|Category:||SuSE Local Security Checks|
|Title:||SUSE: Security Advisory (SUSE-SU-2017:1613-1)|
|Summary:||The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2017:1613-1 advisory.|
The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2017:1613-1 advisory.
The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security fixes.
The following security bugs were fixed:
- CVE-2017-1000364: The default stack guard page was too small and could
be 'jumped over' by userland programs using more than one page of stack
in functions and so lead to memory corruption. This update extends the
stack guard page to 1 MB (for 4k pages) and 16 MB (for 64k pages) to
reduce this attack vector. This is not a kernel bugfix, but a hardening
measure against this kind of userland attack.(bsc#1039348)
- CVE-2015-3288: mm/memory.c in the Linux kernel mishandled anonymous
pages, which allowed local users to gain privileges or cause a denial of
service (page tainting) via a crafted application that triggers writing
to page zero (bnc#979021).
'Linux Kernel' package(s) on SUSE Linux Enterprise Server 11-SP3, SUSE Linux Enterprise Server 11, SUSE Linux Enterprise Point of Sale 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP3
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2015-3288|
BugTraq ID: 93591
|Copyright||Copyright (C) 2021 Greenbone Networks GmbH|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.