Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP1:Update
patchinfo.5111
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.5111
<patchinfo incident="5111"> <issue id="1017589" tracker="bnc">VUL-0: CVE-2016-9806: kernel live patch: double free in netlink_dump</issue> <issue id="1025013" tracker="bnc">VUL-0: CVE-2017-5970: kernel live patch: ipv4: keep skb->dst around in presence of IP options</issue> <issue id="1030575" tracker="bnc">VUL-0: CVE-2017-7184: kernel live patch: xfrm kernel heap out-of-bounds access</issue> <issue id="1031660" tracker="bnc">VUL-0: CVE-2017-7308: kernel live patch: The packet_set_ring function in net/packet/af_packet.c in the Linux kernelthrough 4.10.6 does not p...</issue> <issue id="1039496" tracker="bnc">VUL-0: kernel live patch: stack gap guard page too small: Qualys new root/setuid privilege escalation method 05-2017</issue> <issue id="2017-1000364" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>mbenes</packager> <description>This update for the Linux Kernel 3.12.60-52_63 fixes several issues. The following security bugs were fixed: - CVE-2017-1000364: An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed) (bsc#1039496). </description> <summary>Security update for Linux Kernel Live Patch 18 for SLE 12</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor