Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP4:Update
patchinfo.5348
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.5348
<patchinfo incident="5348"> <issue id="1027575" tracker="bnc">VUL-0: CVE-2017-2636: kernel live patch: tty: n_hdlc: get rid of racy n_hdlc.tbuf</issue> <issue id="1038564" tracker="bnc">VUL-0: CVE-2017-8890: kernel live patch: denial of service (double free) by leveraging use of the accept system call (inet_csk_clone_lock func in net/ipv4/inet_connection_sock.c)</issue> <issue id="1042364" tracker="bnc">VUL-0: CVE-2017-9077: kernel live patch: net: tcp_v6_syn_recv_sock function mishandles inheritance</issue> <issue id="1042892" tracker="bnc">VUL-0: CVE-2017-9242: kernel live patch: Incorrect overwrite check in __ip6_append_data()</issue> <issue id="1046191" tracker="bnc">VUL-0: CVE-2017-7645: kernel live patch: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernelthrough 4.10.11 allows remote attac...</issue> <issue id="1046206" tracker="bnc">VUL-0: CVE-2017-8797: kernel live patch: remote DoS in nfsd</issue> <issue id="1050751" tracker="bnc">VUL-0: EMBARGOED: CVE-2017-7533: kernel live patch: Local privilege escalation issue through dentry name / fsnotify race</issue> <issue id="1046202" tracker="bnc">VUL-0: CVE-2017-8797: kernel: remote DoS in nfsd</issue> <issue id="2017-2636" tracker="cve" /> <issue id="2017-7533" tracker="cve" /> <issue id="2017-7645" tracker="cve" /> <issue id="2017-8797" tracker="cve" /> <issue id="2017-8890" tracker="cve" /> <issue id="2017-9077" tracker="cve" /> <issue id="2017-9242" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>mbenes</packager> <description>This update for the Linux Kernel 4.4.49-92_11 fixes several issues. The following security bugs were fixed: - CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751). - CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202) - CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191). - CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575). - CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892). - CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364). - CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564). </description> <summary>Security update for Linux Kernel Live Patch 5 for SLE 12 SP2</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor