-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.3136
                   Security update for the Linux Kernel
                              17 October 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           linux kernel
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Root Compromise          -- Existing Account      
                   Denial of Service        -- Remote/Unauthenticated
                   Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-17182 CVE-2018-14634 CVE-2018-14633
                   CVE-2018-5390  

Reference:         ASB-2018.0222
                   ASB-2018.0221
                   ESB-2018.3039
                   ESB-2018.2955

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2018/suse-su-20183159-1/
   https://www.suse.com/support/update/announcement/2018/suse-su-20183158-1/
   https://www.suse.com/support/update/announcement/2018/suse-su-20183164-1/
   https://www.suse.com/support/update/announcement/2018/suse-su-20183171-1/
   https://www.suse.com/support/update/announcement/2018/suse-su-20183172-1/
   https://www.suse.com/support/update/announcement/2018/suse-su-20183173-1/

Comment: This bulletin contains six (6) SUSE security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

   SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:3159-1
Rating:             important
References:         #1012382 #1031392 #1051510 #1055120 #1061840 
                    #1065729 #1082519 #1085030 #1090078 #1094244 
                    #1098782 #1101669 #1102495 #1103269 #1103405 
                    #1103587 #1103636 #1104888 #1105190 #1105795 
                    #1106105 #1106240 #1106948 #1107783 #1107829 
                    #1107928 #1107947 #1108096 #1108170 #1108281 
                    #1108323 #1108399 #1108823 #1109244 #1109333 
                    #1109336 #1109337 #1109603 #1109806 #1109859 
                    #1109979 #1109992 #1110006 #1110301 #1110363 
                    #1110639 #1110642 #1110643 #1110644 #1110645 
                    #1110646 #1110647 #1110649 #1110650 
Cross-References:   CVE-2018-14633 CVE-2018-17182
Affected Products:
                    SUSE Linux Enterprise Workstation Extension 15
                    SUSE Linux Enterprise Module for Legacy Software 15
                    SUSE Linux Enterprise Module for Development Tools 15
                    SUSE Linux Enterprise Module for Basesystem 15
                    SUSE Linux Enterprise High Availability 15
______________________________________________________________________________

   An update that solves two vulnerabilities and has 52 fixes
   is now available.

Description:



   The SUSE Linux Enterprise 15 kernel was updated to receive various
   security and bugfixes.

   The following security bugs were fixed:

   - CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c
     mishandled sequence number overflows. An attacker can trigger a
     use-after-free (and possibly gain privileges) via certain thread
     creation, map, unmap, invalidation, and dereference operations
     (bnc#1108399).
   - CVE-2018-14633: A security flaw was found in the
     chap_server_compute_md5() function in the ISCSI target code in a way an
     authentication request from an ISCSI initiator is processed. An
     unauthenticated remote attacker can cause a stack buffer overflow and
     smash up to 17 bytes of the stack. The attack requires the iSCSI target
     to be enabled on the victim host. Depending on how the target's code was
     built (i.e. depending on a compiler, compile flags and hardware
     architecture) an attack may lead to a system crash and thus to a
     denial-of-service or possibly to a non-authorized access to data
     exported by an iSCSI target. Due to the nature of the flaw, privilege
     escalation cannot be fully ruled out, although we believe it is highly
     unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be
     vulnerable (bnc#1107829).

   The following non-security bugs were fixed:

   - alsa: bebob: fix memory leak for M-Audio FW1814 and ProjectMix I/O at
     error path (bsc#1051510).
   - alsa: bebob: use address returned by kmalloc() instead of kernel stack
     for streaming DMA mapping (bsc#1051510).
   - alsa: emu10k1: fix possible info leak to userspace on
     SNDRV_EMU10K1_IOCTL_INFO (bsc#1051510).
   - alsa: fireworks: fix memory leak of response buffer at error path
     (bsc#1051510).
   - alsa: hda: Add AZX_DCAPS_PM_RUNTIME for AMD Raven Ridge (bsc#1051510).
   - alsa: msnd: Fix the default sample sizes (bsc#1051510).
   - alsa: pcm: Fix snd_interval_refine first/last with open min/max
     (bsc#1051510).
   - alsa: usb-audio: Fix multiple definitions in AU0828_DEVICE() macro
     (bsc#1051510).
   - ASoC: cs4265: fix MMTLR Data switch control (bsc#1051510).
   - ASoC: dapm: Fix potential DAI widget pointer deref when linking DAIs
     (bsc#1051510).
   - ASoC: rt5514: Add the I2S ASRC support (bsc#1051510).
   - ASoC: rt5514: Add the missing register in the readable table
     (bsc#1051510).
   - ASoC: rt5514: Eliminate the noise in the ASRC case (bsc#1051510).
   - ASoC: rt5514: Fix the issue of the delay volume applied (bsc#1051510).
   - ax88179_178a: Check for supported Wake-on-LAN modes (bsc#1051510).
   - block, dax: remove dead code in blkdev_writepages() (bsc#1104888).
   - block: fix warning when I/O elevator is changed as request_queue is
     being removed (bsc#1109979).
   - block: Invalidate cache on discard v2 (bsc#1109992).
   - block: pass inclusive 'lend' parameter to truncate_inode_pages_range
     (bsc#1109992).
   - block: properly protect the 'queue' kobj in blk_unregister_queue
     (bsc#1109979).
   - bluetooth: Add a new Realtek 8723DE ID 0bda:b009 (bsc#1051510).
   - bluetooth: btsdio: Do not bind to non-removable BCM43430 (bsc#1103587).
   - bluetooth: Use lock_sock_nested in bt_accept_enqueue (bsc#1051510).
   - btrfs: add a comp_refs() helper (dependency for bsc#1031392).
   - btrfs: add tracepoints for outstanding extents mods (dependency for
     bsc#1031392).
   - btrfs: check-integrity: Fix NULL pointer dereference for degraded mount
     (bsc#1107947).
   - btrfs: cleanup extent locking sequence (dependency for bsc#1031392).
   - btrfs: delayed-inode: Remove wrong qgroup meta reservation calls
     (bsc#1031392).
   - btrfs: delayed-inode: Use new qgroup meta rsv for delayed inode and item
     (bsc#1031392).
   - btrfs: fix data corruption when deduplicating between different files
     (bsc#1110647).
   - btrfs: fix duplicate extents after fsync of file with prealloc extents
     (bsc#1110644).
   - btrfs: fix fsync after hole punching when using no-holes feature
     (bsc#1110642).
   - btrfs: fix loss of prealloc extents past i_size after fsync log replay
     (bsc#1110643).
   - btrfs: fix return value on rename exchange failure (bsc#1110645).
   - btrfs: fix send failure when root has deleted files still open
     (bsc#1110650).
   - btrfs: Fix wrong btrfs_delalloc_release_extents parameter (bsc#1031392).
   - btrfs: log csums for all modified extents (bsc#1110639).
   - btrfs: make the delalloc block rsv per inode (dependency for
     bsc#1031392).
   - btrfs: qgroup: Add quick exit for non-fs extents (dependency for
     bsc#1031392).
   - btrfs: qgroup: Cleanup btrfs_qgroup_prepare_account_extents function
     (dependency for bsc#1031392).
   - btrfs: qgroup: Cleanup the remaining old reservation counters
     (bsc#1031392).
   - btrfs: qgroup: Commit transaction in advance to reduce early EDQUOT
     (bsc#1031392).
   - btrfs: qgroup: Do not use root->qgroup_meta_rsv for qgroup (bsc#1031392).
   - btrfs: qgroup: Fix qgroup reserved space underflow by only freeing
     reserved ranges (dependency for bsc#1031392).
   - btrfs: qgroup: Fix qgroup reserved space underflow caused by buffered
     write and quotas being enabled (dependency for bsc#1031392).
   - btrfs: qgroup: Fix wrong qgroup reservation update for relationship
     modification (bsc#1031392).
   - btrfs: qgroup: Introduce extent changeset for qgroup reserve functions
     (dependency for bsc#1031392).
   - btrfs: qgroup: Introduce function to convert META_PREALLOC into
     META_PERTRANS (bsc#1031392).
   - btrfs: qgroup: Introduce helpers to update and access new qgroup rsv
     (bsc#1031392).
   - btrfs: qgroup: Make qgroup_reserve and its callers to use separate
     reservation type (bsc#1031392).
   - btrfs: qgroup: Return actually freed bytes for qgroup release or free
     data (dependency for bsc#1031392).
   - btrfs: qgroup: Skeleton to support separate qgroup reservation type
     (bsc#1031392).
   - btrfs: qgroup: Split meta rsv type into meta_prealloc and meta_pertrans
     (bsc#1031392).
   - btrfs: qgroup: Update trace events for metadata reservation
     (bsc#1031392).
   - btrfs: qgroup: Update trace events to use new separate rsv types
     (bsc#1031392).
   - btrfs: qgroup: Use independent and accurate per inode qgroup rsv
     (bsc#1031392).
   - btrfs: qgroup: Use root::qgroup_meta_rsv_* to record qgroup meta
     reserved space (bsc#1031392).
   - btrfs: qgroup: Use separate meta reservation type for delalloc
     (bsc#1031392).
   - btrfs: remove type argument from comp_tree_refs (dependency for
     bsc#1031392).
   - btrfs: Remove unused parameters from various functions (bsc#1110649).
   - btrfs: rework outstanding_extents (dependency for bsc#1031392).
   - btrfs: scrub: Do not use inode page cache in
     scrub_handle_errored_block() (follow up for bsc#1108096).
   - btrfs: scrub: Do not use inode pages for device replace (follow up for
     bsc#1108096).
   - btrfs: switch args for comp_*_refs (dependency for bsc#1031392).
   - btrfs: sync log after logging new name (bsc#1110646).
   - btrfs: tests/qgroup: Fix wrong tree backref level (bsc#1107928).
   - cfg80211: reg: Init wiphy_idx in regulatory_hint_core() (bsc#1051510).
   - coresight: Handle errors in finding input/output ports (bsc#1051510).
   - crypto: clarify licensing of OpenSSL asm code ().
   - crypto: sharah - Unregister correct algorithms for SAHARA 3
     (bsc#1051510).
   - crypto: skcipher - Fix -Wstringop-truncation warnings (bsc#1051510).
   - dax: Introduce a ->copy_to_iter dax operation (bsc#1098782).
   - dax: Make extension of dax_operations transparent (bsc#1098782).
   - dax: remove default copy_from_iter fallback (bsc#1098782).
     patches.drivers/dax-remove-the-pmem_dax_ops-flush-abstraction.patch:
     Refresh
   - dax: Report bytes remaining in dax_iomap_actor() (bsc#1098782).
   - dax: require 'struct page' by default for filesystem dax (bsc#1104888).
   patches.fixes/fs-allow-per-device-dax-status-checking-for-filesystems.patch
     : Refresh
   - dax: store pfns in the radix (bsc#1104888).
   patches.fixes/fs-allow-per-device-dax-status-checking-for-filesystems.patch
     : Refresh
   - device-dax: Add missing address_space_operations (bsc#1107783).
   - device-dax: Enable page_mapping() (bsc#1107783).
   - device-dax: Set page->index (bsc#1107783).
   - doc/README.SUSE: Remove mentions of cloneconfig (bsc#1103636).
   - ext2: auto disable dax instead of failing mount (bsc#1104888).
   patches.fixes/fs-allow-per-device-dax-status-checking-for-filesystems.patch
     : Refresh patches.kabi/kabi-fixup-bdev_dax_supported.patch: Refresh
   - ext2, dax: introduce ext2_dax_aops (bsc#1104888).
   - ext4: auto disable dax instead of failing mount (bsc#1104888 ).
   patches.fixes/fs-allow-per-device-dax-status-checking-for-filesystems.patch
     : Refresh patches.kabi/kabi-fixup-bdev_dax_supported.patch: Refresh
   - ext4, dax: add ext4_bmap to ext4_dax_aops (bsc#1104888).
   - ext4, dax: introduce ext4_dax_aops (bsc#1104888).
   - ext4, dax: set ext4_dax_aops for dax files (bsc#1104888).
   - fbdev: Distinguish between interlaced and progressive modes
     (bsc#1051510).
   - fbdev/via: fix defined but not used warning (bsc#1051510).
   - filesystem-dax: Introduce dax_lock_mapping_entry() (bsc#1107783).
     patches.kabi/kabi-fixup-bdev_dax_supported.patch: Refresh
   - filesystem-dax: Set page->index (bsc#1107783).
   - Fix buggy backport in
     patches.fixes/dax-check-for-queue_flag_dax-in-bdev_dax_supported.patch
     (bsc#1109859)
   - Fix kexec forbidding kernels signed with keys in the secondary keyring
     to boot (bsc#1110006).
   - Fix sorted section Merge commits 862a718e83 and 8aa4d41564 had conflicts
     with (apparently) bad resolution which introduced disorder in the sorted
     section.
   - fs, dax: prepare for dax-specific address_space_operations
     (bsc#1104888).
   patches.fixes/fs-allow-per-device-dax-status-checking-for-filesystems.patch
     : Refresh patches.kabi/kabi-fixup-bdev_dax_supported.patch: Refresh
   - fs, dax: use page->mapping to warn if truncate collides with a busy page
     (bsc#1104888).
   - gpiolib: Mark gpio_suffixes array with __maybe_unused (bsc#1051510).
   - gpio: pxa: Fix potential NULL dereference (bsc#1051510).
   - gpu: ipu-v3: csi: pass back mbus_code_to_bus_cfg error codes
     (bsc#1051510).
   - HID: hid-ntrig: add error handling for sysfs_create_group (bsc#1051510).
   - i2c: i801: Allow ACPI AML access I/O ports not reserved for SMBus
     (bsc#1051510).
   - Input: elantech - enable middle button of touchpad on ThinkPad P72
     (bsc#1051510).
   - input: rohm_bu21023: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
     (bsc#1051510).
   - intel_th: Fix device removal logic (bsc#1051510).
   - iommu/amd: Return devid as alias for ACPI HID devices (bsc#1106105).
   - ioremap: Update pgtable free interfaces with addr (bsc#1110006).
   - ipc/shm: fix shmat() nil address after round-down when remapping
     (bsc#1090078).
   - KABI: move the new handler to end of machdep_calls and hide it from
     genksyms (bsc#1094244).
   - kprobes/x86: Release insn_slot in failure path (bsc#1110006).
   - KVM: PPC: Book3S HV: Use correct pagesize in kvm_unmap_radix()
     (bsc#1061840, git-fixes).
   - KVM: VMX: Do not allow reexecute_instruction() when skipping MMIO instr
     (bsc#1106240).
   - KVM: x86: Default to not allowing emulation retry in kvm_mmu_page_fault
     (bsc#1106240).
   - KVM: x86: Do not re-{try,execute} after failed emulation in L2
     (bsc#1106240).
   - KVM: x86: Invert emulation re-execute behavior to make it opt-in
     (bsc#1106240).
   - KVM: x86: Merge EMULTYPE_RETRY and EMULTYPE_ALLOW_REEXECUTE
     (bsc#1106240).
   - lan78xx: Check for supported Wake-on-LAN modes (bsc#1051510).
   - lib/iov_iter: Fix pipe handling in _copy_to_iter_mcsafe() (bsc#1098782).
   - libnvdimm, pmem: Fix memcpy_mcsafe() return code handling in
     nsio_rw_bytes() (bsc#1098782).
   - libnvdimm, pmem: Restore page attributes when clearing errors
     (bsc#1107783).
   - Limit kernel-source build to architectures for which we build binaries
     (bsc#1108281).
   - mac80211: fix pending queue hang due to TX_DROP (bsc#1051510).
   - mac80211: restrict delayed tailroom needed decrement (bsc#1051510).
   - mei: bus: type promotion bug in mei_nfc_if_version() (bsc#1051510).
   - mei: ignore not found client in the enumeration (bsc#1051510).
   - mfd: 88pm860x-i2c: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
     (bsc#1051510).
   - mfd: ti_am335x_tscadc: Fix struct clk memory leak (bsc#1051510).
   - mmc: sdhci: do not try to use 3.3V signaling if not supported
     (bsc#1051510).
   - mmc: sdhci-of-esdhc: set proper dma mask for ls104x chips (bsc#1051510).
   - mm, dax: introduce pfn_t_special() (bsc#1104888).
   - mm, madvise_inject_error: Disable MADV_SOFT_OFFLINE for ZONE_DEVICE
     pages (bsc#1107783).
   - mm, madvise_inject_error: Let memory_failure() optionally take a page
     reference (bsc#1107783).
   - mm, memory_failure: Collect mapping size in collect_procs()
     (bsc#1107783).
   - mm, memory_failure: Teach memory_failure() about dev_pagemap pages
     (bsc#1107783).
   - mm, numa: Migrate pages to local nodes quicker early in the lifetime of
     a task (bnc#1101669 optimise numa balancing for fast migrate).
   - mm, numa: Remove rate-limiting of automatic numa balancing migration
     (bnc#1101669 optimise numa balancing for fast migrate).
   - mm, numa: Remove rate-limiting of automatic numa balancing migration
     kabi (bnc#1101669 optimise numa balancing for fast migrate).
   - mm/vmalloc: add interfaces to free unmapped page table (bsc#1110006).
   - NFC: Fix possible memory corruption when handling SHDLC I-Frame commands
     (bsc#1051510).
   - nfs/filelayout: fix oops when freeing filelayout segment (bsc#1105190).
   - NFS/filelayout: Fix racy setting of fl->dsaddr in
     filelayout_check_deviceid() (bsc#1105190).
   - NFS: Use an appropriate work queue for direct-write completion
     (bsc#1082519).
   - parport: sunbpp: fix error return code (bsc#1051510).
   - PCI: aardvark: Size bridges before resources allocation (bsc#1109806).
   - PCI: designware: Fix I/O space page leak (bsc#1109806).
   - PCI: faraday: Add missing of_node_put() (bsc#1109806).
   - PCI: faraday: Fix I/O space page leak (bsc#1109806).
   - PCI/portdrv: Compute MSI/MSI-X IRQ vectors after final allocation
     (bsc#1109806).
   - PCI/portdrv: Factor out Interrupt Message Number lookup (bsc#1109806).
   - PCI: versatile: Fix I/O space page leak (bsc#1109806).
   - PCI: xgene: Fix I/O space page leak (bsc#1109806).
   - PCI: xilinx: Add missing of_node_put() (bsc#1109806).
   - PCI: xilinx-nwl: Add missing of_node_put() (bsc#1109806).
   - pinctrl: cannonlake: Fix HOSTSW_OWN register offset of H variant
     (bsc#1051510).
   - platform/x86: alienware-wmi: Correct a memory leak (bsc#1051510).
   - platform/x86: toshiba_acpi: Fix defined but not used build warnings
     (bsc#1051510).
   - pmem: Switch to copy_to_iter_mcsafe() (bsc#1098782).
   - powernv/pseries: consolidate code for mce early handling (bsc#1094244).
   - powerpc/fadump: cleanup crash memory ranges support (bsc#1103269).
   - powerpc/fadump: re-register firmware-assisted dump if already registered
     (bsc#1108170, bsc#1108823).
   - powerpc: Fix size calculation using resource_size() (bnc#1012382).
   - powerpc: KABI add aux_ptr to hole in paca_struct to extend it with
     additional members (bsc#1094244).
   - powerpc: KABI: move mce_data_buf into paca_aux (bsc#1094244).
   - powerpc/numa: Use associativity if VPHN hcall is successful
     (bsc#1110363).
   - powerpc/pkeys: Fix reading of ibm, processor-storage-keys property
     (bsc#1109244).
   - powerpc/powernv/npu: Do a PID GPU TLB flush when invalidating a large
     address range (bsc#1055120).
   - powerpc/pseries: Defer the logging of rtas error to irq work queue
     (bsc#1094244).
   - powerpc/pseries: Define MCE error event section (bsc#1094244).
   - powerpc/pseries: Disable CPU hotplug across migrations (bsc#1065729).
   - powerpc/pseries: Display machine check error details (bsc#1094244).
   - powerpc/pseries: Dump the SLB contents on SLB MCE errors (bsc#1094244).
     - Refresh patches.kabi/KABI-move-mce_data_buf-into-paca_aux.patch
   - powerpc/pseries: Flush SLB contents on SLB MCE errors (bsc#1094244).
   - powerpc/pseries: Remove prrn_work workqueue (bsc#1102495, bsc#1109337).
   - powerpc/pseries: Remove unneeded uses of dlpar work queue (bsc#1102495,
     bsc#1109337).
   - powerpc/tm: Avoid possible userspace r1 corruption on reclaim
     (bsc#1109333).
   - powerpc/tm: Fix userspace r13 corruption (bsc#1109333).
   - powerpc/xive: Fix trying to "push" an already active pool VP
     (bsc#1085030, git-fixes).
   - r8152: Check for supported Wake-on-LAN Modes (bsc#1051510).
   - README.BRANCH: SLE15-SP1 branch maintainer changes Add ptesarik as
     co-maintainer, keep tiwai as the primary maintainer
   - regulator: fix crash caused by null driver data (bsc#1051510).
   - rename/renumber hv patches to simplify upcoming upstream merges No code
     changes.
   - Revert "btrfs: qgroups: Retry after commit on getting EDQUOT"
     (bsc#1031392).
   - Revert "ipc/shm: Fix shmat mmap nil-page protection" (bsc#1090078).
   - rpm/mkspec: build dtbs for architectures marked -!needs_updating
   - rpm/mkspec: fix ppc64 kernel-source build.
   - s390/crypto: Fix return code checking in cbc_paes_crypt() (bnc#1108323,
     LTC#171709).
   - s390/pci: fix out of bounds access during irq setup (bnc#1108323,
     LTC#171068).
   - s390/qdio: reset old sbal_state flags (LTC#171525, bsc#1106948).
   - s390/qeth: use vzalloc for QUERY OAT buffer (LTC#171527, bsc#1106948).
   - sched/fair: Fix bandwidth timer clock drift condition (Git-fixes).
   - sched/numa: Avoid task migration for small NUMA improvement (bnc#1101669
     optimise numa balancing for fast migrate).
   - sched/numa: Pass destination CPU as a parameter to migrate_task_rq
     (bnc#1101669 optimise numa balancing for fast migrate).
   - sched/numa: Pass destination CPU as a parameter to migrate_task_rq kabi
     (bnc#1101669 optimise numa balancing for fast migrate).
   - sched/numa: Reset scan rate whenever task moves across nodes
     (bnc#1101669 optimise numa balancing for fast migrate).
   - sched/numa: Stop multiple tasks from moving to the CPU at the same time
     (bnc#1101669 optimise numa balancing for fast migrate).
   - sched/numa: Stop multiple tasks from moving to the CPU at the same time
     kabi (bnc#1101669 optimise numa balancing for fast migrate).
   - scsi: hisi_sas: Add a flag to filter PHY events during reset ().
   - scsi: hisi_sas: add memory barrier in task delivery function ().
   - scsi: hisi_sas: Add missing PHY spinlock init ().
   - scsi: hisi_sas: Add SATA FIS check for v3 hw ().
   - scsi: hisi_sas: Adjust task reject period during host reset ().
   - scsi: hisi_sas: Drop hisi_sas_slot_abort() ().
   - scsi: hisi_sas: Fix the conflict between dev gone and host reset ().
   - scsi: hisi_sas: Fix the failure of recovering PHY from STP link timeout
     ().
   - scsi: hisi_sas: Implement handlers of PCIe FLR for v3 hw ().
   - scsi: hisi_sas: Only process broadcast change in phy_bcast_v3_hw() ().
   - scsi: hisi_sas: Pre-allocate slot DMA buffers ().
   - scsi: hisi_sas: Release all remaining resources in clear nexus ha ().
   - scsi: hisi_sas: relocate some common code for v3 hw ().
   - scsi: hisi_sas: tidy channel interrupt handler for v3 hw ().
   - scsi: hisi_sas: Tidy hisi_sas_task_prep() ().
   - scsi: hisi_sas: tidy host controller reset function a bit ().
   - scsi: hisi_sas: Update a couple of register settings for v3 hw ().
   - scsi: hisi_sas: Use dmam_alloc_coherent() ().
   - scsi: ipr: System hung while dlpar adding primary ipr adapter back
     (bsc#1109336).
   - smsc75xx: Check for Wake-on-LAN modes (bsc#1051510).
   - smsc95xx: Check for Wake-on-LAN modes (bsc#1051510).
   - sort series.conf I didn't want to, but he made me do it.
   - sr9800: Check for supported Wake-on-LAN modes (bsc#1051510).
   - sr: get/drop reference to device in revalidate and check_events
     (bsc#1109979).
   - supported.conf: add test_syctl to new kselftests-kmp package As per we
     will require new FATE requests per each new selftest driver. We do not
     want to support these module on production runs but we do want to
     support them for QA / testing uses. The compromise is to package them
     into its own package, this will be the kselftests-kmp package. Selftests
     can also be used as proof of concept vehicle for issues by customers or
     ourselves. Vanilla kernels do not get test_sysctl given that driver was
     using built-in defaults, this also means we cannot run sefltests on
     config/s390x/zfcpdump which does not enable modules. Likeweise, since we
     had to *change* the kernel for test_syctl, it it also means we can't
     test test_syctl with vanilla kernels. It should be possible with other
     selftests drivers if they are present in vanilla kernels though.
   - uio, lib: Fix CONFIG_ARCH_HAS_UACCESS_MCSAFE compilation (bsc#1098782).
   - VFS: do not test owner for NFS in set_posix_acl() (bsc#1103405).
   - video: goldfishfb: fix memory leak on driver remove (bsc#1051510).
   - watchdog: Mark watchdog touch functions as notrace (git-fixes).
   - wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout()
     (bsc#1051510).
   - x86/apic: Fix restoring boot IRQ mode in reboot and kexec/kdump
     (bsc#1110006).
   - x86/apic: Split disable_IO_APIC() into two functions to fix
     CONFIG_KEXEC_JUMP=y (bsc#1110006).
   - x86/apic: Split out restore_boot_irq_mode() from disable_IO_APIC()
     (bsc#1110006).
   - x86/apic/vector: Fix off by one in error path (bsc#1110006).
   - x86/asm/memcpy_mcsafe: Add labels for __memcpy_mcsafe() write fault
     handling (bsc#1098782).
   - x86/asm/memcpy_mcsafe: Add write-protection-fault handling (bsc#1098782).
   - x86/asm/memcpy_mcsafe: Define copy_to_iter_mcsafe() (bsc#1098782).
   - x86/asm/memcpy_mcsafe: Fix copy_to_user_mcsafe() exception handling
     (bsc#1098782).
   - x86/asm/memcpy_mcsafe: Provide original memcpy_mcsafe_unrolled
     (bsc#1098782).
   - x86/asm/memcpy_mcsafe: Remove loop unrolling (bsc#1098782).
   - x86/asm/memcpy_mcsafe: Return bytes remaining (bsc#1098782).
   - x86/boot: Fix kexec booting failure in the SEV bit detection code
     (bsc#1110301).
   - x86/build/64: Force the linker to use 2MB page size (bsc#1109603).
   - x86/dumpstack: Save first regs set for the executive summary
     (bsc#1110006).
   - x86/dumpstack: Unify show_regs() (bsc#1110006).
   - x86/entry/64: Wipe KASAN stack shadow before rewind_stack_do_exit()
     (bsc#1110006).
   - x86/espfix/64: Fix espfix double-fault handling on 5-level systems
     (bsc#1110006).
   - x86/idt: Load idt early in start_secondary (bsc#1110006).
   - x86/kexec: Avoid double free_page() upon do_kexec_load() failure
     (bsc#1110006).
   - x86/mce: Fix set_mce_nospec() to avoid #GP fault (bsc#1107783).
   - x86/mce: Improve error message when kernel cannot recover (bsc#1110006).
   - x86/mce: Improve error message when kernel cannot recover (bsc#1110301).
   - x86/memory_failure: Introduce {set, clear}_mce_nospec() (bsc#1107783).
   - x86-memory_failure-Introduce-set-clear-_mce_nospec.patch: Fixup
     compilation breakage on s390 and arm due to missing clear_mce_nospec().
   - x86/mm: Add TLB purge to free pmd/pte page interfaces (bsc#1110006).
   - x86/mm: Disable ioremap free page handling on x86-PAE (bsc#1110006).
   - x86/mm: Drop TS_COMPAT on 64-bit exec() syscall (bsc#1110006).
   - x86/mm: Expand static page table for fixmap space (bsc#1110006).
   - x86/mm: Fix ELF_ET_DYN_BASE for 5-level paging (bsc#1110006).
   - x86/mm: implement free pmd/pte page interfaces (bsc#1110006).
   - x86/mm/pat: Prepare {reserve, free}_memtype() for "decoy" addresses
     (bsc#1107783).
   - x86/mpx: Do not allow MPX if we have mappings above 47-bit (bsc#1110006).
   - x86: msr-index.h: Correct SNB_C1/C3_AUTO_UNDEMOTE defines (bsc#1110006).
   - x86: msr-index.h: Correct SNB_C1/C3_AUTO_UNDEMOTE defines (bsc#1110301).
   - x86/PCI: Make broadcom_postcore_init() check acpi_disabled (bsc#1110006).
   - x86/pkeys: Do not special case protection key 0 (bsc#1110006).
   - x86/pkeys: Override pkey when moving away from PROT_EXEC (bsc#1110006).
   - x86/process: Do not mix user/kernel regs in 64bit __show_regs()
     (bsc#1110006).
   - x86/process: Re-export start_thread() (bsc#1110006).
   - x86/vdso: Fix lsl operand order (bsc#1110006).
   - x86/vdso: Fix lsl operand order (bsc#1110301).
   - xen: issue warning message when out of grant maptrack entries
     (bsc#1105795).
   - xfs, dax: introduce xfs_dax_aops (bsc#1104888).
   - xhci: Fix use after free for URB cancellation on a reallocated endpoint
     (bsc#1051510).


Special Instructions and Notes:

   Please reboot the system after installing this update.

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Workstation Extension 15:

      zypper in -t patch SUSE-SLE-Product-WE-15-2018-2241=1

   - SUSE Linux Enterprise Module for Legacy Software 15:

      zypper in -t patch SUSE-SLE-Module-Legacy-15-2018-2241=1

   - SUSE Linux Enterprise Module for Development Tools 15:

      zypper in -t patch SUSE-SLE-Module-Development-Tools-15-2018-2241=1

   - SUSE Linux Enterprise Module for Basesystem 15:

      zypper in -t patch SUSE-SLE-Module-Basesystem-15-2018-2241=1

   - SUSE Linux Enterprise High Availability 15:

      zypper in -t patch SUSE-SLE-Product-HA-15-2018-2241=1



Package List:

   - SUSE Linux Enterprise Workstation Extension 15 (x86_64):

      kernel-default-debuginfo-4.12.14-25.22.1
      kernel-default-debugsource-4.12.14-25.22.1
      kernel-default-extra-4.12.14-25.22.1
      kernel-default-extra-debuginfo-4.12.14-25.22.1

   - SUSE Linux Enterprise Module for Legacy Software 15 (aarch64 ppc64le s390x x86_64):

      kernel-default-debuginfo-4.12.14-25.22.1
      kernel-default-debugsource-4.12.14-25.22.1
      reiserfs-kmp-default-4.12.14-25.22.1
      reiserfs-kmp-default-debuginfo-4.12.14-25.22.1

   - SUSE Linux Enterprise Module for Development Tools 15 (aarch64 ppc64le s390x x86_64):

      kernel-obs-build-4.12.14-25.22.1
      kernel-obs-build-debugsource-4.12.14-25.22.1
      kernel-syms-4.12.14-25.22.1
      kernel-vanilla-base-4.12.14-25.22.1
      kernel-vanilla-base-debuginfo-4.12.14-25.22.1
      kernel-vanilla-debuginfo-4.12.14-25.22.1
      kernel-vanilla-debugsource-4.12.14-25.22.1

   - SUSE Linux Enterprise Module for Development Tools 15 (noarch):

      kernel-docs-4.12.14-25.22.2
      kernel-source-4.12.14-25.22.1

   - SUSE Linux Enterprise Module for Basesystem 15 (aarch64 ppc64le s390x x86_64):

      kernel-default-4.12.14-25.22.1
      kernel-default-debuginfo-4.12.14-25.22.1
      kernel-default-debugsource-4.12.14-25.22.1
      kernel-default-devel-4.12.14-25.22.1
      kernel-default-devel-debuginfo-4.12.14-25.22.1

   - SUSE Linux Enterprise Module for Basesystem 15 (noarch):

      kernel-devel-4.12.14-25.22.1
      kernel-macros-4.12.14-25.22.1

   - SUSE Linux Enterprise Module for Basesystem 15 (s390x):

      kernel-default-man-4.12.14-25.22.1
      kernel-zfcpdump-4.12.14-25.22.1
      kernel-zfcpdump-debuginfo-4.12.14-25.22.1
      kernel-zfcpdump-debugsource-4.12.14-25.22.1

   - SUSE Linux Enterprise High Availability 15 (aarch64 ppc64le s390x x86_64):

      cluster-md-kmp-default-4.12.14-25.22.1
      cluster-md-kmp-default-debuginfo-4.12.14-25.22.1
      dlm-kmp-default-4.12.14-25.22.1
      dlm-kmp-default-debuginfo-4.12.14-25.22.1
      gfs2-kmp-default-4.12.14-25.22.1
      gfs2-kmp-default-debuginfo-4.12.14-25.22.1
      kernel-default-debuginfo-4.12.14-25.22.1
      kernel-default-debugsource-4.12.14-25.22.1
      ocfs2-kmp-default-4.12.14-25.22.1
      ocfs2-kmp-default-debuginfo-4.12.14-25.22.1


References:

   https://www.suse.com/security/cve/CVE-2018-14633.html
   https://www.suse.com/security/cve/CVE-2018-17182.html
   https://bugzilla.suse.com/1012382
   https://bugzilla.suse.com/1031392
   https://bugzilla.suse.com/1051510
   https://bugzilla.suse.com/1055120
   https://bugzilla.suse.com/1061840
   https://bugzilla.suse.com/1065729
   https://bugzilla.suse.com/1082519
   https://bugzilla.suse.com/1085030
   https://bugzilla.suse.com/1090078
   https://bugzilla.suse.com/1094244
   https://bugzilla.suse.com/1098782
   https://bugzilla.suse.com/1101669
   https://bugzilla.suse.com/1102495
   https://bugzilla.suse.com/1103269
   https://bugzilla.suse.com/1103405
   https://bugzilla.suse.com/1103587
   https://bugzilla.suse.com/1103636
   https://bugzilla.suse.com/1104888
   https://bugzilla.suse.com/1105190
   https://bugzilla.suse.com/1105795
   https://bugzilla.suse.com/1106105
   https://bugzilla.suse.com/1106240
   https://bugzilla.suse.com/1106948
   https://bugzilla.suse.com/1107783
   https://bugzilla.suse.com/1107829
   https://bugzilla.suse.com/1107928
   https://bugzilla.suse.com/1107947
   https://bugzilla.suse.com/1108096
   https://bugzilla.suse.com/1108170
   https://bugzilla.suse.com/1108281
   https://bugzilla.suse.com/1108323
   https://bugzilla.suse.com/1108399
   https://bugzilla.suse.com/1108823
   https://bugzilla.suse.com/1109244
   https://bugzilla.suse.com/1109333
   https://bugzilla.suse.com/1109336
   https://bugzilla.suse.com/1109337
   https://bugzilla.suse.com/1109603
   https://bugzilla.suse.com/1109806
   https://bugzilla.suse.com/1109859
   https://bugzilla.suse.com/1109979
   https://bugzilla.suse.com/1109992
   https://bugzilla.suse.com/1110006
   https://bugzilla.suse.com/1110301
   https://bugzilla.suse.com/1110363
   https://bugzilla.suse.com/1110639
   https://bugzilla.suse.com/1110642
   https://bugzilla.suse.com/1110643
   https://bugzilla.suse.com/1110644
   https://bugzilla.suse.com/1110645
   https://bugzilla.suse.com/1110646
   https://bugzilla.suse.com/1110647
   https://bugzilla.suse.com/1110649
   https://bugzilla.suse.com/1110650


- --------------------------------------------------------------------------------


   SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:3158-1
Rating:             important
References:         #1012382 #1031392 #1051510 #1055120 #1061840 
                    #1065729 #1082519 #1085030 #1090078 #1094244 
                    #1098782 #1101669 #1102495 #1103269 #1103405 
                    #1103587 #1103636 #1104888 #1105190 #1105795 
                    #1106105 #1106240 #1106948 #1107783 #1107829 
                    #1107928 #1107947 #1108096 #1108170 #1108281 
                    #1108323 #1108399 #1108823 #1109244 #1109333 
                    #1109336 #1109337 #1109603 #1109806 #1109859 
                    #1109979 #1109992 #1110006 #1110301 #1110363 
                    #1110639 #1110642 #1110643 #1110644 #1110645 
                    #1110646 #1110647 #1110649 #1110650 
Cross-References:   CVE-2018-14633 CVE-2018-17182
Affected Products:
                    SUSE Linux Enterprise Module for Live Patching 15
______________________________________________________________________________

   An update that solves two vulnerabilities and has 52 fixes
   is now available.

Description:



   The SUSE Linux Enterprise 15 kernel was updated to receive various
   security and bugfixes.

   The following security bugs were fixed:

   - CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c
     mishandled sequence number overflows. An attacker can trigger a
     use-after-free (and possibly gain privileges) via certain thread
     creation, map, unmap, invalidation, and dereference operations
     (bnc#1108399).
   - CVE-2018-14633: A security flaw was found in the
     chap_server_compute_md5() function in the ISCSI target code in a way an
     authentication request from an ISCSI initiator is processed. An
     unauthenticated remote attacker can cause a stack buffer overflow and
     smash up to 17 bytes of the stack. The attack requires the iSCSI target
     to be enabled on the victim host. Depending on how the target's code was
     built (i.e. depending on a compiler, compile flags and hardware
     architecture) an attack may lead to a system crash and thus to a
     denial-of-service or possibly to a non-authorized access to data
     exported by an iSCSI target. Due to the nature of the flaw, privilege
     escalation cannot be fully ruled out, although we believe it is highly
     unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be
     vulnerable (bnc#1107829).

   The following non-security bugs were fixed:

   - alsa: bebob: fix memory leak for M-Audio FW1814 and ProjectMix I/O at
     error path (bsc#1051510).
   - alsa: bebob: use address returned by kmalloc() instead of kernel stack
     for streaming DMA mapping (bsc#1051510).
   - alsa: emu10k1: fix possible info leak to userspace on
     SNDRV_EMU10K1_IOCTL_INFO (bsc#1051510).
   - alsa: fireworks: fix memory leak of response buffer at error path
     (bsc#1051510).
   - alsa: hda: Add AZX_DCAPS_PM_RUNTIME for AMD Raven Ridge (bsc#1051510).
   - alsa: msnd: Fix the default sample sizes (bsc#1051510).
   - alsa: pcm: Fix snd_interval_refine first/last with open min/max
     (bsc#1051510).
   - alsa: usb-audio: Fix multiple definitions in AU0828_DEVICE() macro
     (bsc#1051510).
   - ASoC: cs4265: fix MMTLR Data switch control (bsc#1051510).
   - ASoC: dapm: Fix potential DAI widget pointer deref when linking DAIs
     (bsc#1051510).
   - ASoC: rt5514: Add the I2S ASRC support (bsc#1051510).
   - ASoC: rt5514: Add the missing register in the readable table
     (bsc#1051510).
   - ASoC: rt5514: Eliminate the noise in the ASRC case (bsc#1051510).
   - ASoC: rt5514: Fix the issue of the delay volume applied (bsc#1051510).
   - ax88179_178a: Check for supported Wake-on-LAN modes (bsc#1051510).
   - block, dax: remove dead code in blkdev_writepages() (bsc#1104888).
   - block: fix warning when I/O elevator is changed as request_queue is
     being removed (bsc#1109979).
   - block: Invalidate cache on discard v2 (bsc#1109992).
   - block: pass inclusive 'lend' parameter to truncate_inode_pages_range
     (bsc#1109992).
   - block: properly protect the 'queue' kobj in blk_unregister_queue
     (bsc#1109979).
   - bluetooth: Add a new Realtek 8723DE ID 0bda:b009 (bsc#1051510).
   - bluetooth: btsdio: Do not bind to non-removable BCM43430 (bsc#1103587).
   - bluetooth: Use lock_sock_nested in bt_accept_enqueue (bsc#1051510).
   - btrfs: add a comp_refs() helper (dependency for bsc#1031392).
   - btrfs: add tracepoints for outstanding extents mods (dependency for
     bsc#1031392).
   - btrfs: check-integrity: Fix NULL pointer dereference for degraded mount
     (bsc#1107947).
   - btrfs: cleanup extent locking sequence (dependency for bsc#1031392).
   - btrfs: delayed-inode: Remove wrong qgroup meta reservation calls
     (bsc#1031392).
   - btrfs: delayed-inode: Use new qgroup meta rsv for delayed inode and item
     (bsc#1031392).
   - btrfs: fix data corruption when deduplicating between different files
     (bsc#1110647).
   - btrfs: fix duplicate extents after fsync of file with prealloc extents
     (bsc#1110644).
   - btrfs: fix fsync after hole punching when using no-holes feature
     (bsc#1110642).
   - btrfs: fix loss of prealloc extents past i_size after fsync log replay
     (bsc#1110643).
   - btrfs: fix return value on rename exchange failure (bsc#1110645).
   - btrfs: fix send failure when root has deleted files still open
     (bsc#1110650).
   - btrfs: Fix wrong btrfs_delalloc_release_extents parameter (bsc#1031392).
   - btrfs: log csums for all modified extents (bsc#1110639).
   - btrfs: make the delalloc block rsv per inode (dependency for
     bsc#1031392).
   - btrfs: qgroup: Add quick exit for non-fs extents (dependency for
     bsc#1031392).
   - btrfs: qgroup: Cleanup btrfs_qgroup_prepare_account_extents function
     (dependency for bsc#1031392).
   - btrfs: qgroup: Cleanup the remaining old reservation counters
     (bsc#1031392).
   - btrfs: qgroup: Commit transaction in advance to reduce early EDQUOT
     (bsc#1031392).
   - btrfs: qgroup: Do not use root->qgroup_meta_rsv for qgroup (bsc#1031392).
   - btrfs: qgroup: Fix qgroup reserved space underflow by only freeing
     reserved ranges (dependency for bsc#1031392).
   - btrfs: qgroup: Fix qgroup reserved space underflow caused by buffered
     write and quotas being enabled (dependency for bsc#1031392).
   - btrfs: qgroup: Fix wrong qgroup reservation update for relationship
     modification (bsc#1031392).
   - btrfs: qgroup: Introduce extent changeset for qgroup reserve functions
     (dependency for bsc#1031392).
   - btrfs: qgroup: Introduce function to convert META_PREALLOC into
     META_PERTRANS (bsc#1031392).
   - btrfs: qgroup: Introduce helpers to update and access new qgroup rsv
     (bsc#1031392).
   - btrfs: qgroup: Make qgroup_reserve and its callers to use separate
     reservation type (bsc#1031392).
   - btrfs: qgroup: Return actually freed bytes for qgroup release or free
     data (dependency for bsc#1031392).
   - btrfs: qgroup: Skeleton to support separate qgroup reservation type
     (bsc#1031392).
   - btrfs: qgroup: Split meta rsv type into meta_prealloc and meta_pertrans
     (bsc#1031392).
   - btrfs: qgroup: Update trace events for metadata reservation
     (bsc#1031392).
   - btrfs: qgroup: Update trace events to use new separate rsv types
     (bsc#1031392).
   - btrfs: qgroup: Use independent and accurate per inode qgroup rsv
     (bsc#1031392).
   - btrfs: qgroup: Use root::qgroup_meta_rsv_* to record qgroup meta
     reserved space (bsc#1031392).
   - btrfs: qgroup: Use separate meta reservation type for delalloc
     (bsc#1031392).
   - btrfs: remove type argument from comp_tree_refs (dependency for
     bsc#1031392).
   - btrfs: Remove unused parameters from various functions (bsc#1110649).
   - btrfs: rework outstanding_extents (dependency for bsc#1031392).
   - btrfs: scrub: Do not use inode page cache in
     scrub_handle_errored_block() (follow up for bsc#1108096).
   - btrfs: scrub: Do not use inode pages for device replace (follow up for
     bsc#1108096).
   - btrfs: switch args for comp_*_refs (dependency for bsc#1031392).
   - btrfs: sync log after logging new name (bsc#1110646).
   - btrfs: tests/qgroup: Fix wrong tree backref level (bsc#1107928).
   - cfg80211: reg: Init wiphy_idx in regulatory_hint_core() (bsc#1051510).
   - coresight: Handle errors in finding input/output ports (bsc#1051510).
   - crypto: clarify licensing of OpenSSL asm code ().
   - crypto: sharah - Unregister correct algorithms for SAHARA 3
     (bsc#1051510).
   - crypto: skcipher - Fix -Wstringop-truncation warnings (bsc#1051510).
   - dax: Introduce a ->copy_to_iter dax operation (bsc#1098782).
   - dax: Make extension of dax_operations transparent (bsc#1098782).
   - dax: remove default copy_from_iter fallback (bsc#1098782).
     patches.drivers/dax-remove-the-pmem_dax_ops-flush-abstraction.patch:
     Refresh
   - dax: Report bytes remaining in dax_iomap_actor() (bsc#1098782).
   - dax: require 'struct page' by default for filesystem dax (bsc#1104888).
   patches.fixes/fs-allow-per-device-dax-status-checking-for-filesystems.patch
     : Refresh
   - dax: store pfns in the radix (bsc#1104888).
   patches.fixes/fs-allow-per-device-dax-status-checking-for-filesystems.patch
     : Refresh
   - device-dax: Add missing address_space_operations (bsc#1107783).
   - device-dax: Enable page_mapping() (bsc#1107783).
   - device-dax: Set page->index (bsc#1107783).
   - doc/README.SUSE: Remove mentions of cloneconfig (bsc#1103636).
   - ext2: auto disable dax instead of failing mount (bsc#1104888).
   patches.fixes/fs-allow-per-device-dax-status-checking-for-filesystems.patch
     : Refresh patches.kabi/kabi-fixup-bdev_dax_supported.patch: Refresh
   - ext2, dax: introduce ext2_dax_aops (bsc#1104888).
   - ext4: auto disable dax instead of failing mount (bsc#1104888 ).
   patches.fixes/fs-allow-per-device-dax-status-checking-for-filesystems.patch
     : Refresh patches.kabi/kabi-fixup-bdev_dax_supported.patch: Refresh
   - ext4, dax: add ext4_bmap to ext4_dax_aops (bsc#1104888).
   - ext4, dax: introduce ext4_dax_aops (bsc#1104888).
   - ext4, dax: set ext4_dax_aops for dax files (bsc#1104888).
   - fbdev: Distinguish between interlaced and progressive modes
     (bsc#1051510).
   - fbdev/via: fix defined but not used warning (bsc#1051510).
   - filesystem-dax: Introduce dax_lock_mapping_entry() (bsc#1107783).
     patches.kabi/kabi-fixup-bdev_dax_supported.patch: Refresh
   - filesystem-dax: Set page->index (bsc#1107783).
   - Fix buggy backport in
     patches.fixes/dax-check-for-queue_flag_dax-in-bdev_dax_supported.patch
     (bsc#1109859)
   - Fix kexec forbidding kernels signed with keys in the secondary keyring
     to boot (bsc#1110006).
   - Fix sorted section Merge commits 862a718e83 and 8aa4d41564 had conflicts
     with (apparently) bad resolution which introduced disorder in the sorted
     section.
   - fs, dax: prepare for dax-specific address_space_operations
     (bsc#1104888).
   patches.fixes/fs-allow-per-device-dax-status-checking-for-filesystems.patch
     : Refresh patches.kabi/kabi-fixup-bdev_dax_supported.patch: Refresh
   - fs, dax: use page->mapping to warn if truncate collides with a busy page
     (bsc#1104888).
   - gpiolib: Mark gpio_suffixes array with __maybe_unused (bsc#1051510).
   - gpio: pxa: Fix potential NULL dereference (bsc#1051510).
   - gpu: ipu-v3: csi: pass back mbus_code_to_bus_cfg error codes
     (bsc#1051510).
   - HID: hid-ntrig: add error handling for sysfs_create_group (bsc#1051510).
   - i2c: i801: Allow ACPI AML access I/O ports not reserved for SMBus
     (bsc#1051510).
   - Input: elantech - enable middle button of touchpad on ThinkPad P72
     (bsc#1051510).
   - input: rohm_bu21023: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
     (bsc#1051510).
   - intel_th: Fix device removal logic (bsc#1051510).
   - iommu/amd: Return devid as alias for ACPI HID devices (bsc#1106105).
   - ioremap: Update pgtable free interfaces with addr (bsc#1110006).
   - ipc/shm: fix shmat() nil address after round-down when remapping
     (bsc#1090078).
   - KABI: move the new handler to end of machdep_calls and hide it from
     genksyms (bsc#1094244).
   - kprobes/x86: Release insn_slot in failure path (bsc#1110006).
   - KVM: PPC: Book3S HV: Use correct pagesize in kvm_unmap_radix()
     (bsc#1061840, git-fixes).
   - KVM: VMX: Do not allow reexecute_instruction() when skipping MMIO instr
     (bsc#1106240).
   - KVM: x86: Default to not allowing emulation retry in kvm_mmu_page_fault
     (bsc#1106240).
   - KVM: x86: Do not re-{try,execute} after failed emulation in L2
     (bsc#1106240).
   - KVM: x86: Invert emulation re-execute behavior to make it opt-in
     (bsc#1106240).
   - KVM: x86: Merge EMULTYPE_RETRY and EMULTYPE_ALLOW_REEXECUTE
     (bsc#1106240).
   - lan78xx: Check for supported Wake-on-LAN modes (bsc#1051510).
   - lib/iov_iter: Fix pipe handling in _copy_to_iter_mcsafe() (bsc#1098782).
   - libnvdimm, pmem: Fix memcpy_mcsafe() return code handling in
     nsio_rw_bytes() (bsc#1098782).
   - libnvdimm, pmem: Restore page attributes when clearing errors
     (bsc#1107783).
   - Limit kernel-source build to architectures for which we build binaries
     (bsc#1108281).
   - mac80211: fix pending queue hang due to TX_DROP (bsc#1051510).
   - mac80211: restrict delayed tailroom needed decrement (bsc#1051510).
   - mei: bus: type promotion bug in mei_nfc_if_version() (bsc#1051510).
   - mei: ignore not found client in the enumeration (bsc#1051510).
   - mfd: 88pm860x-i2c: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
     (bsc#1051510).
   - mfd: ti_am335x_tscadc: Fix struct clk memory leak (bsc#1051510).
   - mmc: sdhci: do not try to use 3.3V signaling if not supported
     (bsc#1051510).
   - mmc: sdhci-of-esdhc: set proper dma mask for ls104x chips (bsc#1051510).
   - mm, dax: introduce pfn_t_special() (bsc#1104888).
   - mm, madvise_inject_error: Disable MADV_SOFT_OFFLINE for ZONE_DEVICE
     pages (bsc#1107783).
   - mm, madvise_inject_error: Let memory_failure() optionally take a page
     reference (bsc#1107783).
   - mm, memory_failure: Collect mapping size in collect_procs()
     (bsc#1107783).
   - mm, memory_failure: Teach memory_failure() about dev_pagemap pages
