Bugzilla – Bug 1039348
VUL-0: CVE-2017-1000364: kernel-source: stack gap guard page too small: Qualys new root/setuid privilege escalation method 05-2017
Last modified: 2020-06-08 23:24:12 UTC
Created attachment 725338 [details] test program to test stack guard page behavior $ gcc -o stack_crash stack_crash.c $ ./stack_crash Stack top:0x7ffd41fc5c6c mmap:0x7ffd41ec5000 address:0x7ffd41ec6d18 aligned:0x7ffd41ec6000 mapped:[7ffd41ec5000,7ffd41ec6000] diff:3352 560aa1405000-560aa1406000 r-xp 00000000 08:07 66393 /home/miso/tmp/stack_crash 560aa1606000-560aa1607000 r--p 00001000 08:07 66393 /home/miso/tmp/stack_crash 560aa1607000-560aa1608000 rw-p 00002000 08:07 66393 /home/miso/tmp/stack_crash 560aa1608000-560aa1629000 rw-p 00000000 00:00 0 [heap] 7f33778a2000-7f3377a37000 r-xp 00000000 08:01 33003 /lib/x86_64-linux-gnu/libc-2.24.so 7f3377a37000-7f3377c36000 ---p 00195000 08:01 33003 /lib/x86_64-linux-gnu/libc-2.24.so 7f3377c36000-7f3377c3a000 r--p 00194000 08:01 33003 /lib/x86_64-linux-gnu/libc-2.24.so 7f3377c3a000-7f3377c3c000 rw-p 00198000 08:01 33003 /lib/x86_64-linux-gnu/libc-2.24.so 7f3377c3c000-7f3377c40000 rw-p 00000000 00:00 0 7f3377c40000-7f3377c63000 r-xp 00000000 08:01 32863 /lib/x86_64-linux-gnu/ld-2.24.so 7f3377d41000-7f3377e44000 rw-p 00000000 00:00 0 7f3377e60000-7f3377e63000 rw-p 00000000 00:00 0 7f3377e63000-7f3377e64000 r--p 00023000 08:01 32863 /lib/x86_64-linux-gnu/ld-2.24.so 7f3377e64000-7f3377e65000 rw-p 00024000 08:01 32863 /lib/x86_64-linux-gnu/ld-2.24.so 7f3377e65000-7f3377e66000 rw-p 00000000 00:00 0 7ffd41ec5000-7ffd41ec6000 rw-p 00000000 00:00 0 7ffd41ec7000-7ffd41fc8000 rw-p 00000000 00:00 0 [stack] 7ffd41ff2000-7ffd41ff4000 r--p 00000000 00:00 0 [vvar] 7ffd41ff4000-7ffd41ff6000 r-xp 00000000 00:00 0 [vdso] ffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0 [vsyscall] This is with the current Linus tree. We can see that there is one page space between mmap [7ffd41ec5000-7ffd41ec6000] and the stack [7ffd41ec7000-7ffd41fc8000] The faulting address was 1kB close to the mmap. With the patch applied I am getting: $ ./stack_crash Stack top:0x7ffcbda7005c mmap:0x7ffcbd970000 address:0x7ffcbda6dfe8 aligned:0x7ffcbda6d000 mapped:[7ffcbd970000,7ffcbd971000] diff:1036264 55e39926c000-55e39926d000 r-xp 00000000 03:01 16392 /root/stack_crash 55e39946d000-55e39946e000 r--p 00001000 03:01 16392 /root/stack_crash 55e39946e000-55e39946f000 rw-p 00002000 03:01 16392 /root/stack_crash 7fc6e1809000-7fc6e198a000 r-xp 00000000 03:01 67273 /lib/x86_64-linux-gnu/libc-2.13.so 7fc6e198a000-7fc6e1b8a000 ---p 00181000 03:01 67273 /lib/x86_64-linux-gnu/libc-2.13.so 7fc6e1b8a000-7fc6e1b8e000 r--p 00181000 03:01 67273 /lib/x86_64-linux-gnu/libc-2.13.so 7fc6e1b8e000-7fc6e1b8f000 rw-p 00185000 03:01 67273 /lib/x86_64-linux-gnu/libc-2.13.so 7fc6e1b8f000-7fc6e1b94000 rw-p 00000000 00:00 0 7fc6e1b94000-7fc6e1bb4000 r-xp 00000000 03:01 67285 /lib/x86_64-linux-gnu/ld-2.13.so 7fc6e1ca8000-7fc6e1dac000 rw-p 00000000 00:00 0 7fc6e1db0000-7fc6e1db3000 rw-p 00000000 00:00 0 7fc6e1db3000-7fc6e1db4000 r--p 0001f000 03:01 67285 /lib/x86_64-linux-gnu/ld-2.13.so 7fc6e1db4000-7fc6e1db5000 rw-p 00020000 03:01 67285 /lib/x86_64-linux-gnu/ld-2.13.so 7fc6e1db5000-7fc6e1db6000 rw-p 00000000 00:00 0 7ffcbd851000-7ffcbd970000 rw-p 00000000 00:00 0 7ffcbd970000-7ffcbd971000 rw-p 00000000 00:00 0 7ffcbd972000-7ffcbda71000 rw-p 00000000 00:00 0 [stack] 7ffcbdaae000-7ffcbdab1000 r--p 00000000 00:00 0 [vvar] 7ffcbdab1000-7ffcbdab3000 r-xp 00000000 00:00 0 [vdso] ffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0 [vsyscall] mmap [7ffcbd970000-7ffcbd971000] has one unmapped page before stack [7ffcbd972000-7ffcbda71000] but the faulting address is ~1M away from the mmap.
Embargo was changed to: CRD: 2017-06-19
Created attachment 727600 [details] fix candidate v4
Created attachment 727601 [details] follow up fix
Created attachment 727627 [details] test program to test stack guard page behavior updated test program to support stacks growing up. Just compile with -DCONFIG_STACK_GROWSUP
Michal, can you check if you attached the right things. These are unrelated patches in debugfs and xgbe?
