SUSE Security Update: Security update for the Linux Kernel (Live Patch 32 for SLE 12)
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:2787-1
Rating:             important
References:         #1102682 #1103203 #1105323 
Cross-References:   CVE-2018-10902 CVE-2018-5390
Affected Products:
                    SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

   An update that solves two vulnerabilities and has one
   errata is now available.

Description:

   This update for the Linux Kernel 3.12.61-52_122 fixes several issues.

   The following security issues were fixed:

   - CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue()
     and tcp_prune_ofo_queue() for every incoming TCP packet which can lead
     to a denial of service (bsc#1102682).
   - CVE-2018-10902: It was found that the raw midi kernel driver did not
     protect against concurrent access which lead to a double realloc (double
     free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(),
     allowing a malicious local attacker to use this for privilege escalation
     (bsc#1105323).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-2018-1951=1 SUSE-SLE-SERVER-12-2018-1952=1 SUSE-SLE-SERVER-12-2018-1953=1 SUSE-SLE-SERVER-12-2018-1954=1 SUSE-SLE-SERVER-12-2018-1955=1 SUSE-SLE-SERVER-12-2018-1956=1 SUSE-SLE-SERVER-12-2018-1957=1 SUSE-SLE-SERVER-12-2018-1958=1 SUSE-SLE-SERVER-12-2018-1959=1 SUSE-SLE-SERVER-12-2018-1960=1 SUSE-SLE-SERVER-12-2018-1961=1



Package List:

   - SUSE Linux Enterprise Server 12-LTSS (x86_64):

      kgraft-patch-3_12_61-52_101-default-9-2.1
      kgraft-patch-3_12_61-52_101-xen-9-2.1
      kgraft-patch-3_12_61-52_106-default-9-2.1
      kgraft-patch-3_12_61-52_106-xen-9-2.1
      kgraft-patch-3_12_61-52_111-default-8-2.1
      kgraft-patch-3_12_61-52_111-xen-8-2.1
      kgraft-patch-3_12_61-52_119-default-8-2.1
      kgraft-patch-3_12_61-52_119-xen-8-2.1
      kgraft-patch-3_12_61-52_122-default-8-2.1
      kgraft-patch-3_12_61-52_122-xen-8-2.1
      kgraft-patch-3_12_61-52_125-default-7-2.1
      kgraft-patch-3_12_61-52_125-xen-7-2.1
      kgraft-patch-3_12_61-52_128-default-5-2.1
      kgraft-patch-3_12_61-52_128-xen-5-2.1
      kgraft-patch-3_12_61-52_133-default-4-2.1
      kgraft-patch-3_12_61-52_133-xen-4-2.1
      kgraft-patch-3_12_61-52_136-default-4-2.1
      kgraft-patch-3_12_61-52_136-xen-4-2.1
      kgraft-patch-3_12_61-52_141-default-3-2.1
      kgraft-patch-3_12_61-52_141-xen-3-2.1
      kgraft-patch-3_12_61-52_92-default-11-2.1
      kgraft-patch-3_12_61-52_92-xen-11-2.1


References:

   https://www.suse.com/security/cve/CVE-2018-10902.html
   https://www.suse.com/security/cve/CVE-2018-5390.html
   https://bugzilla.suse.com/1102682
   https://bugzilla.suse.com/1103203
   https://bugzilla.suse.com/1105323

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2018:2787-1 important: the Linux Kernel (Live Patch 32 for SLE 12)

September 21, 2018
An update that solves two vulnerabilities and has one errata is now available

Summary

This update for the Linux Kernel 3.12.61-52_122 fixes several issues. The following security issues were fixed: - CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682). - CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2018-1951=1 SUSE-SLE-SERVER-12-2018-1952=1 SUSE-SLE-SERVER-12-2018-1953=1 SUSE-SLE-SERVER-12-2018-1954=1 SUSE-SLE-SERVER-12-2018-1955=1 SUSE-SLE-SERVER-12-2018-1956=1 SUSE-SLE-SERVER-12-2018-1957=1 SUSE-SLE-SERVER-12-2018-1958=1 SUSE-SLE-SERVER-12-2018-1959=1 SUSE-SLE-SERVER-12-2018-1960=1 SUSE-SLE-SERVER-12-2018-1961=1 Package List: - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_61-52_101-default-9-2.1 kgraft-patch-3_12_61-52_101-xen-9-2.1 kgraft-patch-3_12_61-52_106-default-9-2.1 kgraft-patch-3_12_61-52_106-xen-9-2.1 kgraft-patch-3_12_61-52_111-default-8-2.1 kgraft-patch-3_12_61-52_111-xen-8-2.1 kgraft-patch-3_12_61-52_119-default-8-2.1 kgraft-patch-3_12_61-52_119-xen-8-2.1 kgraft-patch-3_12_61-52_122-default-8-2.1 kgraft-patch-3_12_61-52_122-xen-8-2.1 kgraft-patch-3_12_61-52_125-default-7-2.1 kgraft-patch-3_12_61-52_125-xen-7-2.1 kgraft-patch-3_12_61-52_128-default-5-2.1 kgraft-patch-3_12_61-52_128-xen-5-2.1 kgraft-patch-3_12_61-52_133-default-4-2.1 kgraft-patch-3_12_61-52_133-xen-4-2.1 kgraft-patch-3_12_61-52_136-default-4-2.1 kgraft-patch-3_12_61-52_136-xen-4-2.1 kgraft-patch-3_12_61-52_141-default-3-2.1 kgraft-patch-3_12_61-52_141-xen-3-2.1 kgraft-patch-3_12_61-52_92-default-11-2.1 kgraft-patch-3_12_61-52_92-xen-11-2.1

References

#1102682 #1103203 #1105323

Cross- CVE-2018-10902 CVE-2018-5390

Affected Products:

SUSE Linux Enterprise Server 12-LTSS

https://www.suse.com/security/cve/CVE-2018-10902.html

https://www.suse.com/security/cve/CVE-2018-5390.html

https://bugzilla.suse.com/1102682

https://bugzilla.suse.com/1103203

https://bugzilla.suse.com/1105323

Severity
Announcement ID: SUSE-SU-2018:2787-1
Rating: important

Related News