[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2018:1171-1 -- SLES kernel

ID: oval:org.secpod.oval:def:89002365Date: (C)2021-02-26   (M)2024-04-17
Class: PATCHFamily: unix




The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. - CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. - CVE-2018-10124: The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument . The following non-security bugs were fixed: - kvm/x86: fix icebp instruction handling . - media: cpia2: Fix a couple off by one bugs . - nfs: add nostatflush mount option . - nfs: allow flush-on-stat to be disabled . - powerpc/fadump: Add a warning when "fadump_reserve_mem=" is used . - powerpc/fadump: reuse crashkernel parameter for fadump memory reservation . - powerpc/fadump: update documentation about crashkernel parameter reuse . - powerpc/fadump: use "fadump_reserve_mem=" when specified . - x86/entry/64: Do not use IST entry for #BP stack .

Platform:
SUSE Linux Enterprise Server 11 SP4
Product:
kernel
Reference:
SUSE-SU-2018:1171-1
CVE-2018-10124
CVE-2018-1087
CVE-2018-8897
CVE    3
CVE-2018-1087
CVE-2018-10124
CVE-2018-8897
CPE    2
cpe:/o:linux:linux_kernel
cpe:/o:suse:suse_linux_enterprise_server:11:sp4

© SecPod Technologies