[SUSE-SU-2018:4158-1] Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP1)
Severity
Important
Affected Packages
6
CVEs
1
Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP1)
This update for the Linux Kernel 3.12.74-60_64_96 fixes one issue.
The following security issue was fixed:
- CVE-2018-9568: Prevent possible memory corruption due to type confusion in sk_clone_lock. This could lead to local privilege escalation (bsc#1118319).
- ID
- SUSE-SU-2018:4158-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2018/suse-su-20184158-1/
- Published
-
2018-12-17T15:07:33
(5 years ago) - Modified
-
2018-12-17T15:07:33
(5 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ELSA-2019-0512
- ELSA-2019-2736
- ELSA-2019-4575
- ELSA-2019-4576
- ELSA-2019-4577
- openSUSE-SU-2019:0065-1
- RHSA-2019:0512
- RHSA-2019:0514
- RHSA-2019:2736
- SUSE-SU-2018:4153-1
- SUSE-SU-2018:4154-1
- SUSE-SU-2018:4157-1
- SUSE-SU-2018:4195-1
- SUSE-SU-2018:4196-1
- SUSE-SU-2018:4238-1
- SUSE-SU-2019:0148-1
- SUSE-SU-2019:0150-1
- SUSE-SU-2019:0196-1
- SUSE-SU-2019:0222-1
- SUSE-SU-2019:0224-1
- SUSE-SU-2019:0320-1
- SUSE-SU-2019:0439-1
- SUSE-SU-2019:0541-1
- SUSE-SU-2019:1289-1
- USN-3880-1
- USN-3880-2
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings | https://www.suse.com/support/security/rating/ | |
Suse | URL of this CSAF notice | https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_4158-1.json | |
Suse | URL for SUSE-SU-2018:4158-1 | https://www.suse.com/support/update/announcement/2018/suse-su-20184158-1/ | |
Suse | E-Mail link for SUSE-SU-2018:4158-1 | https://lists.suse.com/pipermail/sle-security-updates/2018-December/004975.html | |
Bugzilla | SUSE Bug 1118319 | https://bugzilla.suse.com/1118319 | |
Bugzilla | SUSE Bug 1118320 | https://bugzilla.suse.com/1118320 | |
CVE | SUSE CVE CVE-2018-9568 page | https://www.suse.com/security/cve/CVE-2018-9568/ |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_99-xen?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_99-xen | < 6-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_99-default?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_99-default | < 6-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_96-xen?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_96-xen | < 7-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_96-default?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_96-default | < 7-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_107-xen?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_107-xen | < 4-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_74-60_64_107-default?arch=x86_64&distro=sles-12&sp=1 | suse | kgraft-patch-3_12_74-60_64_107-default | < 4-2.1 | sles-12 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |