File _patchinfo of Package patchinfo.5326

<patchinfo incident="5326">
  <issue id="1027575" tracker="bnc">VUL-0: CVE-2017-2636: kernel live patch: tty: n_hdlc: get rid of racy n_hdlc.tbuf</issue>
  <issue id="1042892" tracker="bnc">VUL-0: CVE-2017-9242: kernel live patch: Incorrect overwrite check in __ip6_append_data()</issue>
  <issue id="1046191" tracker="bnc">VUL-0: CVE-2017-7645: kernel live patch: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernelthrough 4.10.11 allows remote attac...</issue>
  <issue id="1050751" tracker="bnc">VUL-0: EMBARGOED: CVE-2017-7533: kernel live patch: Local privilege escalation issue through dentry name / fsnotify race</issue>
  <issue id="2017-2636" tracker="cve" />
  <issue id="2017-7533" tracker="cve" />
  <issue id="2017-7645" tracker="cve" />
  <issue id="2017-9242" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>mbenes</packager>
  <description>This update for the Linux Kernel 3.12.60-52_60 fixes several issues.

The following security bugs were fixed:

- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
</description>
<summary>Security update for Linux Kernel Live Patch 17 for SLE 12</summary>
</patchinfo>
openSUSE Build Service is sponsored by