File _patchinfo of Package patchinfo.5624
<patchinfo incident="5624">
<issue id="1038564" tracker="bnc">VUL-0: CVE-2017-8890: kernel live patch: denial of service (double free) by leveraging use of the accept system call (inet_csk_clone_lock func in net/ipv4/inet_connection_sock.c)</issue>
<issue id="1042892" tracker="bnc">VUL-0: CVE-2017-9242: kernel live patch: Incorrect overwrite check in __ip6_append_data()</issue>
<issue id="1052311" tracker="bnc">VUL-0: CVE-2017-1000112: kernel: udp: consistently apply ufo or fragmentation</issue>
<issue id="1052368" tracker="bnc">VUL-0: CVE-2017-1000112: kernel live patch: udp: consistently apply ufo or fragmentation</issue>
<issue id="2017-1000112" tracker="cve" />
<issue id="2017-8890" tracker="cve" />
<issue id="2017-9242" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>mbenes</packager>
<description>This update for the Linux Kernel 3.12.74-60_64_54 fixes several issues.
The following security bugs were fixed:
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel was too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1038564, bsc#1042892).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).
</description>
<summary>Security update for Linux Kernel Live Patch 19 for SLE 12 SP1</summary>
</patchinfo>