Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP2:Update
patchinfo.1363
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.1363
<patchinfo incident="1363"> <category>security</category> <rating>important</rating> <packager>mbenes</packager> <issue tracker="bnc" id="940338">VUL-0: CVE-2015-5707: kernel: Integer overflow in SCSI generic driver</issue> <issue tracker="bnc" id="940342">VUL-0: CVE-2015-5707: kernel live patch: Integer overflow in SCSI generic driver</issue> <issue tracker="bnc" id="948536">VUL-0: CVE-2015-7613: kernel: Unauthorized access to IPC objects with SysV shm</issue> <issue tracker="bnc" id="948701">VUL-0: CVE-2015-7613: kernel live patch: Unauthorized access to IPC objects with SysV shm</issue> <issue tracker="cve" id="CVE-2015-5707"/> <issue tracker="cve" id="CVE-2015-7613"/> <summary>Security update for Linux Kernel Live Patch 7</summary> <description> This kernel live patch for Linux Kernel 3.12.44-52.18.1 fixes two security issues: - CVE-2015-7613: A race condition in the IPC object implementation in the Linux kernel allowed local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c. (bsc#948701 bsc#948536) - CVE-2015-5707: Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request. (bsc#940342 bsc#940338) </description> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor