Security update for the Linux Kernel
Announcement ID: | SUSE-SU-2018:3032-2 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves one vulnerability can now be installed.
Description:
The SUSE Linux Enterprise 12 SP1 LTSS kernel was updated to receive a security fix.
The following security bug was fixed:
- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bnc#1108399).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server for SAP Applications 12 SP1
zypper in -t patch SUSE-SLE-SAP-12-SP1-2019-526=1
Package List:
-
SUSE Linux Enterprise Server for SAP Applications 12 SP1 (nosrc x86_64)
- kernel-default-3.12.74-60.64.107.1
- kernel-xen-3.12.74-60.64.107.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP1 (x86_64)
- kernel-xen-devel-3.12.74-60.64.107.1
- kernel-default-devel-3.12.74-60.64.107.1
- kernel-xen-debugsource-3.12.74-60.64.107.1
- kernel-default-base-debuginfo-3.12.74-60.64.107.1
- kernel-xen-debuginfo-3.12.74-60.64.107.1
- kernel-xen-base-3.12.74-60.64.107.1
- kernel-default-debugsource-3.12.74-60.64.107.1
- kernel-xen-base-debuginfo-3.12.74-60.64.107.1
- kgraft-patch-3_12_74-60_64_107-xen-1-2.3.1
- kgraft-patch-3_12_74-60_64_107-default-1-2.3.1
- kernel-syms-3.12.74-60.64.107.1
- kernel-default-base-3.12.74-60.64.107.1
- kernel-default-debuginfo-3.12.74-60.64.107.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP1 (noarch)
- kernel-macros-3.12.74-60.64.107.1
- kernel-source-3.12.74-60.64.107.1
- kernel-devel-3.12.74-60.64.107.1