File _patchinfo of Package patchinfo.4583
<patchinfo incident="4583">
<issue id="1031440" tracker="bnc">VUL-0: CVE-2017-7294: kernel-source: The vmw_surface_define_ioctl function indrivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel...</issue>
<issue id="1031481" tracker="bnc">VUL-0: CVE-2017-7294: kernel live patch: The vmw_surface_define_ioctl function indrivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel...</issue>
<issue id="1031660" tracker="bnc">VUL-0: CVE-2017-7308: kernel live patch: The packet_set_ring function in net/packet/af_packet.c in the Linux kernelthrough 4.10.6 does not p...</issue>
<issue id="2017-7294" tracker="cve" />
<issue id="2017-7308" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>mbenes</packager>
<description>This update for the Linux Kernel 3.12.69-60_64_35 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bsc#1031660).
- CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bsc#1031440, bsc#1031481).
</description>
<summary>Security update for Linux Kernel Live Patch 14 for SLE 12 SP1</summary>
</patchinfo>