Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP1:Update
patchinfo.7777
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.7777
<patchinfo incident="7777"> <issue id="1087007" tracker="bnc">VUL-1: CVE-2018-1094: kernel-source: NULL pointer dereference in ext4/xattr.c:ext4_xattr_inode_hash() causes crash with crafted ext4 image</issue> <issue id="1087012" tracker="bnc">VUL-0: CVE-2018-1092: kernel: NULL pointer dereference in ext4/mballoc.c:ext4_process_freed_data() when mounting crafted ext4 image</issue> <issue id="1087095" tracker="bnc">VUL-1: CVE-2018-1093: kernel-source: Out of bounds read in ext4/balloc.c:ext4_valid_block_bitmap() causes crash with crafted ext4 image</issue> <issue id="1046610" tracker="bnc">L3: frequent misfunction of virtual NICs on XEN domUs</issue> <issue id="1079152" tracker="bnc">L3: kernel BUG at ../mm/slab.c:3114!</issue> <issue id="1082962" tracker="bnc">VUL-0: CVE-2018-7492: kernel: Null pointer dereference in _rds_rdma_map() allows local attackers to cause denial-of-service</issue> <issue id="1083900" tracker="bnc">VUL-0: CVE-2018-5803: kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service</issue> <issue id="1087082" tracker="bnc">VUL-0: CVE-2018-3639: V4 - Speculative Store Bypass aka "Memory Disambiguation"</issue> <issue id="1087086" tracker="bnc">VUL-0: CVE-2018-3665: Lazy FP Save/Restore</issue> <issue id="1092552" tracker="bnc">Backport request of ip6_dst_mtu_forward and related to SLES 12</issue> <issue id="1092813" tracker="bnc">kaiser_set_shadow_pgd undefined symbol</issue> <issue id="1092904" tracker="bnc">VUL-1: CVE-2018-1130: kernel-source: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash</issue> <issue id="1094033" tracker="bnc">L3-Question: failed to apply kgraft patch</issue> <issue id="1094353" tracker="bnc">VUL-0: CVE-2017-13305: kernel-source: Buffer over-read in keyring subsystem allows exposing potentially sensitive information to local attacker</issue> <issue id="1094823" tracker="bnc">iotop stops working with the latest kernel</issue> <issue id="1096140" tracker="bnc">nospectre_v2 doesn't disable repoline on SLE-12-SP3 4.4.132-94.33</issue> <issue id="1096242" tracker="bnc">Slow down with latest kernel updates - AMD side</issue> <issue id="1096281" tracker="bnc">Slow down with latest kernel updates - Intel side</issue> <issue id="1096480" tracker="bnc">VUL-1: CVE-2018-5814: kernel: Linux Kernel USB over IP Multiple Denial of Service Vulnerabilities</issue> <issue id="1096728" tracker="bnc">VUL-0: CVE-2018-1000204: kernel-source: Linux Kernel infoleak caused by incorrect handling of the SG_IO ioctl</issue> <issue id="1097356" tracker="bnc">VUL-0: CVE-2018-5848: kernel-source: function wmi_set_ie() in net/wireless/ath/wil6210/wmi.c is affected by a buffer overflow</issue> <issue id="2018-3665" tracker="cve" /> <issue id="2018-5848" tracker="cve" /> <issue id="2018-1000204" tracker="cve" /> <issue id="2017-13305" tracker="cve" /> <issue id="2018-1094" tracker="cve" /> <issue id="2018-1093" tracker="cve" /> <issue id="2018-1092" tracker="cve" /> <issue id="2018-1130" tracker="cve" /> <issue id="2018-5803" tracker="cve" /> <issue id="2018-7492" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>alnovak</packager> <reboot_needed/> <description> The SUSE Linux Enterprise 12 GA LTSS kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX registers) between processes. These registers might contain encryption keys when doing SSE accelerated AES enc/decryption (bsc#1087086) - CVE-2018-5848: In the function wmi_set_ie(), the length validation code did not handle unsigned integer overflow properly. As a result, a large value of the 'ie_len' argument could have caused a buffer overflow (bnc#1097356) - CVE-2018-1000204: Prevent infoleak caused by incorrect handling of the SG_IO ioctl (bsc#1096728) - CVE-2017-13305: Prevent information disclosure vulnerability in encrypted-keys (bsc#1094353) - CVE-2018-1094: The ext4_fill_super function did not always initialize the crc32c checksum driver, which allowed attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image (bsc#1087007) - CVE-2018-1093: The ext4_valid_block_bitmap function allowed attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers (bsc#1087095) - CVE-2018-1092: The ext4_iget function mishandled the case of a root directory with a zero i_links_count, which allowed attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image (bsc#1087012) - CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that allowed a local user to cause a denial of service by a number of certain crafted system calls (bsc#1092904) - CVE-2018-5803: Prevent error in the "_sctp_make_chunk()" function when handling SCTP packets length that could have been exploited to cause a kernel crash (bnc#1083900) - CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c __rds_rdma_map() function that allowed local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bsc#1082962) The following non-security bugs were fixed: - Fix excessive newline in /proc/*/status (bsc#1094823). - KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281). - ipv6: add mtu lock check in __ip6_rt_update_pmtu (bsc#1092552). - kABI: work around BPF SSBD removal (bsc#1087082). - kgraft/bnx2fc: Do not block kGraft in bnx2fc_l2_rcv kthread (bsc#1094033). - mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152). - usbip: usbip_host: fix NULL-ptr deref and use-after-free errors (bsc#1096480). - usbip: usbip_host: fix bad unlock balance during stub_probe() (bsc#1096480). - x86/boot: Fix early command-line parsing when matching at end (bsc#1096281). - x86/boot: Fix early command-line parsing when partial word matches (bsc#1096281). - x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140). - x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1092813) - xen-netfront: fix req_prod check to avoid RX hang when index wraps (bsc#1046610). </description> <summary>Security update for the Linux Kernel</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor