Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP2:GA
patchinfo.5336
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.5336
<patchinfo incident="5336"> <issue id="1027575" tracker="bnc">VUL-0: CVE-2017-2636: kernel live patch: tty: n_hdlc: get rid of racy n_hdlc.tbuf</issue> <issue id="1038564" tracker="bnc">VUL-0: CVE-2017-8890: kernel live patch: denial of service (double free) by leveraging use of the accept system call (inet_csk_clone_lock func in net/ipv4/inet_connection_sock.c)</issue> <issue id="1042892" tracker="bnc">VUL-0: CVE-2017-9242: kernel live patch: Incorrect overwrite check in __ip6_append_data()</issue> <issue id="1046191" tracker="bnc">VUL-0: CVE-2017-7645: kernel live patch: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernelthrough 4.10.11 allows remote attac...</issue> <issue id="1050751" tracker="bnc">VUL-0: EMBARGOED: CVE-2017-7533: kernel live patch: Local privilege escalation issue through dentry name / fsnotify race</issue> <issue id="2017-2636" tracker="cve" /> <issue id="2017-7533" tracker="cve" /> <issue id="2017-7645" tracker="cve" /> <issue id="2017-8890" tracker="cve" /> <issue id="2017-9242" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>mbenes</packager> <description>This update for the Linux Kernel 3.12.67-60_64_21 fixes several issues. The following security bugs were fixed: - CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751). - CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191). - CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575). - CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892). - CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564). </description> <summary>Security update for Linux Kernel Live Patch 10 for SLE 12 SP1</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor