File _patchinfo of Package patchinfo.5141
<patchinfo incident="5141">
<issue id="1039348" tracker="bnc">VUL-0: CVE-2017-1000364: kernel-source: stack gap guard page too small: Qualys new root/setuid privilege escalation method 05-2017</issue>
<issue id="1039496" tracker="bnc">VUL-0: kernel live patch: stack gap guard page too small: Qualys new root/setuid privilege escalation method 05-2017</issue>
<issue id="1045340" tracker="bnc">regression: java segfaults on latest kernels caused by the stack gap fix</issue>
<issue id="1045406" tracker="bnc">Kernel 3.0.101-104.2 causes zcm to crash</issue>
<issue id="2017-1000364" tracker="cve">Kernel 3.0.101-104.2 causes zcm to crash</issue>
<category>security</category>
<rating>important</rating>
<packager>mbenes</packager>
<description>This update for the Linux Kernel 4.4.59-92_20 fixes several issues.
The following bugs were fixed:
- CVE-2017-1000364: The previous fix for the stack gap increase tracked by CVE-2017-1000364 had a regression, which is fixed by this follow up patch. (bsc#1039496)
</description>
<summary>Security update for Linux Kernel Live Patch 8 for SLE 12 SP2</summary>
</patchinfo>