File _patchinfo of Package patchinfo.5141

<patchinfo incident="5141">
  <issue id="1039348" tracker="bnc">VUL-0: CVE-2017-1000364: kernel-source: stack gap guard page too small: Qualys new root/setuid privilege escalation method 05-2017</issue>
  <issue id="1039496" tracker="bnc">VUL-0: kernel live patch: stack gap guard page too small: Qualys new root/setuid privilege escalation method 05-2017</issue>
  <issue id="1045340" tracker="bnc">regression: java segfaults on latest kernels caused by the stack gap fix</issue>
  <issue id="1045406" tracker="bnc">Kernel 3.0.101-104.2 causes zcm to crash</issue>
  <issue id="2017-1000364" tracker="cve">Kernel 3.0.101-104.2 causes zcm to crash</issue>
  <category>security</category>
  <rating>important</rating>
  <packager>mbenes</packager>
  <description>This update for the Linux Kernel 4.4.59-92_20 fixes several issues.

The following bugs were fixed:

- CVE-2017-1000364: The previous fix for the stack gap increase tracked by CVE-2017-1000364 had a regression, which is fixed by this follow up patch. (bsc#1039496)
</description>
<summary>Security update for Linux Kernel Live Patch 8 for SLE 12 SP2</summary>
</patchinfo>
openSUSE Build Service is sponsored by