[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2018:1965-01 -- Redhat kernel, python-perf, perf

ID: oval:org.secpod.oval:def:502329Date: (C)2018-06-27   (M)2024-02-19
Class: PATCHFamily: unix




The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load amp; Store instructions . It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor"s data cache even for speculatively executed instructions that never actually commit . As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. * kernel: Out-of-bounds access via an XFRM_MSG_MIGRATE xfrm Netlink message For more details about the security issue, including the impact, a CVSS score, and other related information, refer to the CVE page listed in the References section. Red Hat would like to thank Ken Johnson and Jann Horn for reporting CVE-2018-3639. Bug Fix: These updated kernel packages include also numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article: https://access.redhat.com/articles/3485871

Platform:
Red Hat Enterprise Linux 7
Product:
kernel
python-perf
perf
Reference:
RHSA-2018:1965-01
CVE-2017-11600
CVE-2018-3639
CVE    2
CVE-2017-11600
CVE-2018-3639
CPE    4
cpe:/o:linux:linux_kernel
cpe:/o:redhat:enterprise_linux:7
cpe:/a:perf:perf
cpe:/a:python-perf:python-perf
...

© SecPod Technologies