Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP2:GA
patchinfo.2266
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.2266
<patchinfo incident="2266"> <issue id="960563" tracker="bnc">VUL-0: CVE-2015-8709: kernel live patch: ptrace: potential privilege escalation in user namespaces</issue> <issue id="964732" tracker="bnc">VUL-0: CVE-2016-0774: kernel live patch: pipe buffer state corruption after unsuccessful atomic read from pipe</issue> <issue id="966683" tracker="bnc">VUL-0: CVE-2015-8812: kernel live patch: CXGB3: Logic bug in return code handling prematurely frees key structures causing Use after free or kernel panic.</issue> <issue id="967773" tracker="bnc">VUL-0: CVE-2016-2384: kernel live patch: ALSA: usb-audio: double-free triggered by invalid USB descriptor</issue> <issue id="CVE-2015-8709" tracker="cve" /> <issue id="CVE-2015-8812" tracker="cve" /> <issue id="CVE-2016-0774" tracker="cve" /> <issue id="CVE-2016-2384" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>mbenes</packager> <description> This update for the Linux Kernel 3.12.53-60.30.1 fixes the following issues: - CVE-2016-2384: A malicious USB device could cause a kernel crash in the alsa usb-audio driver. (bsc#967773) - CVE-2015-8812: A flaw was found in the CXGB3 kernel driver when the network was considered congested. The kernel would incorrectly misinterpret the congestion as an error condition and incorrectly free/clean up the skb. When the device would then send the skb's queued, these structures would be referenced and may panic the system or allow an attacker to escalate privileges in a use-after-free scenario. (bsc#966683) - CVE-2016-0774: A pipe buffer state corruption after unsuccessful atomic read from pipe was fixed (bsc#964732). - CVE-2015-8709: kernel/ptrace.c in the Linux kernel mishandled uid and gid mappings, which allowed local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states "there is no kernel bug here." (bsc#960563) </description> <summary>Security update for Linux Kernel Live Patch 3 for SP 1</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor