The SUSE Linux Enterprise 12 SP3 RT kernel was updated to 4.4.128 to receive
various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-10124: The kill_something_info function in kernel/signal.c might
have allowed local users to cause a denial of service via an INT_MIN argument
(bnc#1089752).
- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed
local users to cause a denial of service by triggering an attempted use of the
-INT_MIN value (bnc#1089608).
- CVE-2017-18257: The __get_data_block function in fs/f2fs/data.c allowed local
users to cause a denial of service (integer overflow and loop) via crafted use
of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl
(bnc#1088241)
- CVE-2018-1091: In the flush_tmregs_to_thread function in
arch/powerpc/kernel/ptrace.c, a guest kernel crash can be triggered from
unprivileged userspace during a core dump on a POWER host due to a missing
processor feature check and an erroneous use of transactional memory (TM)
instructions in the core dump path, leading to a denial of service
(bnc#1087231).
- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel
function could have been exploited by malicious NCPFS servers to crash the
kernel or execute code (bnc#1086162).
- CVE-2018-8043: The unimac_mdio_probe function in
drivers/net/phy/mdio-bcm-unimac.c did not validate certain resource
availability, which allowed local users to cause a denial of service (NULL
pointer dereference) (bnc#1084829).
- CVE-2018-7740: The resv_map_release function in mm/hugetlb.c allowed local
users to cause a denial of service (BUG) via a crafted application that made
mmap system calls and has a large pgoff argument to the remap_file_pages system
call (bnc#1084353).
The following non-security bugs were fixed:
- Fix ltp might_sleep() splat BUG
- ACPI / PMIC: xpower: Fix power_table addresses (bnc#1012382).
- ACPI, PCI, irq: remove...