<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for Linux Kernel Live Patch 2 for SP 1</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2016:1035-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-04-14T11:44:46Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-04-14T11:44:46Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-04-14T11:44:46Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for Linux Kernel Live Patch 2 for SP 1</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for the Linux Kernel 3.12.51-60.25.1 fixes the following issues:

- CVE-2016-2384: A malicious USB device could cause a kernel crash in
  the alsa usb-audio driver. (bsc#967773)

- CVE-2015-8812: A flaw was found in the CXGB3 kernel driver when
  the network was considered congested.  The kernel would incorrectly
  misinterpret the congestion as an error condition and incorrectly
  free/clean up the skb. When the device would then send the skb's queued,
  these structures would be referenced and may panic the system or allow
  an attacker to escalate privileges in a use-after-free scenario. (bsc#966683)

- CVE-2016-0774: A pipe buffer state corruption after unsuccessful atomic
  read from pipe was fixed (bsc#964732).

- CVE-2015-8709: kernel/ptrace.c in the Linux kernel mishandled uid and
  gid mappings, which allowed local users to gain privileges by establishing
  a user namespace, waiting for a root process to enter that namespace
  with an unsafe uid or gid, and then using the ptrace system call. NOTE:
  the vendor states 'there is no kernel bug here.' (bsc#960563)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Live-Patching-12-2016-612</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161035-1/</URL>
      <Description>Link for SUSE-SU-2016:1035-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00029.html</URL>
      <Description>E-Mail link for SUSE-SU-2016:1035-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/960563</URL>
      <Description>SUSE Bug 960563</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/964732</URL>
      <Description>SUSE Bug 964732</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/966683</URL>
      <Description>SUSE Bug 966683</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/967773</URL>
      <Description>SUSE Bug 967773</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8709/</URL>
      <Description>SUSE CVE CVE-2015-8709 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8812/</URL>
      <Description>SUSE CVE CVE-2015-8812 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0774/</URL>
      <Description>SUSE CVE CVE-2016-0774 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2384/</URL>
      <Description>SUSE CVE CVE-2016-2384 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 12">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12" CPE="cpe:/o:suse:sle-live-patching:12">SUSE Linux Enterprise Live Patching 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-3_12_51-60_25-default-3-2.1">
      <FullProductName ProductID="kgraft-patch-3_12_51-60_25-default-3-2.1">kgraft-patch-3_12_51-60_25-default-3-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-3_12_51-60_25-xen-3-2.1">
      <FullProductName ProductID="kgraft-patch-3_12_51-60_25-xen-3-2.1">kgraft-patch-3_12_51-60_25-xen-3-2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kgraft-patch-3_12_51-60_25-default-3-2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-3-2.1">kgraft-patch-3_12_51-60_25-default-3-2.1 as a component of SUSE Linux Enterprise Live Patching 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kgraft-patch-3_12_51-60_25-xen-3-2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-3-2.1">kgraft-patch-3_12_51-60_25-xen-3-2.1 as a component of SUSE Linux Enterprise Live Patching 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call.  NOTE: the vendor states "there is no kernel bug here."</Note>
    </Notes>
    <CVE>CVE-2015-8709</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-3-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-3-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161035-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8709.html</URL>
        <Description>CVE-2015-8709</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010933</URL>
        <Description>SUSE Bug 1010933</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959709</URL>
        <Description>SUSE Bug 959709</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960561</URL>
        <Description>SUSE Bug 960561</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960563</URL>
        <Description>SUSE Bug 960563</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 does not properly identify error conditions, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets.</Note>
    </Notes>
    <CVE>CVE-2015-8812</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-3-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-3-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161035-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8812.html</URL>
        <Description>CVE-2015-8812</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020452</URL>
        <Description>SUSE Bug 1020452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/966437</URL>
        <Description>SUSE Bug 966437</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/966683</URL>
        <Description>SUSE Bug 966683</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport in the linux package before 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun." NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-1805.</Note>
    </Notes>
    <CVE>CVE-2016-0774</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-3-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-3-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161035-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0774.html</URL>
        <Description>CVE-2016-0774</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917839</URL>
        <Description>SUSE Bug 917839</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/964730</URL>
        <Description>SUSE Bug 964730</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/964732</URL>
        <Description>SUSE Bug 964732</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.</Note>
    </Notes>
    <CVE>CVE-2016-2384</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-3-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-3-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161035-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2384.html</URL>
        <Description>CVE-2016-2384</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020452</URL>
        <Description>SUSE Bug 1020452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/966693</URL>
        <Description>SUSE Bug 966693</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967773</URL>
        <Description>SUSE Bug 967773</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
