Uploaded image for project: 'Lustre'
  1. Lustre
  2. LU-11255

kernel update [SLES12 SP3 4.4.143-94.47.1]

    Details

    • Type: Bug
    • Status: Resolved
    • Priority: Major
    • Resolution: Fixed
    • Affects Version/s: None
    • Fix Version/s: Lustre 2.12.0, Lustre 2.10.6
    • Labels:
      None
    • Severity:
      3
    • Rank (Obsolete):
      9223372036854775807

      Description

      The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.143-94.47.1 to receive various security and bugfixes.

      The following security bugs were fixed:

      • CVE-2018-5390 aka "SegmentSmack": Linux kernel could be forced to make
        very expensive calls to tcp_collapse_ofo_queue() and
        tcp_prune_ofo_queue() for every incoming packet which can lead to a
        denial of service (bnc#1102340).
      • CVE-2018-14734: drivers/infiniband/core/ucma.c in the Linux kernel
        allowed ucma_leave_multicast to access a certain data structure after a
        cleanup step in ucma_process_join, which allowed attackers to cause a
        denial of service (use-after-free) (bnc#1103119).
      • CVE-2017-18344: The timer_create syscall implementation in
        kernel/time/posix-timers.c didn't properly validate the
        sigevent->sigev_notify field, which lead to out-of-bounds access in the
        show_timer function (called when /proc/$PID/timers is read). This
        allowed userspace applications to read arbitrary kernel memory (on a
        kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE)
        (bnc#1102851 bnc#1103580).
      • CVE-2018-3620: Local attackers on baremetal systems could use
        speculative code patterns on hyperthreaded processors to read data
        present in the L1 Datacache used by other hyperthreads on the same CPU
        core, potentially leaking sensitive data. (bnc#1087081).
      • CVE-2018-3646: Local attackers in virtualized guest systems could use
        speculative code patterns on hyperthreaded processors to read data
        present in the L1 Datacache used by other hyperthreads on the same CPU
        core, potentially leaking sensitive data, even from other virtual
        machines or the host system. (bnc#1089343).

      For fixed non-security bugs, please refer to:
      http://lists.suse.com/pipermail/sle-security-updates/2018-August/004414.html

        Attachments

          Issue Links

            Activity

              People

              • Assignee:
                yujian Jian Yu
                Reporter:
                yujian Jian Yu
              • Votes:
                0 Vote for this issue
                Watchers:
                5 Start watching this issue

                Dates

                • Created:
                  Updated:
                  Resolved: