Security update for the Linux Kernel
Announcement ID: |
SUSE-SU-2018:0213-1 |
Rating: |
important |
References: |
|
Cross-References:
|
|
CVSS scores: |
-
CVE-2017-1000405
(
SUSE
):
5.7
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L
-
CVE-2017-1000405
(
NVD
):
7.0
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
-
CVE-2017-1000405
(
NVD
):
7.0
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
-
CVE-2017-1000410
(
SUSE
):
2.4
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
-
CVE-2017-1000410
(
NVD
):
7.5
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
-
CVE-2017-11600
(
SUSE
):
7.3
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
-
CVE-2017-11600
(
NVD
):
7.0
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
-
CVE-2017-11600
(
NVD
):
7.0
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
-
CVE-2017-12193
(
SUSE
):
6.2
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
-
CVE-2017-12193
(
NVD
):
5.5
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
-
CVE-2017-15115
(
SUSE
):
5.5
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
-
CVE-2017-15115
(
NVD
):
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
-
CVE-2017-15115
(
NVD
):
7.8
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
-
CVE-2017-16528
(
SUSE
):
4.6
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
-
CVE-2017-16528
(
NVD
):
6.6
CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
-
CVE-2017-16536
(
SUSE
):
4.6
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
-
CVE-2017-16536
(
NVD
):
6.6
CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
-
CVE-2017-16537
(
SUSE
):
4.6
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
-
CVE-2017-16537
(
NVD
):
6.6
CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
-
CVE-2017-16645
(
SUSE
):
4.6
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
-
CVE-2017-16645
(
NVD
):
6.6
CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
-
CVE-2017-16646
(
SUSE
):
4.6
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
-
CVE-2017-16646
(
NVD
):
6.6
CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
-
CVE-2017-16939
(
SUSE
):
7.8
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
-
CVE-2017-16939
(
NVD
):
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
-
CVE-2017-16939
(
NVD
):
7.8
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
-
CVE-2017-16994
(
SUSE
):
4.0
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
-
CVE-2017-16994
(
NVD
):
5.5
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
-
CVE-2017-17448
(
SUSE
):
5.7
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L
-
CVE-2017-17448
(
NVD
):
7.8
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
-
CVE-2017-17449
(
SUSE
):
4.3
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
-
CVE-2017-17449
(
NVD
):
4.7
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
-
CVE-2017-17450
(
SUSE
):
4.4
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
-
CVE-2017-17450
(
NVD
):
7.8
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
-
CVE-2017-17805
(
SUSE
):
7.1
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
-
CVE-2017-17805
(
NVD
):
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
-
CVE-2017-17805
(
NVD
):
7.8
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
-
CVE-2017-17806
(
SUSE
):
3.6
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
-
CVE-2017-17806
(
NVD
):
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
-
CVE-2017-17806
(
NVD
):
7.8
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
-
CVE-2017-5715
(
SUSE
):
7.1
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
-
CVE-2017-5715
(
NVD
):
5.6
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
-
CVE-2017-5715
(
NVD
):
5.6
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
-
CVE-2017-5753
(
SUSE
):
5.6
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
-
CVE-2017-5753
(
SUSE
):
7.1
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
-
CVE-2017-5753
(
NVD
):
5.6
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
-
CVE-2017-5753
(
NVD
):
5.6
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
-
CVE-2017-5754
(
SUSE
):
5.5
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
-
CVE-2017-5754
(
SUSE
):
7.1
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
-
CVE-2017-5754
(
NVD
):
5.6
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
-
CVE-2017-7482
(
SUSE
):
6.6
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
-
CVE-2017-7482
(
NVD
):
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
-
CVE-2017-7482
(
NVD
):
7.1
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
-
CVE-2017-8824
(
SUSE
):
8.4
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
-
CVE-2017-8824
(
NVD
):
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
-
CVE-2017-8824
(
NVD
):
7.8
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
Affected Products: |
- Magnum Orchestration 7
- SUSE Container as a Service Platform 1.0
- SUSE Container as a Service Platform 2.0
- SUSE Linux Enterprise Desktop 12 SP2
- SUSE Linux Enterprise Desktop 12 SP3
- SUSE Linux Enterprise High Performance Computing 12 SP2
- SUSE Linux Enterprise High Performance Computing 12 SP3
- SUSE Linux Enterprise Server 12 SP2
- SUSE Linux Enterprise Server 12 SP3
- SUSE Linux Enterprise Server for SAP Applications 12 SP2
- SUSE Linux Enterprise Server for SAP Applications 12 SP3
- SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2
- SUSE Linux Enterprise Software Bootstrap Kit 12 12-SP3
- SUSE Linux Enterprise Software Bootstrap Kit 12 12-SP2
- SUSE Linux Enterprise Software Development Kit 12 12-SP2
- SUSE Linux Enterprise Software Development Kit 12 SP3
|
An update that solves 22 vulnerabilities and has 72 security fixes can now be installed.
Description:
The SUSE Linux Enterprise 12 SP2 Realtime kernel was updated to 4.4.104 to receive various security and bugfixes.
This update adds mitigations for various side channel attacks against
moder