Created attachment 727764 [details] fix candidate v4 sorry about the previous unrelated patch (too many things in my local kernel tree happening).
Created attachment 727765 [details] follow up fix
An update workflow for this issue was started. This issue was rated as critical. Please submit fixed packages until 2017-06-12. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/63658
Hugh Dickins has noticed that we over account total_vm with the gap and that breaks their init process which runs with ulimit -S -v 20000. I have a patch to address that but I assume more accounting anomalies because the current implementation of the stack gap is inherently prone to these errors all over the place (e.g. if we fix this then the unmap will get broken etc). I am not sure we want to play this whack a mole game and maybe it would be more reasonable to simply admit that the accounting is slightly weird. That being said we should probably document that the increased gap is accounted to the both mlock and AS limit so if somebody sees an unexpected ENOMEM from mmap then they should increase the limit by 1MB. Is that acceptable or we should go with fix attempts and still see potential and unexpected fallouts and more importantly a new resubmit?
We can document that for now and do potential fix ups later. We definitely should not take a resubmit, otherwise we will not make the deadline.
What can make this happen: - setting ulimits - using argument / environment area which is allowed to grow very large in current kernels ( 2.6.23 or later I think. ) - memory leaks in relevant applications or the libraries they used that can be attacker controlled to get close to memory close to exhaustion. Qualys identified e.g. - sudo: the recursive device lookup kept structures in memory and collected more and could be tricked by a ever changing symlink maze in /dev/shm/ - exim: /usr/sbin/exim parameter -p leaked a bit of memory and could be used multiple times and so leak as much memory as you could fit -p x arguments on the commandline. - other setuid tools or network services would need to be reviewed for memory leakage that could be used in such scenarios
(In reply to Marcus Meissner from comment #54) > What can make this happen: > > - setting ulimits > - using argument / environment area which is allowed to grow very large in > current kernels ( 2.6.23 or later I think. ) > > - memory leaks in relevant applications or the libraries they used that can > be attacker controlled to get close to memory close to exhaustion. Qualys > identified e.g. > > - sudo: the recursive device lookup kept structures in memory and > collected more > and could be tricked by a ever changing symlink maze in /dev/shm/ > > - exim: /usr/sbin/exim parameter -p leaked a bit of memory and could be > used multiple times and so leak as much memory as you could fit -p x > arguments on the commandline. > > - other setuid tools or network services would need to be reviewed for > memory leakage that could be used in such scenarios OK, thanks for the clarification. I was under impression that pre 2.6.23 were not vulnerable. That would be sles10. Has anybody tried to exploit sudo/exim on such an old code stream? Do we need cve/linux-2.6.16 backport today?
This issue is now public: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
This is an autogenerated message for OBS integration: This bug (1039348) was mentioned in https://build.opensuse.org/request/show/504823 42.2 / kernel-source
SUSE-SU-2017:1613-1: An update that fixes two vulnerabilities is now available. Category: security (critical) Bug References: 1039348,979021 CVE References: CVE-2015-3288,CVE-2017-1000364 Sources used: SUSE Linux Enterprise Server 11-SP3-LTSS (src): kernel-bigsmp-3.0.101-0.47.102.1, kernel-default-3.0.101-0.47.102.1, kernel-ec2-3.0.101-0.47.102.1, kernel-pae-3.0.101-0.47.102.1, kernel-source-3.0.101-0.47.102.1, kernel-syms-3.0.101-0.47.102.1, kernel-trace-3.0.101-0.47.102.1, kernel-xen-3.0.101-0.47.102.1 SUSE Linux Enterprise Server 11-EXTRA (src): kernel-bigsmp-3.0.101-0.47.102.1, kernel-default-3.0.101-0.47.102.1, kernel-pae-3.0.101-0.47.102.1, kernel-ppc64-3.0.101-0.47.102.1, kernel-trace-3.0.101-0.47.102.1, kernel-xen-3.0.101-0.47.102.1 SUSE Linux Enterprise Point of Sale 11-SP3 (src): kernel-default-3.0.101-0.47.102.1, kernel-ec2-3.0.101-0.47.102.1, kernel-pae-3.0.101-0.47.102.1, kernel-source-3.0.101-0.47.102.1, kernel-syms-3.0.101-0.47.102.1, kernel-trace-3.0.101-0.47.102.1, kernel-xen-3.0.101-0.47.102.1 SUSE Linux Enterprise Debuginfo 11-SP3 (src): kernel-bigsmp-3.0.101-0.47.102.1, kernel-default-3.0.101-0.47.102.1, kernel-ec2-3.0.101-0.47.102.1, kernel-pae-3.0.101-0.47.102.1, kernel-trace-3.0.101-0.47.102.1, kernel-xen-3.0.101-0.47.102.1
SUSE-SU-2017:1615-1: An update that solves one vulnerability and has one errata is now available. Category: security (critical) Bug References: 1039348,1042292 CVE References: CVE-2017-1000364 Sources used: SUSE OpenStack Cloud 6 (src): kernel-default-3.12.74-60.64.45.1, kernel-source-3.12.74-60.64.45.1, kernel-syms-3.12.74-60.64.45.1, kernel-xen-3.12.74-60.64.45.1, kgraft-patch-SLE12-SP1_Update_16-1-4.1 SUSE Linux Enterprise Server for SAP 12-SP1 (src): kernel-default-3.12.74-60.64.45.1, kernel-source-3.12.74-60.64.45.1, kernel-syms-3.12.74-60.64.45.1, kernel-xen-3.12.74-60.64.45.1, kgraft-patch-SLE12-SP1_Update_16-1-4.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): kernel-default-3.12.74-60.64.45.1, kernel-source-3.12.74-60.64.45.1, kernel-syms-3.12.74-60.64.45.1, kernel-xen-3.12.74-60.64.45.1, kgraft-patch-SLE12-SP1_Update_16-1-4.1 SUSE Linux Enterprise Module for Public Cloud 12 (src): kernel-ec2-3.12.74-60.64.45.1
SUSE-SU-2017:1617-1: An update that solves one vulnerability and has one errata is now available. Category: security (critical) Bug References: 1037384,1039348 CVE References: CVE-2017-1000364 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP2 (src): kernel-default-4.4.59-92.20.2 SUSE Linux Enterprise Software Development Kit 12-SP2 (src): kernel-docs-4.4.59-92.20.3, kernel-obs-build-4.4.59-92.20.2 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src): kernel-default-4.4.59-92.20.2, kernel-source-4.4.59-92.20.2, kernel-syms-4.4.59-92.20.2 SUSE Linux Enterprise Server 12-SP2 (src): kernel-default-4.4.59-92.20.2, kernel-source-4.4.59-92.20.2, kernel-syms-4.4.59-92.20.2 SUSE Linux Enterprise Live Patching 12 (src): kgraft-patch-SLE12-SP2_Update_8-1-2.1 SUSE Linux Enterprise High Availability 12-SP2 (src): kernel-default-4.4.59-92.20.2 SUSE Linux Enterprise Desktop 12-SP2 (src): kernel-default-4.4.59-92.20.2, kernel-source-4.4.59-92.20.2, kernel-syms-4.4.59-92.20.2 OpenStack Cloud Magnum Orchestration 7 (src): kernel-default-4.4.59-92.20.2
SUSE-SU-2017:1618-1: An update that solves one vulnerability and has one errata is now available. Category: security (critical) Bug References: 1039348,1042292 CVE References: CVE-2017-1000364 Sources used: SUSE Linux Enterprise Server for SAP 12 (src): kernel-default-3.12.61-52.77.1, kernel-source-3.12.61-52.77.1, kernel-syms-3.12.61-52.77.1, kernel-xen-3.12.61-52.77.1, kgraft-patch-SLE12_Update_22-1-4.1 SUSE Linux Enterprise Server 12-LTSS (src): kernel-default-3.12.61-52.77.1, kernel-source-3.12.61-52.77.1, kernel-syms-3.12.61-52.77.1, kernel-xen-3.12.61-52.77.1, kgraft-patch-SLE12_Update_22-1-4.1 SUSE Linux Enterprise Module for Public Cloud 12 (src): kernel-ec2-3.12.61-52.77.1
On SLES 10 and SLES 11 SP1 you can adjust the stack guard page by: echo 256 > /proc/sys/vm/heap-stack-gap or permanently by adding into /etc/sysctl.conf vm.heap-stack-gap = 256
There was a regression report for the mainline kernel patch: https://lkml.org/lkml/2017/6/19/1515
(In reply to Marcus Meissner from comment #68) > There was a regression report for the mainline kernel patch: > > https://lkml.org/lkml/2017/6/19/1515 Also http://lkml.kernel.org/r/20170620075206.GB1909@uranus.lan I don't think we're affected either way and the only known issue remains the errorneous accounting of the gap.
SUSE-SU-2017:1628-1: An update that solves one vulnerability and has four fixes is now available. Category: security (critical) Bug References: 1018074,1035920,1039348,1042921,1043234 CVE References: CVE-2017-1000364 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): kernel-docs-3.0.101-104.7 SUSE Linux Enterprise Server 11-SP4 (src): kernel-bigmem-3.0.101-104.2, kernel-default-3.0.101-104.2, kernel-ec2-3.0.101-104.2, kernel-pae-3.0.101-104.2, kernel-ppc64-3.0.101-104.2, kernel-source-3.0.101-104.2, kernel-syms-3.0.101-104.2, kernel-trace-3.0.101-104.2, kernel-xen-3.0.101-104.2 SUSE Linux Enterprise Server 11-EXTRA (src): kernel-default-3.0.101-104.2, kernel-pae-3.0.101-104.2, kernel-ppc64-3.0.101-104.2, kernel-trace-3.0.101-104.2, kernel-xen-3.0.101-104.2 SUSE Linux Enterprise Debuginfo 11-SP4 (src): kernel-bigmem-3.0.101-104.2, kernel-default-3.0.101-104.2, kernel-ec2-3.0.101-104.2, kernel-pae-3.0.101-104.2, kernel-ppc64-3.0.101-104.2, kernel-trace-3.0.101-104.2, kernel-xen-3.0.101-104.2
openSUSE-SU-2017:1633-1: An update that solves four vulnerabilities and has 35 fixes is now available. Category: security (important) Bug References: 1012060,1012382,1012422,1012829,1015452,1022595,1031796,1032339,1036638,1037840,1038085,1039348,1039900,1040855,1041242,1041431,1041810,1042286,1042356,1042421,1042517,1042535,1042536,1042886,1043014,1043231,1043236,1043371,1043467,1043598,1043935,1044015,1044125,1044532,863764,966321,966339,971975,995542 CVE References: CVE-2017-1000364,CVE-2017-1000380,CVE-2017-7346,CVE-2017-9242 Sources used: openSUSE Leap 42.2 (src): kernel-debug-4.4.72-18.12.2, kernel-default-4.4.72-18.12.2, kernel-docs-4.4.72-18.12.3, kernel-obs-build-4.4.72-18.12.2, kernel-obs-qa-4.4.72-18.12.1, kernel-source-4.4.72-18.12.1, kernel-syms-4.4.72-18.12.1, kernel-vanilla-4.4.72-18.12.2
Created attachment 729853 [details] follow up fix2 OK, so this has worked out and it fixes the regression reported in bug 1045340. I think that we should go with this as another fast track for 3.0 and older based kernels. I will replace SLE12* implementation with the upstream solution.
This is an autogenerated message for OBS integration: This bug (1039348) was mentioned in https://build.opensuse.org/request/show/505760 42.2 / kernel-source
(In reply to Michal Hocko from comment #75) > Created attachment 729853 [details] > follow up fix2 > > OK, so this has worked out and it fixes the regression reported in bug > 1045340. > > I think that we should go with this as another fast track for 3.0 and older > based kernels. I will replace SLE12* implementation with the upstream > solution. FTR, Hugh and Ben are working on 3.2 backport. That should be quite close to 3.0 mmap code so I will try to backport that once they are finished. This would mean that we will be consistent with others. Which is always good.
This is an autogenerated message for OBS integration: This bug (1039348) was mentioned in https://build.opensuse.org/request/show/505992 42.2 / kernel-source
openSUSE-SU-2017:1685-1: An update that solves one vulnerability and has 27 fixes is now available. Category: security (important) Bug References: 1015342,1022595,1027101,1037669,1039214,1039348,1040351,1040364,1040567,1040609,1042286,1042863,1043990,1044082,1044120,1044767,1044772,1044880,1045154,1045235,1045286,1045307,1045467,1045568,966170,966172,966191,990682 CVE References: CVE-2017-1000364 Sources used: openSUSE Leap 42.2 (src): kernel-debug-4.4.73-18.17.1, kernel-default-4.4.73-18.17.1, kernel-docs-4.4.73-18.17.2, kernel-obs-build-4.4.73-18.17.1, kernel-obs-qa-4.4.73-18.17.1, kernel-source-4.4.73-18.17.1, kernel-syms-4.4.73-18.17.1, kernel-vanilla-4.4.73-18.17.1
(In reply to Swamp Workflow Management from comment #85) > openSUSE-SU-2017:1685-1: An update that solves one vulnerability and has 27 > fixes is now available. > > Category: security (important) > Bug References: > 1015342,1022595,1027101,1037669,1039214,1039348,1040351,1040364,1040567, > 1040609,1042286,1042863,1043990,1044082,1044120,1044767,1044772,1044880, > 1045154,1045235,1045286,1045307,1045467,1045568,966170,966172,966191,990682 > CVE References: CVE-2017-1000364 > Sources used: > openSUSE Leap 42.2 (src): kernel-debug-4.4.73-18.17.1, > kernel-default-4.4.73-18.17.1, kernel-docs-4.4.73-18.17.2, > kernel-obs-build-4.4.73-18.17.1, kernel-obs-qa-4.4.73-18.17.1, > kernel-source-4.4.73-18.17.1, kernel-syms-4.4.73-18.17.1, > kernel-vanilla-4.4.73-18.17.1 Where is this update? It's not in the repo.
there seems to be a publisher issue, the 42.2 repo was not refreshed since june 22nd. I contact the admin person.
updates and regression fix updates were released, code seems stable currently
SUSE-SU-2017:1853-1: An update that solves 15 vulnerabilities and has 162 fixes is now available. Category: security (important) Bug References: 1003581,1004003,1011044,1012060,1012382,1012422,1012452,1012829,1012910,1012985,1013561,1013887,1015342,1015452,1017461,1018885,1020412,1021424,1022266,1022595,1023287,1025461,1026570,1027101,1027512,1027974,1028217,1028310,1028340,1028883,1029607,1030057,1030070,1031040,1031142,1031147,1031470,1031500,1031512,1031555,1031717,1031796,1032141,1032339,1032345,1032400,1032581,1032803,1033117,1033281,1033336,1033340,1033885,1034048,1034419,1034635,1034670,1034671,1034762,1034902,1034995,1035024,1035866,1035887,1035920,1035922,1036214,1036638,1036752,1036763,1037177,1037186,1037384,1037483,1037669,1037840,1037871,1037969,1038033,1038043,1038085,1038142,1038143,1038297,1038458,1038544,1038842,1038843,1038846,1038847,1038848,1038879,1038981,1038982,1039214,1039348,1039354,1039700,1039864,1039882,1039883,1039885,1039900,1040069,1040125,1040182,1040279,1040351,1040364,1040395,1040425,1040463,1040567,1040609,1040855,1040929,1040941,1041087,1041160,1041168,1041242,1041431,1041810,1042286,1042356,1042421,1042517,1042535,1042536,1042863,1042886,1043014,1043231,1043236,1043347,1043371,1043467,1043488,1043598,1043912,1043935,1043990,1044015,1044082,1044120,1044125,1044532,1044767,1044772,1044854,1044880,1044912,1045154,1045235,1045286,1045307,1045467,1045568,1046105,1046434,1046589,799133,863764,922871,939801,966170,966172,966191,966321,966339,971975,988065,989311,990058,990682,993832,995542 CVE References: CVE-2017-1000365,CVE-2017-1000380,CVE-2017-7346,CVE-2017-7487,CVE-2017-7616,CVE-2017-7618,CVE-2017-8890,CVE-2017-8924,CVE-2017-8925,CVE-2017-9074,CVE-2017-9075,CVE-2017-9076,CVE-2017-9077,CVE-2017-9150,CVE-2017-9242 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP2 (src): kernel-default-4.4.74-92.29.1 SUSE Linux Enterprise Software Development Kit 12-SP2 (src): kernel-docs-4.4.74-92.29.3, kernel-obs-build-4.4.74-92.29.1 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src): kernel-default-4.4.74-92.29.1, kernel-source-4.4.74-92.29.1, kernel-syms-4.4.74-92.29.1 SUSE Linux Enterprise Server 12-SP2 (src): kernel-default-4.4.74-92.29.1, kernel-source-4.4.74-92.29.1, kernel-syms-4.4.74-92.29.1 SUSE Linux Enterprise Live Patching 12 (src): kgraft-patch-SLE12-SP2_Update_10-1-4.1 SUSE Linux Enterprise High Availability 12-SP2 (src): kernel-default-4.4.74-92.29.1 SUSE Linux Enterprise Desktop 12-SP2 (src): kernel-default-4.4.74-92.29.1, kernel-source-4.4.74-92.29.1, kernel-syms-4.4.74-92.29.1 OpenStack Cloud Magnum Orchestration 7 (src): kernel-default-4.4.74-92.29.1
