Bugzilla – Bug 1087088
VUL-0: CVE-2018-8897: POP SS
Last modified: 2019-12-20 07:41:20 UTC
Probable CRD: 2018-05-08
openSUSE-SU-2018:0972-1: An update that solves three vulnerabilities and has 52 fixes is now available. Category: security (important) Bug References: 1012382,1019695,1019699,1022604,1031717,1046610,1060799,1064206,1068032,1073059,1073069,1075428,1076033,1077560,1081358,1083574,1083745,1083836,1084223,1084310,1084328,1084353,1084452,1084610,1084829,1084889,1084898,1084914,1084918,1084967,1085042,1085058,1085224,1085383,1085402,1085404,1085487,1085507,1085981,1086015,1086194,1086357,1086499,1086518,1086607,1087088,1087211,1087231,1087260,1087659,1087845,1087906,1087999,1088087,1088324 CVE References: CVE-2018-1091,CVE-2018-7740,CVE-2018-8043 Sources used: openSUSE Leap 42.3 (src): kernel-debug-4.4.126-48.2, kernel-default-4.4.126-48.2, kernel-docs-4.4.126-48.1, kernel-obs-build-4.4.126-48.2, kernel-obs-qa-4.4.126-48.1, kernel-source-4.4.126-48.1, kernel-syms-4.4.126-48.1, kernel-vanilla-4.4.126-48.2
SUSE-SU-2018:1048-1: An update that solves 5 vulnerabilities and has 62 fixes is now available. Category: security (important) Bug References: 1012382,1019695,1019699,1022604,1031717,1046610,1060799,1064206,1068032,1073059,1073069,1075428,1076033,1077560,1083574,1083745,1083836,1084223,1084310,1084328,1084353,1084452,1084610,1084699,1084829,1084889,1084898,1084914,1084918,1084967,1085042,1085058,1085224,1085383,1085402,1085404,1085487,1085507,1085511,1085679,1085981,1086015,1086162,1086194,1086357,1086499,1086518,1086607,1087088,1087211,1087231,1087260,1087274,1087659,1087845,1087906,1087999,1088050,1088087,1088241,1088267,1088313,1088324,1088600,1088684,1088871,802154 CVE References: CVE-2017-18257,CVE-2018-1091,CVE-2018-7740,CVE-2018-8043,CVE-2018-8822 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP3 (src): kernel-default-4.4.126-94.22.1 SUSE Linux Enterprise Software Development Kit 12-SP3 (src): kernel-docs-4.4.126-94.22.1, kernel-obs-build-4.4.126-94.22.1 SUSE Linux Enterprise Server 12-SP3 (src): kernel-default-4.4.126-94.22.1, kernel-source-4.4.126-94.22.2, kernel-syms-4.4.126-94.22.1 SUSE Linux Enterprise Live Patching 12-SP3 (src): kgraft-patch-SLE12-SP3_Update_11-1-4.5.1 SUSE Linux Enterprise High Availability 12-SP3 (src): kernel-default-4.4.126-94.22.1 SUSE Linux Enterprise Desktop 12-SP3 (src): kernel-default-4.4.126-94.22.1, kernel-source-4.4.126-94.22.2, kernel-syms-4.4.126-94.22.1 SUSE CaaS Platform ALL (src): kernel-default-4.4.126-94.22.1
Hello, Red Hat has been made aware of a cross-platform memory corruption vulnerability involving the way in which Linux kernel handles exceptions under certain conditions like, exceptions raised after mov/pop ss instructions. An unprivileged system user could use this flaw to crash the Linux kernel resulting in DoS issue. (CVE-2018-8897) And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (CVE-2018-1087) Upstream patches: -> https://git.kernel.org/linus/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9 -> https://git.kernel.org/linus/32d43cd391bacb5f0814c2624399a5dad3501d09 Red Hat would like to thank Nick Peterson of Everdox Tech LLC for reporting this issue. This issue is embargoed till: Tue, 08 May 2018, 17:00 UTC. Thank you.
TID will be at https://www.suse.com/support/kb/doc/?id=7022916
https://www.kb.cert.org/vuls/id/631579 Vulnerability Note VU#631579 Hardware debug exception documentation may result in unexpected behavior Original Release date: 08 Mai 2018 | Last revised: 08 Mai 2018 Overview In some circumstances, some operating systems or hypervisors may not expect or properly handle an Intel architecture hardware debug exception. The error appears to be due to developer interpretation of existing documentation for certain Intel architecture interrupt/exception instructions, namely MOV to SS and POP to SS. Description CWE-703: Improper Check or Handling of Exceptional Conditions - CVE-2018-8897 The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself). Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at Current Privilege Level (CPL) < 3, a debug exception is delivered after the transfer to CPL < 3 is complete. Such deferred #DB exceptions by MOV SS and POP SS may result in unexpected behavior. Therefore, in certain circumstances after the use of certain Intel x86-64 architecture instructions, a debug exception pointing to data in a lower ring (for most operating systems, the kernel Ring 0 level) is made available to operating system components running in Ring 3. This may allow an attacker to utilize operating system APIs to gain access to sensitive memory information or control low-level operating system functions. Several operating systems appear to incorrectly handle this exception due to interpretation of potentially unclear existing documentation and guidance on the use of these instructions. Impact An authenticated attacker may be able to read sensitive data in memory or control low-level operating system functions, Solution Apply an update Check with your operating system or software vendor for updates to address this issue. There is no expected performance impact for applying an update. A list of affected vendors and currently-known updates is provided below.
SUSE-SU-2018:1171-1: An update that solves three vulnerabilities and has four fixes is now available. Category: security (important) Bug References: 1032084,1050431,1065726,1087088,1089665,1089668,1089752 CVE References: CVE-2018-10124,CVE-2018-1087,CVE-2018-8897 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): kernel-docs-3.0.101-108.41.1 SUSE Linux Enterprise Server 11-SP4 (src): kernel-bigmem-3.0.101-108.41.1, kernel-default-3.0.101-108.41.1, kernel-ec2-3.0.101-108.41.1, kernel-pae-3.0.101-108.41.1, kernel-ppc64-3.0.101-108.41.1, kernel-source-3.0.101-108.41.1, kernel-syms-3.0.101-108.41.1, kernel-trace-3.0.101-108.41.1, kernel-xen-3.0.101-108.41.1 SUSE Linux Enterprise Server 11-EXTRA (src): kernel-default-3.0.101-108.41.1, kernel-pae-3.0.101-108.41.1, kernel-ppc64-3.0.101-108.41.1, kernel-trace-3.0.101-108.41.1, kernel-xen-3.0.101-108.41.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): kernel-bigmem-3.0.101-108.41.1, kernel-default-3.0.101-108.41.1, kernel-ec2-3.0.101-108.41.1, kernel-pae-3.0.101-108.41.1, kernel-ppc64-3.0.101-108.41.1, kernel-trace-3.0.101-108.41.1, kernel-xen-3.0.101-108.41.1
SUSE-SU-2018:1172-1: An update that solves 20 vulnerabilities and has 11 fixes is now available. Category: security (important) Bug References: 1010470,1039348,1052943,1062568,1062840,1063416,1067118,1072689,1072865,1078669,1078672,1078673,1078674,1080464,1080757,1082424,1083242,1083483,1083494,1084536,1085331,1086162,1087088,1087209,1087260,1087762,1088147,1088260,1089608,1089752,940776 CVE References: CVE-2015-5156,CVE-2016-7915,CVE-2017-0861,CVE-2017-12190,CVE-2017-13166,CVE-2017-16644,CVE-2017-16911,CVE-2017-16912,CVE-2017-16913,CVE-2017-16914,CVE-2017-18203,CVE-2017-18208,CVE-2018-10087,CVE-2018-10124,CVE-2018-1087,CVE-2018-6927,CVE-2018-7566,CVE-2018-7757,CVE-2018-8822,CVE-2018-8897 Sources used: SUSE Linux Enterprise Server 11-SP3-LTSS (src): kernel-bigsmp-3.0.101-0.47.106.22.1, kernel-default-3.0.101-0.47.106.22.1, kernel-ec2-3.0.101-0.47.106.22.1, kernel-pae-3.0.101-0.47.106.22.1, kernel-source-3.0.101-0.47.106.22.1, kernel-syms-3.0.101-0.47.106.22.1, kernel-trace-3.0.101-0.47.106.22.1, kernel-xen-3.0.101-0.47.106.22.1 SUSE Linux Enterprise Server 11-EXTRA (src): kernel-bigsmp-3.0.101-0.47.106.22.1, kernel-default-3.0.101-0.47.106.22.1, kernel-pae-3.0.101-0.47.106.22.1, kernel-ppc64-3.0.101-0.47.106.22.1, kernel-trace-3.0.101-0.47.106.22.1, kernel-xen-3.0.101-0.47.106.22.1 SUSE Linux Enterprise Point of Sale 11-SP3 (src): kernel-default-3.0.101-0.47.106.22.1, kernel-ec2-3.0.101-0.47.106.22.1, kernel-pae-3.0.101-0.47.106.22.1, kernel-source-3.0.101-0.47.106.22.1, kernel-syms-3.0.101-0.47.106.22.1, kernel-trace-3.0.101-0.47.106.22.1, kernel-xen-3.0.101-0.47.106.22.1 SUSE Linux Enterprise Debuginfo 11-SP3 (src): kernel-bigsmp-3.0.101-0.47.106.22.1, kernel-default-3.0.101-0.47.106.22.1, kernel-ec2-3.0.101-0.47.106.22.1, kernel-pae-3.0.101-0.47.106.22.1, kernel-trace-3.0.101-0.47.106.22.1, kernel-xen-3.0.101-0.47.106.22.1
SUSE-SU-2018:1173-1: An update that solves 9 vulnerabilities and has 27 fixes is now available. Category: security (important) Bug References: 1012382,1031717,1046610,1057734,1070536,1075428,1076847,1077560,1082153,1082299,1083125,1083745,1083836,1084353,1084610,1084721,1084829,1085042,1085185,1085224,1085402,1085404,1086162,1086194,1087088,1087260,1087845,1088241,1088242,1088600,1088684,1089198,1089608,1089644,1089752,1090643 CVE References: CVE-2017-18257,CVE-2018-10087,CVE-2018-10124,CVE-2018-1087,CVE-2018-7740,CVE-2018-8043,CVE-2018-8781,CVE-2018-8822,CVE-2018-8897 Sources used: SUSE OpenStack Cloud 7 (src): kernel-default-4.4.121-92.73.1, kernel-source-4.4.121-92.73.1, kernel-syms-4.4.121-92.73.1, kgraft-patch-SLE12-SP2_Update_21-1-3.3.1 SUSE Linux Enterprise Server for SAP 12-SP2 (src): kernel-default-4.4.121-92.73.1, kernel-source-4.4.121-92.73.1, kernel-syms-4.4.121-92.73.1, kgraft-patch-SLE12-SP2_Update_21-1-3.3.1 SUSE Linux Enterprise Server 12-SP2-LTSS (src): kernel-default-4.4.121-92.73.1, kernel-source-4.4.121-92.73.1, kernel-syms-4.4.121-92.73.1, kgraft-patch-SLE12-SP2_Update_21-1-3.3.1 SUSE Enterprise Storage 4 (src): kernel-default-4.4.121-92.73.1, kernel-source-4.4.121-92.73.1, kernel-syms-4.4.121-92.73.1, kgraft-patch-SLE12-SP2_Update_21-1-3.3.1 OpenStack Cloud Magnum Orchestration 7 (src): kernel-default-4.4.121-92.73.1
An update workflow for this issue was started. This issue was rated as important. Please submit fixed packages until 2018-05-16. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/64030
SUSE-SU-2018:1217-1: An update that solves 7 vulnerabilities and has 93 fixes is now available. Category: security (important) Bug References: 1005778,1005780,1005781,1012382,1015336,1015337,1015340,1015342,1015343,1019695,1019699,1022604,1022743,1024296,1031717,1046610,1060799,1064206,1068032,1073059,1073069,1075091,1075428,1075994,1076033,1077560,1083125,1083574,1083745,1083836,1084223,1084310,1084328,1084353,1084452,1084610,1084699,1084721,1084829,1084889,1084898,1084914,1084918,1084967,1085042,1085058,1085185,1085224,1085383,1085402,1085404,1085487,1085507,1085511,1085679,1085958,1085981,1086015,1086162,1086194,1086357,1086499,1086518,1086607,1087088,1087211,1087231,1087260,1087274,1087659,1087845,1087906,1087999,1088050,1088087,1088242,1088267,1088313,1088324,1088600,1088684,1088865,1088871,1089198,1089608,1089644,1089752,1089925,802154,810912,812592,813453,880131,966170,966172,966186,966191,969476,969477,981348 CVE References: CVE-2017-18257,CVE-2018-10087,CVE-2018-10124,CVE-2018-1091,CVE-2018-7740,CVE-2018-8043,CVE-2018-8822 Sources used: SUSE Linux Enterprise Real Time Extension 12-SP3 (src): kernel-rt-4.4.128-3.11.1, kernel-rt_debug-4.4.128-3.11.1, kernel-source-rt-4.4.128-3.11.1, kernel-syms-rt-4.4.128-3.11.1
SUSE-SU-2018:1220-1: An update that solves 11 vulnerabilities and has 7 fixes is now available. Category: security (important) Bug References: 1076537,1082299,1083125,1083242,1083275,1084536,1085279,1085331,1086162,1086194,1087088,1087260,1088147,1088260,1088261,1089608,1089752,1090643 CVE References: CVE-2017-0861,CVE-2017-11089,CVE-2017-13220,CVE-2017-18203,CVE-2018-10087,CVE-2018-10124,CVE-2018-1087,CVE-2018-7757,CVE-2018-8781,CVE-2018-8822,CVE-2018-8897 Sources used: SUSE OpenStack Cloud 6 (src): kernel-default-3.12.74-60.64.88.1, kernel-source-3.12.74-60.64.88.1, kernel-syms-3.12.74-60.64.88.1, kernel-xen-3.12.74-60.64.88.1, kgraft-patch-SLE12-SP1_Update_27-1-2.3.1 SUSE Linux Enterprise Server for SAP 12-SP1 (src): kernel-default-3.12.74-60.64.88.1, kernel-source-3.12.74-60.64.88.1, kernel-syms-3.12.74-60.64.88.1, kernel-xen-3.12.74-60.64.88.1, kgraft-patch-SLE12-SP1_Update_27-1-2.3.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): kernel-default-3.12.74-60.64.88.1, kernel-source-3.12.74-60.64.88.1, kernel-syms-3.12.74-60.64.88.1, kernel-xen-3.12.74-60.64.88.1, kgraft-patch-SLE12-SP1_Update_27-1-2.3.1 SUSE Linux Enterprise Module for Public Cloud 12 (src): kernel-ec2-3.12.74-60.64.88.1
SUSE-SU-2018:1221-1: An update that solves 11 vulnerabilities and has 5 fixes is now available. Category: security (important) Bug References: 1076537,1082299,1083125,1083242,1084536,1085331,1086162,1087088,1087209,1087260,1088147,1088260,1088261,1089608,1089752,1090643 CVE References: CVE-2017-0861,CVE-2017-11089,CVE-2017-13220,CVE-2017-18203,CVE-2018-10087,CVE-2018-10124,CVE-2018-1087,CVE-2018-7757,CVE-2018-8781,CVE-2018-8822,CVE-2018-8897 Sources used: SUSE Linux Enterprise Server 12-LTSS (src): kernel-default-3.12.61-52.128.1, kernel-source-3.12.61-52.128.1, kernel-syms-3.12.61-52.128.1, kernel-xen-3.12.61-52.128.1, kgraft-patch-SLE12_Update_34-1-1.3.1 SUSE Linux Enterprise Module for Public Cloud 12 (src): kernel-ec2-3.12.61-52.128.1
(note that 12-SP3 and openSUSE Leap 42.e were fixed with the 4.4.126 stable release.)
SUSE-SU-2018:1821-1: An update that solves one vulnerability and has 91 fixes is now available. Category: security (important) Bug References: 1046610,1052351,1068054,1079152,1080837,1083347,1087086,1087088,1088997,1088998,1088999,1089000,1089001,1089002,1089003,1089004,1089005,1089006,1089007,1089008,1089010,1089011,1089012,1089013,1089016,1089192,1089199,1089200,1089201,1089202,1089203,1089204,1089205,1089206,1089207,1089208,1089209,1089210,1089211,1089212,1089213,1089214,1089215,1089216,1089217,1089218,1089219,1089220,1089221,1089222,1089223,1089224,1089225,1089226,1089227,1089228,1089229,1089230,1089231,1089232,1089233,1089234,1089235,1089236,1089237,1089238,1089239,1089240,1089241,1093194,1093195,1093196,1093197,1093198,1094244,1094421,1094422,1094423,1094424,1094425,1094436,1094437,1095241,1096140,1096242,1096281,1096746,1097443,1097445,1097948,973378,989401 CVE References: CVE-2018-3665 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): kernel-docs-3.0.101-108.57.1 SUSE Linux Enterprise Server 11-SP4 (src): kernel-bigmem-3.0.101-108.57.1, kernel-default-3.0.101-108.57.1, kernel-ec2-3.0.101-108.57.1, kernel-pae-3.0.101-108.57.1, kernel-ppc64-3.0.101-108.57.1, kernel-source-3.0.101-108.57.1, kernel-syms-3.0.101-108.57.1, kernel-trace-3.0.101-108.57.1, kernel-xen-3.0.101-108.57.1 SUSE Linux Enterprise Server 11-EXTRA (src): kernel-default-3.0.101-108.57.1, kernel-pae-3.0.101-108.57.1, kernel-ppc64-3.0.101-108.57.1, kernel-trace-3.0.101-108.57.1, kernel-xen-3.0.101-108.57.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): kernel-bigmem-3.0.101-108.57.1, kernel-default-3.0.101-108.57.1, kernel-ec2-3.0.101-108.57.1, kernel-pae-3.0.101-108.57.1, kernel-ppc64-3.0.101-108.57.1, kernel-trace-3.0.101-108.57.1, kernel-xen-3.0.101-108.57.1
SUSE-SU-2018:1846-1: An update that solves four vulnerabilities and has 116 fixes is now available. Category: security (important) Bug References: 1013018,1046610,1052351,1052943,1065726,1068032,1068054,1070404,1072689,1075087,1075088,1079152,1080157,1080837,1083347,1084760,1087082,1087086,1087088,1087092,1088343,1088997,1088998,1088999,1089000,1089001,1089002,1089003,1089004,1089005,1089006,1089007,1089008,1089010,1089011,1089012,1089013,1089016,1089192,1089199,1089200,1089201,1089202,1089203,1089204,1089205,1089206,1089207,1089208,1089209,1089210,1089211,1089212,1089213,1089214,1089215,1089216,1089217,1089218,1089219,1089220,1089221,1089222,1089223,1089224,1089225,1089226,1089227,1089228,1089229,1089230,1089231,1089232,1089233,1089234,1089235,1089236,1089237,1089238,1089239,1089240,1089241,1089386,1089895,1090607,1090630,1090888,1091041,1091659,1091671,1091755,1091815,1092372,1092497,1093194,1093195,1093196,1093197,1093198,1093600,1093710,1094019,1094244,1094421,1094422,1094423,1094424,1094425,1094436,1094437,1096140,1096242,1096281,1096746,1097443,1097445,1097948,919382,973378,989401 CVE References: CVE-2018-1000199,CVE-2018-10675,CVE-2018-3639,CVE-2018-3665 Sources used: SUSE Linux Enterprise Real Time Extension 11-SP4 (src): kernel-rt-3.0.101.rt130-69.27.1, kernel-rt_trace-3.0.101.rt130-69.27.1, kernel-source-rt-3.0.101.rt130-69.27.1, kernel-syms-rt-3.0.101.rt130-69.27.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): kernel-rt-3.0.101.rt130-69.27.1, kernel-rt_debug-3.0.101.rt130-69.27.1, kernel-rt_trace-3.0.101.rt130-69.27.1
SUSE-SU-2018:1849-1: An update that solves one vulnerability and has 8 fixes is now available. Category: security (important) Bug References: 1065600,1068032,1075091,1075994,1087086,1087088,1096140,1096242,1096281 CVE References: CVE-2018-3665 Sources used: SUSE Linux Enterprise Server 11-SP3-LTSS (src): kernel-bigsmp-3.0.101-0.47.106.35.1, kernel-default-3.0.101-0.47.106.35.1, kernel-ec2-3.0.101-0.47.106.35.1, kernel-pae-3.0.101-0.47.106.35.1, kernel-source-3.0.101-0.47.106.35.1, kernel-syms-3.0.101-0.47.106.35.1, kernel-trace-3.0.101-0.47.106.35.1, kernel-xen-3.0.101-0.47.106.35.1 SUSE Linux Enterprise Server 11-EXTRA (src): kernel-bigsmp-3.0.101-0.47.106.35.1, kernel-default-3.0.101-0.47.106.35.1, kernel-pae-3.0.101-0.47.106.35.1, kernel-ppc64-3.0.101-0.47.106.35.1, kernel-trace-3.0.101-0.47.106.35.1, kernel-xen-3.0.101-0.47.106.35.1 SUSE Linux Enterprise Point of Sale 11-SP3 (src): kernel-default-3.0.101-0.47.106.35.1, kernel-ec2-3.0.101-0.47.106.35.1, kernel-pae-3.0.101-0.47.106.35.1, kernel-source-3.0.101-0.47.106.35.1, kernel-syms-3.0.101-0.47.106.35.1, kernel-trace-3.0.101-0.47.106.35.1, kernel-xen-3.0.101-0.47.106.35.1 SUSE Linux Enterprise Debuginfo 11-SP3 (src): kernel-bigsmp-3.0.101-0.47.106.35.1, kernel-default-3.0.101-0.47.106.35.1, kernel-ec2-3.0.101-0.47.106.35.1, kernel-pae-3.0.101-0.47.106.35.1, kernel-trace-3.0.101-0.47.106.35.1, kernel-xen-3.0.101-0.47.106.35.1
openSUSE-SU-2018:2119-1: An update that solves 23 vulnerabilities and has 283 fixes is now available. Category: security (important) Bug References: 1022476,1046303,1046305,1046306,1046307,1046540,1046542,1046543,1048129,1050242,1050252,1050529,1050536,1050538,1050545,1050549,1050662,1051510,1052766,1055117,1055186,1055968,1056427,1056643,1056651,1056653,1056657,1056658,1056662,1056686,1056787,1058115,1058513,1058659,1058717,1059336,1060463,1061024,1061840,1062897,1064802,1065600,1065729,1066110,1066129,1068032,1068054,1068546,1071218,1071995,1072829,1072856,1073513,1073765,1073960,1074562,1074578,1074701,1074741,1074873,1074919,1074984,1075006,1075007,1075262,1075419,1075748,1075876,1076049,1076115,1076372,1076830,1077338,1078248,1078353,1079152,1079747,1080039,1080157,1080542,1081599,1082485,1082504,1082869,1082962,1083647,1083684,1083900,1084001,1084570,1084721,1085308,1085341,1085400,1085539,1085626,1085933,1085936,1085937,1085938,1085939,1085941,1086224,1086282,1086283,1086286,1086288,1086319,1086323,1086400,1086467,1086652,1086739,1087084,1087088,1087092,1087205,1087210,1087213,1087214,1087284,1087405,1087458,1087939,1087978,1088273,1088354,1088374,1088690,1088704,1088713,1088722,1088796,1088804,1088821,1088866,1088872,1089074,1089086,1089115,1089141,1089198,1089268,1089271,1089467,1089608,1089644,1089663,1089664,1089667,1089669,1089752,1089753,1089762,1089878,1089889,1089977,1090098,1090150,1090457,1090522,1090534,1090535,1090605,1090643,1090646,1090658,1090717,1090734,1090818,1090888,1090953,1091101,1091158,1091171,1091264,1091424,1091532,1091543,1091594,1091666,1091678,1091686,1091781,1091782,1091815,1091860,1091960,1092100,1092289,1092472,1092566,1092710,1092772,1092888,1092904,1092975,1093023,1093027,1093035,1093118,1093148,1093158,1093184,1093205,1093273,1093290,1093604,1093641,1093649,1093653,1093655,1093657,1093663,1093721,1093728,1093904,1093990,1094244,1094356,1094420,1094541,1094575,1094751,1094825,1094840,1094978,1095042,1095094,1095104,1095115,1095155,1095265,1095321,1095337,1095467,1095573,1095735,1095893,1096065,1096480,1096529,1096696,1096705,1096728,1096753,1096790,1096793,1097034,1097105,1097234,1097356,1097373,1097439,1097465,1097468,1097470,1097471,1097472,1097551,1097780,1097796,1097800,1097941,1097961,1098016,1098043,1098050,1098174,1098176,1098236,1098401,1098425,1098435,1098599,1098626,1098706,1098983,1098995,1099029,1099041,1099109,1099142,1099183,1099715,1099792,1099918,1099924,1099966,1100132,1100209,1100340,1100362,1100382,1100416,1100418,1100491,1100602,1100633,1100734,1100843,1101296,1101315,1101324,971975,975772 CVE References: CVE-2017-5715,CVE-2017-5753,CVE-2018-1000200,CVE-2018-1000204,CVE-2018-10087,CVE-2018-10124,CVE-2018-10323,CVE-2018-1092,CVE-2018-1093,CVE-2018-1094,CVE-2018-1108,CVE-2018-1118,CVE-2018-1120,CVE-2018-1130,CVE-2018-12233,CVE-2018-13053,CVE-2018-13405,CVE-2018-13406,CVE-2018-5803,CVE-2018-5848,CVE-2018-7492,CVE-2018-8781,CVE-2018-9385 Sources used: openSUSE Leap 15.0 (src): kernel-debug-4.12.14-lp150.12.7.1, kernel-default-4.12.14-lp150.12.7.1, kernel-docs-4.12.14-lp150.12.7.1, kernel-kvmsmall-4.12.14-lp150.12.7.1, kernel-obs-build-4.12.14-lp150.12.7.1, kernel-obs-qa-4.12.14-lp150.12.7.1, kernel-source-4.12.14-lp150.12.7.1, kernel-syms-4.12.14-lp150.12.7.1, kernel-vanilla-4.12.14-lp150.12.7.1
SUSE-SU-2018:1173-2: An update that solves 9 vulnerabilities and has 27 fixes is now available. Category: security (important) Bug References: 1012382,1031717,1046610,1057734,1070536,1075428,1076847,1077560,1082153,1082299,1083125,1083745,1083836,1084353,1084610,1084721,1084829,1085042,1085185,1085224,1085402,1085404,1086162,1086194,1087088,1087260,1087845,1088241,1088242,1088600,1088684,1089198,1089608,1089644,1089752,1090643 CVE References: CVE-2017-18257,CVE-2018-10087,CVE-2018-10124,CVE-2018-1087,CVE-2018-7740,CVE-2018-8043,CVE-2018-8781,CVE-2018-8822,CVE-2018-8897 Sources used: SUSE Linux Enterprise Server 12-SP2-BCL (src): kernel-default-4.4.121-92.73.1, kernel-source-4.4.121-92.73.1, kernel-syms-4.4.121-92.73.1, kgraft-patch-SLE12-SP2_Update_21-1-3.3.1