File _patchinfo of Package patchinfo.2255

<patchinfo incident="2255">
  <issue id="960563" tracker="bnc">VUL-0: CVE-2015-8709: kernel live patch: ptrace: potential privilege escalation in user namespaces</issue>
  <issue id="964732" tracker="bnc">VUL-0: CVE-2016-0774: kernel live patch: pipe buffer state corruption after unsuccessful atomic read from pipe</issue>
  <issue id="966683" tracker="bnc">VUL-0: CVE-2015-8812: kernel live patch: CXGB3: Logic bug in return code handling prematurely frees key structures causing Use after free or kernel panic.</issue>
  <issue id="967773" tracker="bnc">VUL-0: CVE-2016-2384: kernel live patch:  ALSA: usb-audio: double-free triggered by invalid USB descriptor</issue>
  <issue id="CVE-2015-8709" tracker="cve" />
  <issue id="CVE-2015-8812" tracker="cve" />
  <issue id="CVE-2016-0774" tracker="cve" />
  <issue id="CVE-2016-2384" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>mbenes</packager>
  <description>
This update for the Linux Kernel 3.12.39-47.1 fixes the following issues:

- CVE-2016-2384: A malicious USB device could cause a kernel crash in
  the alsa usb-audio driver. (bsc#967773)

- CVE-2015-8812: A flaw was found in the CXGB3 kernel driver when
  the network was considered congested.  The kernel would incorrectly
  misinterpret the congestion as an error condition and incorrectly
  free/clean up the skb. When the device would then send the skb's queued,
  these structures would be referenced and may panic the system or allow
  an attacker to escalate privileges in a use-after-free scenario. (bsc#966683)

- CVE-2016-0774: A pipe buffer state corruption after unsuccessful atomic
  read from pipe was fixed (bsc#964732).

- CVE-2015-8709: kernel/ptrace.c in the Linux kernel mishandled uid and
  gid mappings, which allowed local users to gain privileges by establishing
  a user namespace, waiting for a root process to enter that namespace
  with an unsafe uid or gid, and then using the ptrace system call. NOTE:
  the vendor states "there is no kernel bug here." (bsc#960563)
</description>
  <summary>Security update for Linux Kernel Live Patch 4</summary>
</patchinfo>
openSUSE Build Service is sponsored by