File _patchinfo of Package patchinfo.976

<patchinfo incident="976">
  <category>security</category>
  <rating>important</rating>
  <packager>mbenes</packager>
<issue tracker="bnc" id="939044"/>
<issue tracker="bnc" id="939270"/>
<issue tracker="bnc" id="939273"/>
<issue tracker="bnc" id="939276"/>
<issue tracker="cve" id="CVE-2015-1805"/>
<issue tracker="cve" id="CVE-2015-4700"/>
<issue tracker="cve" id="CVE-2015-5364"/>
<issue tracker="cve" id="CVE-2015-5366"/>
  <summary>Live patch for the Linux Kernel</summary>
<description>
This update contains a kernel live patch for the 3.12.43-52.6 SUSE Linux Enterprise
Server 12 Kernel, fixing following security issues.

- CVE-2015-5364/CVE-2015-5366: Two denial of service attacks via a flood
  of UDP packets with invalid checksums were fixed that could be used
  by remote attackers to delay execution. (bsc#939276)

- CVE-2015-1805: The (1) pipe_read and (2) pipe_write implementations in
  fs/pipe.c in the Linux kernel did not properly consider the side effects
  of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls,
  which allowed local users to cause a denial of service (system crash)
  or possibly gain privileges via a crafted application, aka an "I/O vector
  array overrun." (bsc#939270)

- CVE-2015-4700: A BPF Jit optimization flaw could allow local users
  to panic the kernel. (bsc#939273)
</description>
</patchinfo>
openSUSE Build Service is sponsored by