SUSE-SU-2017:1903-1: An update that solves one vulnerability and has three fixes is now available. Category: security (important) Bug References: 1039348,1039496,1045340,1045406 CVE References: CVE-2017-1000364 Sources used: SUSE Linux Enterprise Live Patching 12 (src): kgraft-patch-SLE12-SP2_Update_8-2-2.1
SUSE-SU-2017:1912-1: An update that solves one vulnerability and has three fixes is now available. Category: security (important) Bug References: 1039348,1039496,1045340,1045406 CVE References: CVE-2017-1000364 Sources used: SUSE Linux Enterprise Server for SAP 12 (src): kgraft-patch-SLE12_Update_22-2-2.1 SUSE Linux Enterprise Server 12-LTSS (src): kgraft-patch-SLE12_Update_22-2-2.1
SUSE-SU-2017:1915-1: An update that solves one vulnerability and has three fixes is now available. Category: security (important) Bug References: 1039348,1039496,1045340,1045406 CVE References: CVE-2017-1000364 Sources used: SUSE Linux Enterprise Server for SAP 12-SP1 (src): kgraft-patch-SLE12-SP1_Update_16-2-2.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): kgraft-patch-SLE12-SP1_Update_16-2-2.1
SUSE-SU-2017:1990-1: An update that solves 43 vulnerabilities and has 282 fixes is now available. Category: security (important) Bug References: 1000092,1003077,1003581,1004003,1007729,1007959,1007962,1008842,1009674,1009718,1010032,1010612,1010690,1011044,1011176,1011913,1012060,1012382,1012422,1012452,1012829,1012910,1012985,1013001,1013561,1013792,1013887,1013994,1014120,1014136,1015342,1015367,1015452,1015609,1016403,1017164,1017170,1017410,1017461,1017641,1018100,1018263,1018358,1018385,1018419,1018446,1018813,1018885,1018913,1019061,1019148,1019163,1019168,1019260,1019351,1019594,1019614,1019618,1019630,1019631,1019784,1019851,1020048,1020214,1020412,1020488,1020602,1020685,1020817,1020945,1020975,1021082,1021248,1021251,1021258,1021260,1021294,1021424,1021455,1021474,1021762,1022181,1022266,1022304,1022340,1022429,1022476,1022547,1022559,1022595,1022785,1022971,1023101,1023175,1023287,1023762,1023866,1023884,1023888,1024015,1024081,1024234,1024508,1024938,1025039,1025235,1025461,1025683,1026024,1026405,1026462,1026505,1026509,1026570,1026692,1026722,1027054,1027066,1027101,1027153,1027179,1027189,1027190,1027195,1027273,1027512,1027565,1027616,1027974,1028017,1028027,1028041,1028158,1028217,1028310,1028325,1028340,1028372,1028415,1028819,1028883,1028895,1029220,1029514,1029607,1029634,1029986,1030057,1030070,1030118,1030213,1030573,1031003,1031040,1031052,1031142,1031147,1031200,1031206,1031208,1031440,1031470,1031500,1031512,1031555,1031579,1031662,1031717,1031796,1031831,1032006,1032141,1032339,1032345,1032400,1032581,1032673,1032681,1032803,1033117,1033281,1033287,1033336,1033340,1033885,1034048,1034419,1034635,1034670,1034671,1034762,1034902,1034995,1035024,1035866,1035887,1035920,1035922,1036214,1036638,1036752,1036763,1037177,1037186,1037384,1037483,1037669,1037840,1037871,1037969,1038033,1038043,1038085,1038142,1038143,1038297,1038458,1038544,1038842,1038843,1038846,1038847,1038848,1038879,1038981,1038982,1039348,1039354,1039700,1039864,1039882,1039883,1039885,1039900,1040069,1040125,1040182,1040279,1040351,1040364,1040395,1040425,1040463,1040567,1040609,1040855,1040929,1040941,1041087,1041160,1041168,1041242,1041431,1041810,1042200,1042286,1042356,1042421,1042517,1042535,1042536,1042863,1042886,1043014,1043231,1043236,1043347,1043371,1043467,1043488,1043598,1043912,1043935,1043990,1044015,1044082,1044120,1044125,1044532,1044767,1044772,1044854,1044880,1044912,1045154,1045235,1045286,1045307,1045340,1045467,1045568,1046105,1046434,1046589,799133,863764,870618,922871,951844,966170,966172,966191,966321,966339,968697,969479,969755,970083,971975,982783,985561,986362,986365,987192,987576,988065,989056,989311,990058,990682,991273,993832,995542,995968,998106 CVE References: CVE-2016-10200,CVE-2016-2117,CVE-2016-4997,CVE-2016-4998,CVE-2016-7117,CVE-2016-9191,CVE-2017-1000364,CVE-2017-1000365,CVE-2017-1000380,CVE-2017-2583,CVE-2017-2584,CVE-2017-2596,CVE-2017-2636,CVE-2017-2671,CVE-2017-5551,CVE-2017-5576,CVE-2017-5577,CVE-2017-5897,CVE-2017-5970,CVE-2017-5986,CVE-2017-6074,CVE-2017-6214,CVE-2017-6345,CVE-2017-6346,CVE-2017-6347,CVE-2017-6353,CVE-2017-7184,CVE-2017-7187,CVE-2017-7261,CVE-2017-7294,CVE-2017-7308,CVE-2017-7346,CVE-2017-7374,CVE-2017-7487,CVE-2017-7616,CVE-2017-7618,CVE-2017-8890,CVE-2017-9074,CVE-2017-9075,CVE-2017-9076,CVE-2017-9077,CVE-2017-9150,CVE-2017-9242 Sources used: SUSE Linux Enterprise Real Time Extension 12-SP2 (src): kernel-rt-4.4.74-7.10.1, kernel-rt_debug-4.4.74-7.10.1, kernel-source-rt-4.4.74-7.10.1, kernel-syms-rt-4.4.74-7.10.1
SUSE-SU-2017:2286-1: An update that solves 8 vulnerabilities and has 150 fixes is now available. Category: security (important) Bug References: 1005778,1006180,1011913,1012829,1013887,1015337,1015342,1016119,1019151,1019695,1020645,1022476,1022600,1022604,1023175,1024346,1024373,1025461,1026570,1028173,1028286,1029693,1030552,1031515,1031717,1031784,1033587,1034075,1034113,1034762,1036215,1036632,1037344,1037404,1037838,1037994,1038078,1038616,1038792,1039153,1039348,1039915,1040307,1040347,1040351,1041958,1042257,1042286,1042314,1042422,1042778,1043261,1043347,1043520,1043598,1043652,1043805,1043912,1044112,1044443,1044623,1044636,1045154,1045293,1045330,1045404,1045563,1045596,1045709,1045715,1045866,1045922,1045937,1046105,1046170,1046434,1046651,1046655,1046682,1046821,1046985,1047027,1047048,1047096,1047118,1047121,1047152,1047174,1047277,1047343,1047354,1047418,1047506,1047595,1047651,1047653,1047670,1047802,1048146,1048155,1048221,1048317,1048348,1048356,1048421,1048451,1048501,1048891,1048912,1048914,1048916,1048919,1049231,1049289,1049298,1049361,1049483,1049486,1049603,1049619,1049645,1049706,1049882,1050061,1050188,1050211,1050320,1050322,1050677,1051022,1051048,1051059,1051239,1051399,1051471,1051478,1051479,1051556,1051663,1051689,1051979,1052049,1052223,1052311,1052325,1052365,1052442,1052533,1052709,1052773,1052794,1052899,1052925,1053043,1053117,964063,974215,998664 CVE References: CVE-2017-1000111,CVE-2017-1000112,CVE-2017-10810,CVE-2017-11473,CVE-2017-7533,CVE-2017-7541,CVE-2017-7542,CVE-2017-8831 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP3 (src): kernel-default-4.4.82-6.3.1 SUSE Linux Enterprise Software Development Kit 12-SP3 (src): kernel-docs-4.4.82-6.3.5, kernel-obs-build-4.4.82-6.3.3 SUSE Linux Enterprise Server 12-SP3 (src): kernel-default-4.4.82-6.3.1, kernel-source-4.4.82-6.3.1, kernel-syms-4.4.82-6.3.1 SUSE Linux Enterprise Live Patching 12-SP3 (src): kgraft-patch-SLE12-SP3_Update_1-1-2.1 SUSE Linux Enterprise High Availability 12-SP3 (src): kernel-default-4.4.82-6.3.1 SUSE Linux Enterprise Desktop 12-SP3 (src): kernel-default-4.4.82-6.3.1, kernel-source-4.4.82-6.3.1, kernel-syms-4.4.82-6.3.1
SUSE-SU-2017:2342-1: An update that solves 44 vulnerabilities and has 135 fixes is now available. Category: security (important) Bug References: 1003077,1005651,1008374,1008850,1008893,1012422,1013018,1013070,1013800,1013862,1016489,1017143,1018074,1018263,1018446,1019168,1020229,1021256,1021913,1022971,1023014,1023051,1023163,1023888,1024508,1024788,1024938,1025235,1025702,1026024,1026260,1026722,1026914,1027066,1027101,1027178,1027565,1028372,1028415,1028880,1029140,1029212,1029770,1029850,1030213,1030552,1030573,1030593,1030814,1031003,1031052,1031440,1031579,1032141,1032340,1032471,1033287,1033336,1033771,1033794,1033804,1033816,1034026,1034670,1035576,1035777,1035920,1036056,1036288,1036629,1037182,1037183,1037191,1037193,1037227,1037232,1037233,1037356,1037358,1037359,1037441,1038544,1038879,1038981,1038982,1039258,1039348,1039354,1039456,1039594,1039882,1039883,1039885,1040069,1040351,1041160,1041431,1041762,1041975,1042045,1042200,1042615,1042633,1042687,1042832,1043014,1043234,1043935,1044015,1044125,1044216,1044230,1044854,1044882,1044913,1044985,1045154,1045340,1045356,1045406,1045416,1045525,1045538,1045547,1045615,1046107,1046122,1046192,1046715,1047027,1047053,1047343,1047354,1047487,1047523,1047653,1048185,1048221,1048232,1048275,1049483,1049603,1049688,1049882,1050154,1050431,1051478,1051515,1051770,784815,792863,799133,870618,909486,909618,911105,919382,928138,931620,938352,943786,948562,962257,970956,971975,972891,979021,982783,983212,985561,986362,986365,986924,988065,989056,990682,991651,995542,999245 CVE References: