<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for Linux Kernel Live Patch 8 for SLE 12 SP1</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2016:2674-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-10-31T06:42:49Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-10-31T06:42:49Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-10-31T06:42:49Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for Linux Kernel Live Patch 8 for SLE 12 SP1</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for the Linux Kernel 3.12.62-60_64_8 fixes several issues.

The following security bugs were fixed:
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bsc#991667).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Live-Patching-12-2016-1573</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162674-1/</URL>
      <Description>Link for SUSE-SU-2016:2674-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00073.html</URL>
      <Description>E-Mail link for SUSE-SU-2016:2674-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1001487</URL>
      <Description>SUSE Bug 1001487</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/991667</URL>
      <Description>SUSE Bug 991667</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6480/</URL>
      <Description>SUSE CVE CVE-2016-6480 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8666/</URL>
      <Description>SUSE CVE CVE-2016-8666 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 12">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12" CPE="cpe:/o:suse:sle-live-patching:12">SUSE Linux Enterprise Live Patching 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-3_12_62-60_64_8-default-2-2.1">
      <FullProductName ProductID="kgraft-patch-3_12_62-60_64_8-default-2-2.1">kgraft-patch-3_12_62-60_64_8-default-2-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-3_12_62-60_64_8-xen-2-2.1">
      <FullProductName ProductID="kgraft-patch-3_12_62-60_64_8-xen-2-2.1">kgraft-patch-3_12_62-60_64_8-xen-2-2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kgraft-patch-3_12_62-60_64_8-default-2-2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-default-2-2.1">kgraft-patch-3_12_62-60_64_8-default-2-2.1 as a component of SUSE Linux Enterprise Live Patching 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kgraft-patch-3_12_62-60_64_8-xen-2-2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-xen-2-2.1">kgraft-patch-3_12_62-60_64_8-xen-2-2.1 as a component of SUSE Linux Enterprise Live Patching 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability.</Note>
    </Notes>
    <CVE>CVE-2016-6480</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-default-2-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-xen-2-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162674-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6480.html</URL>
        <Description>CVE-2016-6480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004418</URL>
        <Description>SUSE Bug 1004418</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991608</URL>
        <Description>SUSE Bug 991608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991667</URL>
        <Description>SUSE Bug 991667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/992568</URL>
        <Description>SUSE Bug 992568</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.</Note>
    </Notes>
    <CVE>CVE-2016-8666</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-default-2-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-xen-2-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162674-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8666.html</URL>
        <Description>CVE-2016-8666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001486</URL>
        <Description>SUSE Bug 1001486</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001487</URL>
        <Description>SUSE Bug 1001487</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003964</URL>
        <Description>SUSE Bug 1003964</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
