1070536,1075428,1076847,1077560,1082153,1082299,1083125,1083745,1083836,1084353,1084610,1084721,1084829,1085042,1085185,1085224,1085402,1085404,1086162,1086194,1087088,1087260,1087845,1088241,1088242,1088600,1088684,1089198,1089608,1089644,1089752,1090643
CVE References: CVE-2017-18257,CVE-2018-10087,CVE-2018-10124,CVE-2018-1087,CVE-2018-7740,CVE-2018-8043,CVE-2018-8781,CVE-2018-8822,CVE-2018-8897
Sources used:
SUSE Linux Enterprise Server 12-SP2-BCL (src):    kernel-default-4.4.121-92.73.1, kernel-source-4.4.121-92.73.1, kernel-syms-4.4.121-92.73.1, kgraft-patch-SLE12-SP2_Update_21-1-3.3.1