File _patchinfo of Package patchinfo.6231
<patchinfo incident="6231">
<issue id="1064388" tracker="bnc">VUL-0: CVE-2017-15649: kernel: net/packet/af_packet.c allows local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures</issue>
<issue id="1064392" tracker="bnc">VUL-0: CVE-2017-15649: kernel live patch: net/packet/af_packet.c allows local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures</issue>
<issue id="1069708" tracker="bnc">VUL-0: CVE-2017-16939: kernel live patch: local privilege escalation with XFRM sockets</issue>
<issue id="2017-15649" tracker="cve" />
<issue id="2017-16939" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>mbenes</packager>
<description>This update for the Linux Kernel 3.12.61-52_101 fixes several issues.
The following security issues were fixed:
- CVE-2017-16939: The XFRM dump policy implementation in net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages (bsc#1069708).
- CVE-2017-15649: net/packet/af_packet.c allowed local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free (bsc#1064392).
</description>
<summary>Security update for the Linux Kernel (Live Patch 28 for SLE 12)</summary>
</patchinfo>