- Home
- CVEs with nessus.description==This update for the Linux Kernel 4.4.114-94_14 fixes several issues.
The following security issues were fixed :
- CVE-2018-3646: Local attackers in virtualized guest
systems could use speculative code patterns on
hyperthreaded processors to read data present in the L1
Datacache used by other hyperthreads on the same CPU
core, potentially leaking sensitive data, even from
other virtual machines or the host system (bsc#1099306).
- CVE-2017-18344: The timer_create syscall implementation
in kernel/time/posix-timers.c didn't properly validate
the sigevent->sigev_notify field, which lead to
out-of-bounds access in the show_timer function (called
when /proc/$PID/timers is read). This allowed userspace
applications to read arbitrary kernel memory (on a
kernel built with CONFIG_POSIX_TIMERS and
CONFIG_CHECKPOINT_RESTORE) (bsc#1103203). before 4.14.8
- CVE-2018-10853: A flaw was found in kvm. In which
certain instructions such as sgdt/sidt call
segmented_write_std didn't propagate access correctly.
As such, during userspace induced exception, the guest
can incorrectly assume that the exception happened in
the kernel and panic. (bsc#1097108).
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top