File _patchinfo of Package patchinfo.9411
<issue id="1103098" tracker="bnc">VUL-0: CVE-2018-5391: kernel live patch: FragmentSmack (IP fragments) (CVE-2018-5391)</issue>
<issue id="1112039" tracker="bnc">VUL-0: CVE-2018-18386: kernel live patch: hangs after a pseudoterminal is put in both ICANON and EXTPROC mode (LTP pty02)</issue>
<issue id="2018-18386" tracker="cve" />
<issue id="2018-5391" tracker="cve" />
<description>This update for the Linux Kernel 4.12.14-23 fixes several issues.
The following security issues were fixed:
- CVE-2018-5391: Fixed a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may have caused a denial of service condition by sending specially crafted IP fragments. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bsc#1103098).
- CVE-2018-18386: The drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bsc#1112039).
<summary>Security update for the Linux Kernel (Live Patch 0 for SLE 15)</summary>