File _patchinfo of Package patchinfo.6165
<patchinfo incident="6165">
<issue id="1069496" tracker="bnc">VUL-0: CVE-2017-1000405: kernel-source: huge dirty cow in THP pages</issue>
<issue id="1069702" tracker="bnc">VUL-0: CVE-2017-16939: kernel-source: local privilege escalation with XFRM sockets</issue>
<issue id="1070805" tracker="bnc">bzImage does not build on ppc64</issue>
<issue id="2017-16939" tracker="cve" />
<issue id="2017-1000405" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>tiwai</packager>
<reboot_needed/>
<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-1000405: A bug in the THP CoW support could be used by local attackers to corrupt memory of other processes and cause them to crash (bnc#1069496).
- CVE-2017-16939: The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages (bnc#1069702).
The following non-security bugs were fixed:
Fix a build issue on ppc64le systems (bsc#1070805)
</description>
<summary>Security update for the Linux Kernel</summary>
</patchinfo>