[SUSE-SU-2018:2960-1] Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP1)

Severity Important
Affected Packages 20
CVEs 2

Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP1)

This update for the Linux Kernel 3.12.74-60_64_63 fixes several issues.

The following security issues were fixed:

  • CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).
  • CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).
Package Affected Version
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_99-xen?arch=x86_64&distro=sles-12&sp=1 < 3-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_99-default?arch=x86_64&distro=sles-12&sp=1 < 3-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_96-xen?arch=x86_64&distro=sles-12&sp=1 < 4-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_96-default?arch=x86_64&distro=sles-12&sp=1 < 4-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_93-xen?arch=x86_64&distro=sles-12&sp=1 < 4-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_93-default?arch=x86_64&distro=sles-12&sp=1 < 4-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_88-xen?arch=x86_64&distro=sles-12&sp=1 < 5-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_88-default?arch=x86_64&distro=sles-12&sp=1 < 5-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_85-xen?arch=x86_64&distro=sles-12&sp=1 < 7-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_85-default?arch=x86_64&distro=sles-12&sp=1 < 7-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_82-xen?arch=x86_64&distro=sles-12&sp=1 < 7-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_82-default?arch=x86_64&distro=sles-12&sp=1 < 7-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_69-xen?arch=x86_64&distro=sles-12&sp=1 < 7-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_69-default?arch=x86_64&distro=sles-12&sp=1 < 7-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_66-xen?arch=x86_64&distro=sles-12&sp=1 < 8-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_66-default?arch=x86_64&distro=sles-12&sp=1 < 8-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_63-xen?arch=x86_64&distro=sles-12&sp=1 < 9-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_63-default?arch=x86_64&distro=sles-12&sp=1 < 9-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_60-xen?arch=x86_64&distro=sles-12&sp=1 < 11-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_60-default?arch=x86_64&distro=sles-12&sp=1 < 11-2.1
ID
SUSE-SU-2018:2960-1
Severity
important
URL
https://www.suse.com/support/update/announcement/2018/suse-su-20182960-1/
Published
2018-10-01T12:02:50
(6 years ago)
Modified
2018-10-01T12:02:50
(6 years ago)
Rights
Copyright 2024 SUSE LLC. All rights reserved.
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_99-xen?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_99-xen < 3-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_99-default?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_99-default < 3-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_96-xen?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_96-xen < 4-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_96-default?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_96-default < 4-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_93-xen?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_93-xen < 4-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_93-default?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_93-default < 4-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_88-xen?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_88-xen < 5-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_88-default?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_88-default < 5-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_85-xen?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_85-xen < 7-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_85-default?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_85-default < 7-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_82-xen?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_82-xen < 7-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_82-default?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_82-default < 7-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_69-xen?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_69-xen < 7-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_69-default?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_69-default < 7-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_66-xen?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_66-xen < 8-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_66-default?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_66-default < 8-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_63-xen?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_63-xen < 9-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_63-default?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_63-default < 9-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_60-xen?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_60-xen < 11-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_60-default?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_60-default < 11-2.1 sles-12 x86_64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...