CVE-2014-9922,CVE-2015-3288,CVE-2015-8970,CVE-2016-10200,CVE-2016-2188,CVE-2016-4997,CVE-2016-4998,CVE-2016-5243,CVE-2016-7117,CVE-2017-1000363,CVE-2017-1000364,CVE-2017-1000365,CVE-2017-1000380,CVE-2017-11176,CVE-2017-11473,CVE-2017-2636,CVE-2017-2647,CVE-2017-2671,CVE-2017-5669,CVE-2017-5970,CVE-2017-5986,CVE-2017-6074,CVE-2017-6214,CVE-2017-6348,CVE-2017-6353,CVE-2017-6951,CVE-2017-7184,CVE-2017-7187,CVE-2017-7261,CVE-2017-7294,CVE-2017-7308,CVE-2017-7482,CVE-2017-7487,CVE-2017-7533,CVE-2017-7542,CVE-2017-7616,CVE-2017-8890,CVE-2017-8924,CVE-2017-8925,CVE-2017-9074,CVE-2017-9075,CVE-2017-9076,CVE-2017-9077,CVE-2017-9242 Sources used: SUSE Linux Enterprise Real Time Extension 11-SP4 (src): kernel-rt-3.0.101.rt130-69.5.1, kernel-rt_trace-3.0.101.rt130-69.5.1, kernel-source-rt-3.0.101.rt130-69.5.1, kernel-syms-rt-3.0.101.rt130-69.5.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): kernel-rt-3.0.101.rt130-69.5.1, kernel-rt_debug-3.0.101.rt130-69.5.1, kernel-rt_trace-3.0.101.rt130-69.5.1
SUSE-SU-2017:2908-1: An update that solves 30 vulnerabilities and has 38 fixes is now available. Category: security (important) Bug References: 1001459,1012985,1023287,1027149,1028217,1030531,1030552,1031515,1033960,1034405,1035531,1035738,1037182,1037183,1037994,1038544,1038564,1038879,1038883,1038981,1038982,1039348,1039354,1039456,1039721,1039864,1039882,1039883,1039885,1040069,1041160,1041429,1041431,1042696,1042832,1042863,1044125,1045327,1045487,1045922,1046107,1048275,1048788,1049645,1049882,1053148,1053152,1053317,1056588,1056982,1057179,1058410,1058507,1058524,1059863,1062471,1062520,1063667,1064388,856774,860250,863764,878240,922855,922871,986924,993099,994364 CVE References: CVE-2017-1000363,CVE-2017-1000365,CVE-2017-1000380,CVE-2017-10661,CVE-2017-11176,CVE-2017-12153,CVE-2017-12154,CVE-2017-12762,CVE-2017-13080,CVE-2017-14051,CVE-2017-14106,CVE-2017-14140,CVE-2017-15265,CVE-2017-15274,CVE-2017-15649,CVE-2017-7482,CVE-2017-7487,CVE-2017-7518,CVE-2017-7541,CVE-2017-7542,CVE-2017-7889,CVE-2017-8831,CVE-2017-8890,CVE-2017-8924,CVE-2017-8925,CVE-2017-9074,CVE-2017-9075,CVE-2017-9076,CVE-2017-9077,CVE-2017-9242 Sources used: SUSE OpenStack Cloud 6 (src): kernel-default-3.12.74-60.64.63.1, kernel-source-3.12.74-60.64.63.1, kernel-syms-3.12.74-60.64.63.1, kernel-xen-3.12.74-60.64.63.1, kgraft-patch-SLE12-SP1_Update_22-1-2.1 SUSE Linux Enterprise Server for SAP 12-SP1 (src): kernel-default-3.12.74-60.64.63.1, kernel-source-3.12.74-60.64.63.1, kernel-syms-3.12.74-60.64.63.1, kernel-xen-3.12.74-60.64.63.1, kgraft-patch-SLE12-SP1_Update_22-1-2.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): kernel-default-3.12.74-60.64.63.1, kernel-source-3.12.74-60.64.63.1, kernel-syms-3.12.74-60.64.63.1, kernel-xen-3.12.74-60.64.63.1, kgraft-patch-SLE12-SP1_Update_22-1-2.1 SUSE Linux Enterprise Module for Public Cloud 12 (src): kernel-ec2-3.12.74-60.64.63.1
SUSE-SU-2017:2920-1: An update that solves 36 vulnerabilities and has 22 fixes is now available. Category: security (important) Bug References: 1008353,1012422,1017941,1029850,1030593,1032268,1034405,1034670,1035576,1035877,1036752,1037182,1037183,1037306,1037994,1038544,1038879,1038981,1038982,1039348,1039349,1039354,1039456,1039721,1039882,1039883,1039885,1040069,1041431,1041958,1044125,1045327,1045487,1045922,1046107,1047408,1048275,1049645,1049882,1052593,1053148,1053152,1056588,1056982,1057179,1058038,1058410,1058507,1058524,1062520,1063667,1064388,938162,975596,977417,984779,985562,990682 CVE References: CVE-2015-9004,CVE-2016-10229,CVE-2016-9604,CVE-2017-1000363,CVE-2017-1000365,CVE-2017-1000380,CVE-2017-10661,CVE-2017-11176,CVE-2017-12153,CVE-2017-12154,CVE-2017-12762,CVE-2017-13080,CVE-2017-14051,CVE-2017-14106,CVE-2017-14140,CVE-2017-15265,CVE-2017-15274,CVE-2017-15649,CVE-2017-2647,CVE-2017-6951,CVE-2017-7482,CVE-2017-7487,CVE-2017-7518,CVE-2017-7541,CVE-2017-7542,CVE-2017-7889,CVE-2017-8106,CVE-2017-8831,CVE-2017-8890,CVE-2017-8924,CVE-2017-8925,CVE-2017-9074,CVE-2017-9075,CVE-2017-9076,CVE-2017-9077,CVE-2017-9242 Sources used: SUSE Linux Enterprise Server 12-LTSS (src): kernel-default-3.12.61-52.101.1, kernel-source-3.12.61-52.101.1, kernel-syms-3.12.61-52.101.1, kernel-xen-3.12.61-52.101.1, kgraft-patch-SLE12_Update_28-1-8.1 SUSE Linux Enterprise Module for Public Cloud 12 (src): kernel-ec2-3.12.61-52.101.1
