File _patchinfo of Package patchinfo.5115

<patchinfo incident="5115">
  <issue id="1001487" tracker="bnc">VUL-0: CVE-2016-7039: kernel live patch: remote crash via stack overflow</issue>
  <issue id="1012183" tracker="bnc">VUL-0: CVE-2016-9555: kernel live patch: net/sctp: slab-out-of-bounds in sctp_sf_ootb</issue>
  <issue id="1012759" tracker="bnc">VUL-0: CVE-2016-8655: kernel live patch: Local root privilege packet_set_ring/timer_list</issue>
  <issue id="1012852" tracker="bnc">VUL-1: CVE-2016-8632: kernel live patch: TIPC subsystem: tipc_msg_build() doesn't validate MTU, may cause memory corruption.</issue>
  <issue id="1013543" tracker="bnc">VUL-0: CVE-2016-9794: kernel live patch: ALSA: use-after-free in,kill_fasync</issue>
  <issue id="1014271" tracker="bnc">VUL-0: CVE-2016-9576: kernel live patch: Use-after-free in SCSI Generic driver</issue>
  <issue id="1021417" tracker="bnc">Xen netback: DomU hangs under heavy load: grant still in use by backend domain</issue>
  <issue id="1025013" tracker="bnc">VUL-0: CVE-2017-5970: kernel live patch: ipv4: keep skb-&gt;dst around in presence of IP options</issue>
  <issue id="1030575" tracker="bnc">VUL-0: CVE-2017-7184: kernel live patch: xfrm kernel heap out-of-bounds access</issue>
  <issue id="1031481" tracker="bnc">VUL-0: CVE-2017-7294: kernel live patch: The vmw_surface_define_ioctl function indrivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel...</issue>
  <issue id="1039496" tracker="bnc">VUL-0: kernel live patch: stack gap guard page too small: Qualys new root/setuid privilege escalation method 05-2017</issue>
  <issue id="991667" tracker="bnc">VUL-0: CVE-2016-6480: kernel live patches: double read leading to kernel information discosure</issue>
  <issue id="2017-1000364" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>mbenes</packager>
  <description>This update for the Linux Kernel 3.12.62-60_64_8 fixes several issues.

The following security bugs were fixed:

- CVE-2017-1000364: An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed) (bsc#1039496).
</description>
<summary>Security update for Linux Kernel Live Patch 8 for SLE 12 SP1</summary>
</patchinfo>
openSUSE Build Service is sponsored by