- Home
- CVEs with nessus.description==This update for the Linux Kernel 3.12.61-52_92 fixes several issues.
The following security issues were fixed :
- CVE-2018-3646: Local attackers in virtualized guest
systems could use speculative code patterns on
hyperthreaded processors to read data present in the L1
Datacache used by other hyperthreads on the same CPU
core, potentially leaking sensitive data, even from
other virtual machines or the host system (bsc#1099306).
- CVE-2017-11600: net/xfrm/xfrm_policy.c did not ensure
that the dir value of xfrm_userpolicy_id is
XFRM_POLICY_MAX or less, which allowed local users to
cause a denial of service (out-of-bounds access) or
possibly have unspecified other impact via an
XFRM_MSG_MIGRATE xfrm Netlink message (bsc#1096564)
- CVE-2018-10853: A flaw was found in kvm. In which
certain instructions such as sgdt/sidt call
segmented_write_std didn't propagate access correctly.
As such, during userspace induced exception, the guest
can incorrectly assume that the exception happened in
the kernel and panic. (bsc#1097108).
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top