File _patchinfo of Package patchinfo.5340

<patchinfo incident="5340">
  <issue id="1038564" tracker="bnc">VUL-0: CVE-2017-8890: kernel live patch: denial of service (double free) by leveraging use of the accept system call (inet_csk_clone_lock func in net/ipv4/inet_connection_sock.c)</issue>
  <issue id="1042892" tracker="bnc">VUL-0: CVE-2017-9242: kernel live patch: Incorrect overwrite check in __ip6_append_data()</issue>
  <issue id="1046191" tracker="bnc">VUL-0: CVE-2017-7645: kernel live patch: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernelthrough 4.10.11 allows remote attac...</issue>
  <issue id="1050751" tracker="bnc">VUL-0: EMBARGOED: CVE-2017-7533: kernel live patch: Local privilege escalation issue through dentry name / fsnotify race</issue>
  <issue id="2017-7533" tracker="cve" />
  <issue id="2017-7645" tracker="cve" />
  <issue id="2017-8890" tracker="cve" />
  <issue id="2017-9242" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>mbenes</packager>
  <description>This update for the Linux Kernel 3.12.69-60_64_35 fixes several issues.

The following security bugs were fixed:

- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).
</description>
<summary>Security update for Linux Kernel Live Patch 14 for SLE 12 SP1</summary>
</patchinfo>
openSUSE Build Service is sponsored by