SUSE-SU-2016:2629-1

Source
https://www.suse.com/support/update/announcement/2016/suse-su-20162629-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2016:2629-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2016:2629-1
Related
Published
2016-10-25T15:35:17Z
Modified
2016-10-25T15:35:17Z
Summary
Security update for Linux Kernel Live Patch 2 for SLE 12 SP1
Details

This update for the Linux Kernel 3.12.51-60_25 fixes several issues.

The following security bugs were fixed: - CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419). - CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).

References

Affected packages

SUSE:Linux Enterprise Live Patching 12 / kgraft-patch-SLE12-SP1_Update_2

Package

Name
kgraft-patch-SLE12-SP1_Update_2
Purl
pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_2&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6-2.1

Ecosystem specific

{
    "binaries": [
        {
            "kgraft-patch-3_12_51-60_25-default": "6-2.1",
            "kgraft-patch-3_12_51-60_25-xen": "6-2.1"
        }
    ]
}