[SUSE-SU-2018:2960-1] Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP1)
Severity
Important
Affected Packages
20
CVEs
2
Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP1)
This update for the Linux Kernel 3.12.74-60_64_63 fixes several issues.
The following security issues were fixed:
- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).
- ID
- SUSE-SU-2018:2960-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2018/suse-su-20182960-1/
- Published
-
2018-10-01T12:02:50
(6 years ago) - Modified
-
2018-10-01T12:02:50
(6 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2018-1049
- ALAS2-2018-1050
- ASA-201808-4
- ASA-201808-5
- ASA-201808-6
- ASA-201808-7
- CISCO-SA-20180824-LINUX-TCP
- DSA-4266-1
- DSA-4308-1
- ELSA-2018-2384
- ELSA-2018-2390
- ELSA-2018-3083
- ELSA-2018-4189
- ELSA-2018-4190
- ELSA-2018-4216
- ELSA-2018-4299
- ELSA-2018-4300
- ELSA-2019-0415
- ELSA-2019-4316
- RHSA-2018:2384
- RHSA-2018:2390
- RHSA-2018:2395
- RHSA-2018:3083
- RHSA-2018:3096
- RHSA-2019:0415
- SUSE-SU-2018:2222-1
- SUSE-SU-2018:2223-1
- SUSE-SU-2018:2328-1
- SUSE-SU-2018:2344-1
- SUSE-SU-2018:2344-2
- SUSE-SU-2018:2374-1
- SUSE-SU-2018:2472-1
- SUSE-SU-2018:2474-1
- SUSE-SU-2018:2538-1
- SUSE-SU-2018:2539-1
- SUSE-SU-2018:2596-1
- SUSE-SU-2018:2775-1
- SUSE-SU-2018:2776-1
- SUSE-SU-2018:2787-1
- SUSE-SU-2018:2858-1
- SUSE-SU-2018:2860-1
- SUSE-SU-2018:2862-1
- SUSE-SU-2018:2864-1
- SUSE-SU-2018:2879-1
- SUSE-SU-2018:2907-1
- SUSE-SU-2018:2908-1
- SUSE-SU-2018:2908-2
- SUSE-SU-2018:2940-1
- SUSE-SU-2018:2961-1
- SUSE-SU-2018:2962-1
- SUSE-SU-2018:2963-1
- SUSE-SU-2018:3029-1
- SUSE-SU-2018:3083-1
- SUSE-SU-2018:3084-1
- SUSE-SU-2018:3088-1
- SUSE-SU-2018:3172-1
- SUSE-SU-2018:3265-1
- SUSE-SU-2018:3328-1
- SUSE-SU-2018:3470-1
- SUSE-SU-2018:3789-1
- SUSE-SU-2018:3961-1
- SUSE-SU-2019:0955-1
- SUSE-SU-2019:1425-1
- SUSE-SU-2019:1767-1
- SUSE-SU-2019:1870-1
- SUSE-SU-2019:2230-1
- SUSE-SU-2019:2601-1
- SUSE-SU-2019:2821-1
- SUSE-SU-2021:0452-1
- USN-3732-1
- USN-3732-2
- USN-3741-1
- USN-3741-2
- USN-3742-1
- USN-3742-2
- USN-3763-1
- USN-3776-1
- USN-3776-2
- USN-3847-1
- USN-3847-2
- USN-3847-3
- USN-3849-1
- USN-3849-2
- VU:962459
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings | https://www.suse.com/support/security/rating/ | |
Suse | URL of this CSAF notice | https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2960-1.json | |
Suse | URL for SUSE-SU-2018:2960-1 | https://www.suse.com/support/update/announcement/2018/suse-su-20182960-1/ | |
Suse | E-Mail link for SUSE-SU-2018:2960-1 | https://lists.suse.com/pipermail/sle-security-updates/2018-October/004628.html | |
Bugzilla | SUSE Bug 1102682 | https://bugzilla.suse.com/1102682 | |
Bugzilla | SUSE Bug 1103203 | https://bugzilla.suse.com/1103203 | |
Bugzilla | SUSE Bug 1105323 | https://bugzilla.suse.com/1105323 | |
CVE | SUSE CVE CVE-2018-10902 page | https://www.suse.com/security/cve/CVE-2018-10902/ | |
CVE | SUSE CVE CVE-2018-5390 page | https://www.suse.com/security/cve/CVE-2018-5390/ |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_99-xen?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_99-xen | < 3-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_99-default?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_99-default | < 3-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_96-xen?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_96-xen | < 4-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_96-default?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_96-default | < 4-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_93-xen?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_93-xen | < 4-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_93-default?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_93-default | < 4-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_88-xen?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_88-xen | < 5-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_88-default?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_88-default | < 5-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_85-xen?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_85-xen | < 7-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_85-default?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_85-default | < 7-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_82-xen?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_82-xen | < 7-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_82-default?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_82-default | < 7-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_69-xen?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_69-xen | < 7-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_69-default?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_69-default | < 7-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_66-xen?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_66-xen | < 8-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_66-default?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_66-default | < 8-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_63-xen?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_63-xen | < 9-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_63-default?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_63-default | < 9-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_60-xen?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_60-xen | < 11-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_60-default?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_60-default | < 11-2.1 | sles-12 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |