Details
-
Bug
-
Resolution: Fixed
-
Major
-
None
-
None
-
3
-
9223372036854775807
Description
The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.143-94.47.1 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-5390 aka "SegmentSmack": Linux kernel could be forced to make
very expensive calls to tcp_collapse_ofo_queue() and
tcp_prune_ofo_queue() for every incoming packet which can lead to a
denial of service (bnc#1102340). - CVE-2018-14734: drivers/infiniband/core/ucma.c in the Linux kernel
allowed ucma_leave_multicast to access a certain data structure after a
cleanup step in ucma_process_join, which allowed attackers to cause a
denial of service (use-after-free) (bnc#1103119). - CVE-2017-18344: The timer_create syscall implementation in
kernel/time/posix-timers.c didn't properly validate the
sigevent->sigev_notify field, which lead to out-of-bounds access in the
show_timer function (called when /proc/$PID/timers is read). This
allowed userspace applications to read arbitrary kernel memory (on a
kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE)
(bnc#1102851 bnc#1103580). - CVE-2018-3620: Local attackers on baremetal systems could use
speculative code patterns on hyperthreaded processors to read data
present in the L1 Datacache used by other hyperthreads on the same CPU
core, potentially leaking sensitive data. (bnc#1087081). - CVE-2018-3646: Local attackers in virtualized guest systems could use
speculative code patterns on hyperthreaded processors to read data
present in the L1 Datacache used by other hyperthreads on the same CPU
core, potentially leaking sensitive data, even from other virtual
machines or the host system. (bnc#1089343).
For fixed non-security bugs, please refer to:
http://lists.suse.com/pipermail/sle-security-updates/2018-August/004414.html