{"id":"SUSE-SU-2018:1270-1","summary":"Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP3)","details":"This update for the Linux Kernel 4.4.82-6_3 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-1000199: A bug in x86 debug register handling of ptrace() could lead to memory corruption, possibly a denial of service or privilege escalation (bsc#1090036). \n- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allowed attackers to gain privileges via unspecified vectors (bsc#1088268).\n","modified":"2026-02-04T02:27:51.990434Z","published":"2018-05-11T17:57:28Z","related":["CVE-2017-0861","CVE-2018-1000199"],"upstream":["CVE-2017-0861","CVE-2018-1000199"],"references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20181270-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1088268"},{"type":"REPORT","url":"https://bugzilla.suse.com/1090036"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-0861"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-1000199"}],"affected":[{"package":{"name":"kgraft-patch-SLE12-SP3_Update_1","ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_1&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_82-6_3-default":"8-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2018:1270-1.json"}}],"schema_version":"1.7.3"}