SUSE-SU-2018:1080-1: An update that solves 18 vulnerabilities and has 29 fixes is now available. Category: security (important) Bug References: 1010470,1013018,1039348,1052943,1062568,1062840,1063416,1063516,1065600,1065999,1067118,1067912,1068032,1072689,1072865,1075088,1075091,1075994,1078669,1078672,1078673,1078674,1080464,1080757,1080813,1081358,1082091,1082424,1083242,1083275,1083483,1083494,1084536,1085113,1085279,1085331,1085513,1086162,1087092,1087260,1087762,1088147,1088260,1089608,909077,940776,943786 CVE References: CVE-2015-5156,CVE-2016-7915,CVE-2017-0861,CVE-2017-12190,CVE-2017-13166,CVE-2017-16644,CVE-2017-16911,CVE-2017-16912,CVE-2017-16913,CVE-2017-16914,CVE-2017-18203,CVE-2017-18208,CVE-2017-5715,CVE-2018-10087,CVE-2018-6927,CVE-2018-7566,CVE-2018-7757,CVE-2018-8822 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): kernel-docs-3.0.101-108.38.1 SUSE Linux Enterprise Server 11-SP4 (src): kernel-bigmem-3.0.101-108.38.1, kernel-default-3.0.101-108.38.1, kernel-ec2-3.0.101-108.38.1, kernel-pae-3.0.101-108.38.1, kernel-ppc64-3.0.101-108.38.1, kernel-source-3.0.101-108.38.1, kernel-syms-3.0.101-108.38.1, kernel-trace-3.0.101-108.38.1, kernel-xen-3.0.101-108.38.1 SUSE Linux Enterprise Server 11-EXTRA (src): kernel-default-3.0.101-108.38.1, kernel-pae-3.0.101-108.38.1, kernel-ppc64-3.0.101-108.38.1, kernel-trace-3.0.101-108.38.1, kernel-xen-3.0.101-108.38.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): kernel-bigmem-3.0.101-108.38.1, kernel-default-3.0.101-108.38.1, kernel-ec2-3.0.101-108.38.1, kernel-pae-3.0.101-108.38.1, kernel-ppc64-3.0.101-108.38.1, kernel-trace-3.0.101-108.38.1, kernel-xen-3.0.101-108.38.1
SUSE-SU-2018:1172-1: An update that solves 20 vulnerabilities and has 11 fixes is now available. Category: security (important) Bug References: 1010470,1039348,1052943,1062568,1062840,1063416,1067118,1072689,1072865,1078669,1078672,1078673,1078674,1080464,1080757,1082424,1083242,1083483,1083494,1084536,1085331,1086162,1087088,1087209,1087260,1087762,1088147,1088260,1089608,1089752,940776 CVE References: CVE-2015-5156,CVE-2016-7915,CVE-2017-0861,CVE-2017-12190,CVE-2017-13166,CVE-2017-16644,CVE-2017-16911,CVE-2017-16912,CVE-2017-16913,CVE-2017-16914,CVE-2017-18203,CVE-2017-18208,CVE-2018-10087,CVE-2018-10124,CVE-2018-1087,CVE-2018-6927,CVE-2018-7566,CVE-2018-7757,CVE-2018-8822,CVE-2018-8897 Sources used: SUSE Linux Enterprise Server 11-SP3-LTSS (src): kernel-bigsmp-3.0.101-0.47.106.22.1, kernel-default-3.0.101-0.47.106.22.1, kernel-ec2-3.0.101-0.47.106.22.1, kernel-pae-3.0.101-0.47.106.22.1, kernel-source-3.0.101-0.47.106.22.1, kernel-syms-3.0.101-0.47.106.22.1, kernel-trace-3.0.101-0.47.106.22.1, kernel-xen-3.0.101-0.47.106.22.1 SUSE Linux Enterprise Server 11-EXTRA (src): kernel-bigsmp-3.0.101-0.47.106.22.1, kernel-default-3.0.101-0.47.106.22.1, kernel-pae-3.0.101-0.47.106.22.1, kernel-ppc64-3.0.101-0.47.106.22.1, kernel-trace-3.0.101-0.47.106.22.1, kernel-xen-3.0.101-0.47.106.22.1 SUSE Linux Enterprise Point of Sale 11-SP3 (src): kernel-default-3.0.101-0.47.106.22.1, kernel-ec2-3.0.101-0.47.106.22.1, kernel-pae-3.0.101-0.47.106.22.1, kernel-source-3.0.101-0.47.106.22.1, kernel-syms-3.0.101-0.47.106.22.1, kernel-trace-3.0.101-0.47.106.22.1, kernel-xen-3.0.101-0.47.106.22.1 SUSE Linux Enterprise Debuginfo 11-SP3 (src): kernel-bigsmp-3.0.101-0.47.106.22.1, kernel-default-3.0.101-0.47.106.22.1, kernel-ec2-3.0.101-0.47.106.22.1, kernel-pae-3.0.101-0.47.106.22.1, kernel-trace-3.0.101-0.47.106.22.1, kernel-xen-3.0.101-0.47.106.22.1
*** Bug 1086310 has been marked as a duplicate of this bug. ***
SUSE-SU-2018:1309-1: An update that solves 18 vulnerabilities and has 36 fixes is now available. Category: security (important) Bug References: 1010470,1013018,1032084,1039348,1050431,1052943,1062568,1062840,1063416,1063516,1065600,1065999,1067118,1067912,1068032,1072689,1072865,1075088,1075091,1075994,1078669,1078672,1078673,1078674,1080464,1080757,1080813,1081358,1082091,1082424,1083242,1083275,1083483,1083494,1084536,1085113,1085279,1085331,1085513,1086162,1087092,1087209,1087260,1087762,1088147,1088260,1089608,1089665,1089668,1089752,909077,940776,943786,951638 CVE References: CVE-2015-5156,CVE-2016-7915,CVE-2017-0861,CVE-2017-12190,CVE-2017-13166,CVE-2017-16644,CVE-2017-16911,CVE-2017-16912,CVE-2017-16913,CVE-2017-16914,CVE-2017-18203,CVE-2017-18208,CVE-2018-10087,CVE-2018-10124,CVE-2018-6927,CVE-2018-7566,CVE-2018-7757,CVE-2018-8822 Sources used: SUSE Linux Enterprise Real Time Extension 11-SP4 (src): kernel-rt-3.0.101.rt130-69.24.1, kernel-rt_trace-3.0.101.rt130-69.24.1, kernel-source-rt-3.0.101.rt130-69.24.1, kernel-syms-rt-3.0.101.rt130-69.24.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): kernel-rt-3.0.101.rt130-69.24.1, kernel-rt_debug-3.0.101.rt130-69.24.1, kernel-rt_trace-3.0.101.rt130-69.24.1