     (bsc#1107783).
   - mm, numa: Migrate pages to local nodes quicker early in the lifetime of
     a task (bnc#1101669 optimise numa balancing for fast migrate).
   - mm, numa: Remove rate-limiting of automatic numa balancing migration
     (bnc#1101669 optimise numa balancing for fast migrate).
   - mm, numa: Remove rate-limiting of automatic numa balancing migration
     kabi (bnc#1101669 optimise numa balancing for fast migrate).
   - mm/vmalloc: add interfaces to free unmapped page table (bsc#1110006).
   - NFC: Fix possible memory corruption when handling SHDLC I-Frame commands
     (bsc#1051510).
   - nfs/filelayout: fix oops when freeing filelayout segment (bsc#1105190).
   - NFS/filelayout: Fix racy setting of fl->dsaddr in
     filelayout_check_deviceid() (bsc#1105190).
   - NFS: Use an appropriate work queue for direct-write completion
     (bsc#1082519).
   - parport: sunbpp: fix error return code (bsc#1051510).
   - PCI: aardvark: Size bridges before resources allocation (bsc#1109806).
   - PCI: designware: Fix I/O space page leak (bsc#1109806).
   - PCI: faraday: Add missing of_node_put() (bsc#1109806).
   - PCI: faraday: Fix I/O space page leak (bsc#1109806).
   - PCI/portdrv: Compute MSI/MSI-X IRQ vectors after final allocation
     (bsc#1109806).
   - PCI/portdrv: Factor out Interrupt Message Number lookup (bsc#1109806).
   - PCI: versatile: Fix I/O space page leak (bsc#1109806).
   - PCI: xgene: Fix I/O space page leak (bsc#1109806).
   - PCI: xilinx: Add missing of_node_put() (bsc#1109806).
   - PCI: xilinx-nwl: Add missing of_node_put() (bsc#1109806).
   - pinctrl: cannonlake: Fix HOSTSW_OWN register offset of H variant
     (bsc#1051510).
   - platform/x86: alienware-wmi: Correct a memory leak (bsc#1051510).
   - platform/x86: toshiba_acpi: Fix defined but not used build warnings
     (bsc#1051510).
   - pmem: Switch to copy_to_iter_mcsafe() (bsc#1098782).
   - powernv/pseries: consolidate code for mce early handling (bsc#1094244).
   - powerpc/fadump: cleanup crash memory ranges support (bsc#1103269).
   - powerpc/fadump: re-register firmware-assisted dump if already registered
     (bsc#1108170, bsc#1108823).
   - powerpc: Fix size calculation using resource_size() (bnc#1012382).
   - powerpc: KABI add aux_ptr to hole in paca_struct to extend it with
     additional members (bsc#1094244).
   - powerpc: KABI: move mce_data_buf into paca_aux (bsc#1094244).
   - powerpc/numa: Use associativity if VPHN hcall is successful
     (bsc#1110363).
   - powerpc/pkeys: Fix reading of ibm, processor-storage-keys property
     (bsc#1109244).
   - powerpc/powernv/npu: Do a PID GPU TLB flush when invalidating a large
     address range (bsc#1055120).
   - powerpc/pseries: Defer the logging of rtas error to irq work queue
     (bsc#1094244).
   - powerpc/pseries: Define MCE error event section (bsc#1094244).
   - powerpc/pseries: Disable CPU hotplug across migrations (bsc#1065729).
   - powerpc/pseries: Display machine check error details (bsc#1094244).
   - powerpc/pseries: Dump the SLB contents on SLB MCE errors (bsc#1094244).
     - Refresh patches.kabi/KABI-move-mce_data_buf-into-paca_aux.patch
   - powerpc/pseries: Flush SLB contents on SLB MCE errors (bsc#1094244).
   - powerpc/pseries: Remove prrn_work workqueue (bsc#1102495, bsc#1109337).
   - powerpc/pseries: Remove unneeded uses of dlpar work queue (bsc#1102495,
     bsc#1109337).
   - powerpc/tm: Avoid possible userspace r1 corruption on reclaim
     (bsc#1109333).
   - powerpc/tm: Fix userspace r13 corruption (bsc#1109333).
   - powerpc/xive: Fix trying to "push" an already active pool VP
     (bsc#1085030, git-fixes).
   - r8152: Check for supported Wake-on-LAN Modes (bsc#1051510).
   - README.BRANCH: SLE15-SP1 branch maintainer changes Add ptesarik as
     co-maintainer, keep tiwai as the primary maintainer
   - regulator: fix crash caused by null driver data (bsc#1051510).
   - rename/renumber hv patches to simplify upcoming upstream merges No code
     changes.
   - Revert "btrfs: qgroups: Retry after commit on getting EDQUOT"
     (bsc#1031392).
   - Revert "ipc/shm: Fix shmat mmap nil-page protection" (bsc#1090078).
   - rpm/mkspec: build dtbs for architectures marked -!needs_updating
   - rpm/mkspec: fix ppc64 kernel-source build.
   - s390/crypto: Fix return code checking in cbc_paes_crypt() (bnc#1108323,
     LTC#171709).
   - s390/pci: fix out of bounds access during irq setup (bnc#1108323,
     LTC#171068).
   - s390/qdio: reset old sbal_state flags (LTC#171525, bsc#1106948).
   - s390/qeth: use vzalloc for QUERY OAT buffer (LTC#171527, bsc#1106948).
   - sched/fair: Fix bandwidth timer clock drift condition (Git-fixes).
   - sched/numa: Avoid task migration for small NUMA improvement (bnc#1101669
     optimise numa balancing for fast migrate).
   - sched/numa: Pass destination CPU as a parameter to migrate_task_rq
     (bnc#1101669 optimise numa balancing for fast migrate).
   - sched/numa: Pass destination CPU as a parameter to migrate_task_rq kabi
     (bnc#1101669 optimise numa balancing for fast migrate).
   - sched/numa: Reset scan rate whenever task moves across nodes
     (bnc#1101669 optimise numa balancing for fast migrate).
   - sched/numa: Stop multiple tasks from moving to the CPU at the same time
     (bnc#1101669 optimise numa balancing for fast migrate).
   - sched/numa: Stop multiple tasks from moving to the CPU at the same time
     kabi (bnc#1101669 optimise numa balancing for fast migrate).
   - scsi: hisi_sas: Add a flag to filter PHY events during reset ().
   - scsi: hisi_sas: add memory barrier in task delivery function ().
   - scsi: hisi_sas: Add missing PHY spinlock init ().
   - scsi: hisi_sas: Add SATA FIS check for v3 hw ().
   - scsi: hisi_sas: Adjust task reject period during host reset ().
   - scsi: hisi_sas: Drop hisi_sas_slot_abort() ().
   - scsi: hisi_sas: Fix the conflict between dev gone and host reset ().
   - scsi: hisi_sas: Fix the failure of recovering PHY from STP link timeout
     ().
   - scsi: hisi_sas: Implement handlers of PCIe FLR for v3 hw ().
   - scsi: hisi_sas: Only process broadcast change in phy_bcast_v3_hw() ().
   - scsi: hisi_sas: Pre-allocate slot DMA buffers ().
   - scsi: hisi_sas: Release all remaining resources in clear nexus ha ().
   - scsi: hisi_sas: relocate some common code for v3 hw ().
   - scsi: hisi_sas: tidy channel interrupt handler for v3 hw ().
   - scsi: hisi_sas: Tidy hisi_sas_task_prep() ().
   - scsi: hisi_sas: tidy host controller reset function a bit ().
   - scsi: hisi_sas: Update a couple of register settings for v3 hw ().
   - scsi: hisi_sas: Use dmam_alloc_coherent() ().
   - scsi: ipr: System hung while dlpar adding primary ipr adapter back
     (bsc#1109336).
   - smsc75xx: Check for Wake-on-LAN modes (bsc#1051510).
   - smsc95xx: Check for Wake-on-LAN modes (bsc#1051510).
   - sort series.conf I didn't want to, but he made me do it.
   - sr9800: Check for supported Wake-on-LAN modes (bsc#1051510).
   - sr: get/drop reference to device in revalidate and check_events
     (bsc#1109979).
   - supported.conf: add test_syctl to new kselftests-kmp package As per we
     will require new FATE requests per each new selftest driver. We do not
     want to support these module on production runs but we do want to
     support them for QA / testing uses. The compromise is to package them
     into its own package, this will be the kselftests-kmp package. Selftests
     can also be used as proof of concept vehicle for issues by customers or
     ourselves. Vanilla kernels do not get test_sysctl given that driver was
     using built-in defaults, this also means we cannot run sefltests on
     config/s390x/zfcpdump which does not enable modules. Likeweise, since we
     had to *change* the kernel for test_syctl, it it also means we can't
     test test_syctl with vanilla kernels. It should be possible with other
     selftests drivers if they are present in vanilla kernels though.
   - uio, lib: Fix CONFIG_ARCH_HAS_UACCESS_MCSAFE compilation (bsc#1098782).
   - VFS: do not test owner for NFS in set_posix_acl() (bsc#1103405).
   - video: goldfishfb: fix memory leak on driver remove (bsc#1051510).
   - watchdog: Mark watchdog touch functions as notrace (git-fixes).
   - wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout()
     (bsc#1051510).
   - x86/apic: Fix restoring boot IRQ mode in reboot and kexec/kdump
     (bsc#1110006).
   - x86/apic: Split disable_IO_APIC() into two functions to fix
     CONFIG_KEXEC_JUMP=y (bsc#1110006).
   - x86/apic: Split out restore_boot_irq_mode() from disable_IO_APIC()
     (bsc#1110006).
   - x86/apic/vector: Fix off by one in error path (bsc#1110006).
   - x86/asm/memcpy_mcsafe: Add labels for __memcpy_mcsafe() write fault
     handling (bsc#1098782).
   - x86/asm/memcpy_mcsafe: Add write-protection-fault handling (bsc#1098782).
   - x86/asm/memcpy_mcsafe: Define copy_to_iter_mcsafe() (bsc#1098782).
   - x86/asm/memcpy_mcsafe: Fix copy_to_user_mcsafe() exception handling
     (bsc#1098782).
   - x86/asm/memcpy_mcsafe: Provide original memcpy_mcsafe_unrolled
     (bsc#1098782).
   - x86/asm/memcpy_mcsafe: Remove loop unrolling (bsc#1098782).
   - x86/asm/memcpy_mcsafe: Return bytes remaining (bsc#1098782).
   - x86/boot: Fix kexec booting failure in the SEV bit detection code
     (bsc#1110301).
   - x86/build/64: Force the linker to use 2MB page size (bsc#1109603).
   - x86/dumpstack: Save first regs set for the executive summary
     (bsc#1110006).
   - x86/dumpstack: Unify show_regs() (bsc#1110006).
   - x86/entry/64: Wipe KASAN stack shadow before rewind_stack_do_exit()
     (bsc#1110006).
   - x86/espfix/64: Fix espfix double-fault handling on 5-level systems
     (bsc#1110006).
   - x86/idt: Load idt early in start_secondary (bsc#1110006).
   - x86/kexec: Avoid double free_page() upon do_kexec_load() failure
     (bsc#1110006).
   - x86/mce: Fix set_mce_nospec() to avoid #GP fault (bsc#1107783).
   - x86/mce: Improve error message when kernel cannot recover (bsc#1110006).
   - x86/mce: Improve error message when kernel cannot recover (bsc#1110301).
   - x86/memory_failure: Introduce {set, clear}_mce_nospec() (bsc#1107783).
   - x86-memory_failure-Introduce-set-clear-_mce_nospec.patch: Fixup
     compilation breakage on s390 and arm due to missing clear_mce_nospec().
   - x86/mm: Add TLB purge to free pmd/pte page interfaces (bsc#1110006).
   - x86/mm: Disable ioremap free page handling on x86-PAE (bsc#1110006).
   - x86/mm: Drop TS_COMPAT on 64-bit exec() syscall (bsc#1110006).
   - x86/mm: Expand static page table for fixmap space (bsc#1110006).
   - x86/mm: Fix ELF_ET_DYN_BASE for 5-level paging (bsc#1110006).
   - x86/mm: implement free pmd/pte page interfaces (bsc#1110006).
   - x86/mm/pat: Prepare {reserve, free}_memtype() for "decoy" addresses
     (bsc#1107783).
   - x86/mpx: Do not allow MPX if we have mappings above 47-bit (bsc#1110006).
   - x86: msr-index.h: Correct SNB_C1/C3_AUTO_UNDEMOTE defines (bsc#1110006).
   - x86: msr-index.h: Correct SNB_C1/C3_AUTO_UNDEMOTE defines (bsc#1110301).
   - x86/PCI: Make broadcom_postcore_init() check acpi_disabled (bsc#1110006).
   - x86/pkeys: Do not special case protection key 0 (bsc#1110006).
   - x86/pkeys: Override pkey when moving away from PROT_EXEC (bsc#1110006).
   - x86/process: Do not mix user/kernel regs in 64bit __show_regs()
     (bsc#1110006).
   - x86/process: Re-export start_thread() (bsc#1110006).
   - x86/vdso: Fix lsl operand order (bsc#1110006).
   - x86/vdso: Fix lsl operand order (bsc#1110301).
   - xen: issue warning message when out of grant maptrack entries
     (bsc#1105795).
   - xfs, dax: introduce xfs_dax_aops (bsc#1104888).
   - xhci: Fix use after free for URB cancellation on a reallocated endpoint
     (bsc#1051510).


Special Instructions and Notes:

   Please reboot the system after installing this update.

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Live Patching 15:

      zypper in -t patch SUSE-SLE-Module-Live-Patching-15-2018-2241=1



Package List:

   - SUSE Linux Enterprise Module for Live Patching 15 (ppc64le x86_64):

      kernel-default-debuginfo-4.12.14-25.22.1
      kernel-default-debugsource-4.12.14-25.22.1
      kernel-default-livepatch-4.12.14-25.22.1
      kernel-livepatch-4_12_14-25_22-default-1-1.3.1
      kernel-livepatch-4_12_14-25_22-default-debuginfo-1-1.3.1


References:

   https://www.suse.com/security/cve/CVE-2018-14633.html
   https://www.suse.com/security/cve/CVE-2018-17182.html
   https://bugzilla.suse.com/1012382
   https://bugzilla.suse.com/1031392
   https://bugzilla.suse.com/1051510
   https://bugzilla.suse.com/1055120
   https://bugzilla.suse.com/1061840
   https://bugzilla.suse.com/1065729
   https://bugzilla.suse.com/1082519
   https://bugzilla.suse.com/1085030
   https://bugzilla.suse.com/1090078
   https://bugzilla.suse.com/1094244
   https://bugzilla.suse.com/1098782
   https://bugzilla.suse.com/1101669
   https://bugzilla.suse.com/1102495
   https://bugzilla.suse.com/1103269
   https://bugzilla.suse.com/1103405
   https://bugzilla.suse.com/1103587
   https://bugzilla.suse.com/1103636
   https://bugzilla.suse.com/1104888
   https://bugzilla.suse.com/1105190
   https://bugzilla.suse.com/1105795
   https://bugzilla.suse.com/1106105
   https://bugzilla.suse.com/1106240
   https://bugzilla.suse.com/1106948
   https://bugzilla.suse.com/1107783
   https://bugzilla.suse.com/1107829
   https://bugzilla.suse.com/1107928
   https://bugzilla.suse.com/1107947
   https://bugzilla.suse.com/1108096
   https://bugzilla.suse.com/1108170
   https://bugzilla.suse.com/1108281
   https://bugzilla.suse.com/1108323
   https://bugzilla.suse.com/1108399
   https://bugzilla.suse.com/1108823
   https://bugzilla.suse.com/1109244
   https://bugzilla.suse.com/1109333
   https://bugzilla.suse.com/1109336
   https://bugzilla.suse.com/1109337
   https://bugzilla.suse.com/1109603
   https://bugzilla.suse.com/1109806
   https://bugzilla.suse.com/1109859
   https://bugzilla.suse.com/1109979
   https://bugzilla.suse.com/1109992
   https://bugzilla.suse.com/1110006
   https://bugzilla.suse.com/1110301
   https://bugzilla.suse.com/1110363
   https://bugzilla.suse.com/1110639
   https://bugzilla.suse.com/1110642
   https://bugzilla.suse.com/1110643
   https://bugzilla.suse.com/1110644
   https://bugzilla.suse.com/1110645
   https://bugzilla.suse.com/1110646
   https://bugzilla.suse.com/1110647
   https://bugzilla.suse.com/1110649
   https://bugzilla.suse.com/1110650


- --------------------------------------------------------------------------------


   SUSE Security Update: Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP3)
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:3164-1
Rating:             important
References:         #1107832 #1110233 
Cross-References:   CVE-2018-14633 CVE-2018-17182
Affected Products:
                    SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________

   An update that fixes two vulnerabilities is now available.

Description:

   This update for the Linux Kernel 4.4.131-94_29 fixes several issues.

   The following security issues were fixed:

   - CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c
     mishandled sequence number overflows. An attacker can trigger a
     use-after-free (and possibly gain privileges) via certain thread
     creation, map, unmap, invalidation, and dereference operations
     (bsc#1110233).
   - CVE-2018-14633: A security flaw was found in the
     chap_server_compute_md5() function in the ISCSI target code in a way an
     authentication request from an ISCSI initiator is processed. An
     unauthenticated remote attacker can cause a stack buffer overflow and
     smash up to 17 bytes of the stack. The attack requires the iSCSI target
     to be enabled on the victim host. Depending on how the target's code was
     built (i.e. depending on a compiler, compile flags and hardware
     architecture) an attack may lead to a system crash and thus to a
     denial-of-service or possibly to a non-authorized access to data
     exported by an iSCSI target. Due to the nature of the flaw, privilege
     escalation cannot be fully ruled out, although we believe it is highly
     unlikely. (bsc#1107832).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Live Patching 12-SP3:

      zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-2250=1 SUSE-SLE-Live-Patching-12-SP3-2018-2251=1 SUSE-SLE-Live-Patching-12-SP3-2018-2252=1 SUSE-SLE-Live-Patching-12-SP3-2018-2253=1 SUSE-SLE-Live-Patching-12-SP3-2018-2254=1 SUSE-SLE-Live-Patching-12-SP3-2018-2255=1 SUSE-SLE-Live-Patching-12-SP3-2018-2256=1 SUSE-SLE-Live-Patching-12-SP3-2018-2257=1 SUSE-SLE-Live-Patching-12-SP3-2018-2258=1 SUSE-SLE-Live-Patching-12-SP3-2018-2259=1 SUSE-SLE-Live-Patching-12-SP3-2018-2260=1 SUSE-SLE-Live-Patching-12-SP3-2018-2261=1 SUSE-SLE-Live-Patching-12-SP3-2018-2262=1 SUSE-SLE-Live-Patching-12-SP3-2018-2263=1



Package List:

   - SUSE Linux Enterprise Live Patching 12-SP3 (ppc64le x86_64):

      kgraft-patch-4_4_103-6_33-default-10-2.1
      kgraft-patch-4_4_103-6_33-default-debuginfo-10-2.1
      kgraft-patch-4_4_103-6_38-default-10-2.1
      kgraft-patch-4_4_103-6_38-default-debuginfo-10-2.1
      kgraft-patch-4_4_114-94_11-default-8-2.1
      kgraft-patch-4_4_114-94_11-default-debuginfo-8-2.1
      kgraft-patch-4_4_114-94_14-default-8-2.1
      kgraft-patch-4_4_114-94_14-default-debuginfo-8-2.1
      kgraft-patch-4_4_120-94_17-default-7-2.1
      kgraft-patch-4_4_120-94_17-default-debuginfo-7-2.1
      kgraft-patch-4_4_126-94_22-default-7-2.1
      kgraft-patch-4_4_126-94_22-default-debuginfo-7-2.1
      kgraft-patch-4_4_131-94_29-default-5-2.1
      kgraft-patch-4_4_131-94_29-default-debuginfo-5-2.1
      kgraft-patch-4_4_132-94_33-default-5-2.1
      kgraft-patch-4_4_132-94_33-default-debuginfo-5-2.1
      kgraft-patch-4_4_138-94_39-default-4-2.1
      kgraft-patch-4_4_138-94_39-default-debuginfo-4-2.1
      kgraft-patch-4_4_140-94_42-default-4-2.1
      kgraft-patch-4_4_140-94_42-default-debuginfo-4-2.1
      kgraft-patch-4_4_143-94_47-default-3-2.1
      kgraft-patch-4_4_143-94_47-default-debuginfo-3-2.1
      kgraft-patch-4_4_155-94_50-default-2-2.1
      kgraft-patch-4_4_155-94_50-default-debuginfo-2-2.1
      kgraft-patch-4_4_92-6_30-default-10-2.1
      kgraft-patch-4_4_92-6_30-default-debuginfo-10-2.1

   - SUSE Linux Enterprise Live Patching 12-SP3 (x86_64):

      kgraft-patch-4_4_92-6_18-default-11-2.1
      kgraft-patch-4_4_92-6_18-default-debuginfo-11-2.1


References:

   https://www.suse.com/security/cve/CVE-2018-14633.html
   https://www.suse.com/security/cve/CVE-2018-17182.html
   https://bugzilla.suse.com/1107832
   https://bugzilla.suse.com/1110233


- --------------------------------------------------------------------------------


   SUSE Security Update: Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP1)
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:3171-1
Rating:             important
References:         #1107832 #1108963 #1110233 
Cross-References:   CVE-2018-14633 CVE-2018-14634 CVE-2018-17182
                   
Affected Products:
                    SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

   An update that fixes three vulnerabilities is now available.

Description:

   This update for the Linux Kernel 3.12.74-60_64_82 fixes several issues.

   The following security issues were fixed:

   - CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c
     mishandled sequence number overflows. An attacker can trigger a
     use-after-free (and possibly gain privileges) via certain thread
     creation, map, unmap, invalidation, and dereference operations
     (bsc#1110233).
   - CVE-2018-14634: An unprivileged local user with access to SUID (or
     otherwise privileged) binary could use this flaw to escalate their
     privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are
     believed to be vulnerable (bsc#1108963).
   - CVE-2018-14633: A security flaw was found in the
     chap_server_compute_md5() function in the ISCSI target code in a way an
     authentication request from an ISCSI initiator is processed. An
     unauthenticated remote attacker can cause a stack buffer overflow and
     smash up to 17 bytes of the stack. The attack requires the iSCSI target
     to be enabled on the victim host. Depending on how the target's code was
     built (i.e. depending on a compiler, compile flags and hardware
     architecture) an attack may lead to a system crash and thus to a
     denial-of-service or possibly to a non-authorized access to data
     exported by an iSCSI target. Due to the nature of the flaw, privilege
     escalation cannot be fully ruled out, although we believe it is highly
     unlikely. (bsc#1107832).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-SP1-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-2266=1 
      SUSE-SLE-SERVER-12-SP1-2018-2267=1 SUSE-SLE-SERVER-12-SP1-2018-2268=1 
      SUSE-SLE-SERVER-12-SP1-2018-2269=1 SUSE-SLE-SERVER-12-SP1-2018-2270=1 
      SUSE-SLE-SERVER-12-SP1-2018-2271=1 SUSE-SLE-SERVER-12-SP1-2018-2272=1 
      SUSE-SLE-SERVER-12-SP1-2018-2273=1 SUSE-SLE-SERVER-12-SP1-2018-2275=1



Package List:

   - SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

      kgraft-patch-3_12_74-60_64_63-default-10-2.1
      kgraft-patch-3_12_74-60_64_63-xen-10-2.1
      kgraft-patch-3_12_74-60_64_66-default-9-2.1
      kgraft-patch-3_12_74-60_64_66-xen-9-2.1
      kgraft-patch-3_12_74-60_64_69-default-8-2.1
      kgraft-patch-3_12_74-60_64_69-xen-8-2.1
      kgraft-patch-3_12_74-60_64_82-default-8-2.1
      kgraft-patch-3_12_74-60_64_82-xen-8-2.1
      kgraft-patch-3_12_74-60_64_85-default-8-2.1
      kgraft-patch-3_12_74-60_64_85-xen-8-2.1
      kgraft-patch-3_12_74-60_64_88-default-6-2.1
      kgraft-patch-3_12_74-60_64_88-xen-6-2.1
      kgraft-patch-3_12_74-60_64_93-default-5-2.1
      kgraft-patch-3_12_74-60_64_93-xen-5-2.1
      kgraft-patch-3_12_74-60_64_96-default-5-2.1
      kgraft-patch-3_12_74-60_64_96-xen-5-2.1
      kgraft-patch-3_12_74-60_64_99-default-4-2.1
      kgraft-patch-3_12_74-60_64_99-xen-4-2.1


References:

   https://www.suse.com/security/cve/CVE-2018-14633.html
   https://www.suse.com/security/cve/CVE-2018-14634.html
   https://www.suse.com/security/cve/CVE-2018-17182.html
   https://bugzilla.suse.com/1107832
   https://bugzilla.suse.com/1108963
   https://bugzilla.suse.com/1110233


- --------------------------------------------------------------------------------


   SUSE Security Update: Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP1)
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:3172-1
Rating:             important
References:         #1102682 #1107832 #1110233 
Cross-References:   CVE-2018-14633 CVE-2018-17182 CVE-2018-5390
                   
Affected Products:
                    SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

   An update that fixes three vulnerabilities is now available.

Description:

   This update for the Linux Kernel 3.12.74-60_64_104 fixes several issues.

   The following security issues were fixed:

   - CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c
     mishandled sequence number overflows. An attacker can trigger a
     use-after-free (and possibly gain privileges) via certain thread
     creation, map, unmap, invalidation, and dereference operations
     (bsc#1110233).
   - CVE-2018-14633: A security flaw was found in the
     chap_server_compute_md5() function in the ISCSI target code in a way an
     authentication request from an ISCSI initiator is processed. An
     unauthenticated remote attacker can cause a stack buffer overflow and
     smash up to 17 bytes of the stack. The attack requires the iSCSI target
     to be enabled on the victim host. Depending on how the target's code was
     built (i.e. depending on a compiler, compile flags and hardware
     architecture) an attack may lead to a system crash and thus to a
     denial-of-service or possibly to a non-authorized access to data
     exported by an iSCSI target. Due to the nature of the flaw, privilege
     escalation cannot be fully ruled out, although we believe it is highly
     unlikely. (bsc#1107832).
   - CVE-2018-5390: The Linux kernel could be forced to make very expensive
     calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every
     incoming packet which can lead to a denial of service (bsc#1102682).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-SP1-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-2274=1



Package List:

   - SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

      kgraft-patch-3_12_74-60_64_104-default-2-2.1
      kgraft-patch-3_12_74-60_64_104-xen-2-2.1


References:

   https://www.suse.com/security/cve/CVE-2018-14633.html
   https://www.suse.com/security/cve/CVE-2018-17182.html
   https://www.suse.com/security/cve/CVE-2018-5390.html
   https://bugzilla.suse.com/1102682
   https://bugzilla.suse.com/1107832
   https://bugzilla.suse.com/1110233


- --------------------------------------------------------------------------------


   SUSE Security Update: Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP2)
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:3173-1
Rating:             important
References:         #1107832 #1110233 
Cross-References:   CVE-2018-14633 CVE-2018-17182
Affected Products:
                    SUSE Linux Enterprise Server for SAP 12-SP2
                    SUSE Linux Enterprise Server 12-SP2-LTSS
______________________________________________________________________________

   An update that fixes two vulnerabilities is now available.

Description:

   This update for the Linux Kernel 4.4.121-92_80 fixes several issues.

   The following security issues were fixed:

   - CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c
     mishandled sequence number overflows. An attacker can trigger a
     use-after-free (and possibly gain privileges) via certain thread
     creation, map, unmap, invalidation, and dereference operations
     (bsc#1110233).
   - CVE-2018-14633: A security flaw was found in the
     chap_server_compute_md5() function in the ISCSI target code in a way an
     authentication request from an ISCSI initiator is processed. An
     unauthenticated remote attacker can cause a stack buffer overflow and
     smash up to 17 bytes of the stack. The attack requires the iSCSI target
     to be enabled on the victim host. Depending on how the target's code was
     built (i.e. depending on a compiler, compile flags and hardware
     architecture) an attack may lead to a system crash and thus to a
     denial-of-service or possibly to a non-authorized access to data
     exported by an iSCSI target. Due to the nature of the flaw, privilege
     escalation cannot be fully ruled out, although we believe it is highly
     unlikely. (bsc#1107832).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server for SAP 12-SP2:

      zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-2276=1 
      SUSE-SLE-SAP-12-SP2-2018-2277=1 SUSE-SLE-SAP-12-SP2-2018-2278=1 
      SUSE-SLE-SAP-12-SP2-2018-2279=1 SUSE-SLE-SAP-12-SP2-2018-2280=1 
      SUSE-SLE-SAP-12-SP2-2018-2281=1 SUSE-SLE-SAP-12-SP2-2018-2282=1 
      SUSE-SLE-SAP-12-SP2-2018-2283=1 SUSE-SLE-SAP-12-SP2-2018-2284=1 
      SUSE-SLE-SAP-12-SP2-2018-2285=1 SUSE-SLE-SAP-12-SP2-2018-2286=1

   - SUSE Linux Enterprise Server 12-SP2-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-2276=1 
      SUSE-SLE-SERVER-12-SP2-2018-2277=1 SUSE-SLE-SERVER-12-SP2-2018-2278=1 
      SUSE-SLE-SERVER-12-SP2-2018-2279=1 SUSE-SLE-SERVER-12-SP2-2018-2280=1 
      SUSE-SLE-SERVER-12-SP2-2018-2281=1 SUSE-SLE-SERVER-12-SP2-2018-2282=1 
      SUSE-SLE-SERVER-12-SP2-2018-2283=1 SUSE-SLE-SERVER-12-SP2-2018-2284=1 
      SUSE-SLE-SERVER-12-SP2-2018-2285=1 SUSE-SLE-SERVER-12-SP2-2018-2286=1



Package List:

   - SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):

      kgraft-patch-4_4_103-92_53-default-10-2.1
      kgraft-patch-4_4_103-92_56-default-10-2.1
      kgraft-patch-4_4_114-92_64-default-8-2.1
      kgraft-patch-4_4_114-92_67-default-8-2.1
      kgraft-patch-4_4_120-92_70-default-7-2.1
      kgraft-patch-4_4_121-92_73-default-6-2.1
      kgraft-patch-4_4_121-92_80-default-6-2.1
      kgraft-patch-4_4_121-92_85-default-4-2.1
      kgraft-patch-4_4_121-92_92-default-4-2.1
      kgraft-patch-4_4_90-92_45-default-11-2.1
      kgraft-patch-4_4_90-92_50-default-11-2.1

   - SUSE Linux Enterprise Server 12-SP2-LTSS (x86_64):

      kgraft-patch-4_4_103-92_53-default-10-2.1
      kgraft-patch-4_4_103-92_56-default-10-2.1
      kgraft-patch-4_4_114-92_64-default-8-2.1
      kgraft-patch-4_4_114-92_67-default-8-2.1
      kgraft-patch-4_4_120-92_70-default-7-2.1
      kgraft-patch-4_4_121-92_73-default-6-2.1
      kgraft-patch-4_4_121-92_80-default-6-2.1
      kgraft-patch-4_4_121-92_85-default-4-2.1
      kgraft-patch-4_4_121-92_92-default-4-2.1
      kgraft-patch-4_4_90-92_45-default-11-2.1
      kgraft-patch-4_4_90-92_50-default-11-2.1


References:

   https://www.suse.com/security/cve/CVE-2018-14633.html
   https://www.suse.com/security/cve/CVE-2018-17182.html
   https://bugzilla.suse.com/1107832
   https://bugzilla.suse.com/1110233

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBW8bNVWaOgq3Tt24GAQgr+hAAkvDRc/4E6HSfGr5qe6U2pIbpjZ4zUnRS
9uq11+H0JWNCua+g7c4ZTtPAAwL4+3pJlN4p5oxZecTN0AHsrNxc5VQjLRghny9p
JgiXL5XdjILgBNqpSfRMYgK/9+vpTA5OjZsmbyjxbMfoUoMauIr5DLY3hldMxn5W
4AXtYmlTz07wuyohooV4Dcg4yOl4JzDDOoutSrCk1XfYiRK+LLZ7SzBLypble6Lw
znDOZBVWGkkuiGdtgYunTS/jd39V5zIqVqZkMif7eRN73Pk8K2IHPjKeVG4+2dQY
syL0US1+2uAlq7UAOPEb/h9VbyxVEHLuflfzGTHpnj/aBVMNLXRLHnkd4LunRra4
oVtR612/8Kv0giTAKyKv/+tmUrUCkqNz0owu7mZ6jTi0tNj0tE0WSTcYVbmtgMVs
X32ReuCfK+Np74eEbohMWK3+Shx4L08sMfnFZHlVnu/rd6Nxzy4QkQpZMh/ZCTsd
JVqKRi7poq03+RcYjVAAdjHcnYiaTcpl8LAn0hFX80Eg7CitAgvzx7wAe4UBhXxd
X7moaFf0T50wD2Mn6NRLJ55epxQB5Yw6K0nM3A0c/Yexgj1IJrmQtAReNWbHWMBv
Z8DHxn4ZS+8/FzUoTvkkEf358r4iyFqD7iiMpqgZblm3oviFPcSzEZh7lvR45Rw2
GmvMUbJDWH8=
=VHVm
-----END PGP SIGNATURE-----