Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP1:GA
patchinfo.3994
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.3994
<patchinfo incident="3994"> <issue id="1012852" tracker="bnc">VUL-1: CVE-2016-8632: kernel live patch: TIPC subsystem: tipc_msg_build() doesn't validate MTU, may cause memory corruption.</issue> <issue id="1013543" tracker="bnc">VUL-0: CVE-2016-9794: kernel live patch: ALSA: use-after-free in,kill_fasync</issue> <issue id="1013604" tracker="bnc">VUL-0: CVE-2016-9576: kernel: Use-after-free in SCSI Generic driver</issue> <issue id="1014271" tracker="bnc">VUL-0: CVE-2016-9576: kernel live patch: Use-after-free in SCSI Generic driver</issue> <issue id="1017589" tracker="bnc">VUL-0: CVE-2016-9806: kernel-source: double free in netlink_dump</issue> <issue id="2016-8632" tracker="cve" /> <issue id="2016-9576" tracker="cve" /> <issue id="2016-9794" tracker="cve" /> <issue id="2016-9806" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>mbenes</packager> <description>This update for the Linux Kernel 3.12.60-52_54 fixes several issues. The following security bugs were fixed: - CVE-2016-9806: Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel allowed local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that made sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated (bsc#1017589). - CVE-2016-9794: Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START command (bsc#1013543). - CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bsc#1012852). - CVE-2016-9576: The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel did not properly restrict the type of iterator, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device (bsc#1014271). </description> <summary>Security update for Linux Kernel Live Patch 15 for SLE 12</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor