{"affected":[{"ecosystem_specific":{"binaries":[{"kgraft-patch-3_12_51-60_20-default":"6-2.1","kgraft-patch-3_12_51-60_20-xen":"6-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12","name":"kgraft-patch-SLE12-SP1_Update_1","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_1&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6-2.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for the Linux Kernel 3.12.51-60_20 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bsc#991667).\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bsc#986573).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).\n","id":"SUSE-SU-2016:2181-1","modified":"2016-08-29T09:26:33Z","published":"2016-08-29T09:26:33Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2016/suse-su-20162181-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/986377"},{"type":"REPORT","url":"https://bugzilla.suse.com/986573"},{"type":"REPORT","url":"https://bugzilla.suse.com/991667"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-4997"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5829"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6480"}],"related":["CVE-2016-4997","CVE-2016-5829","CVE-2016-6480"],"summary":"Security update for Linux Kernel Live Patch 1 for SLE 12 SP1","upstream":["CVE-2016-4997","CVE-2016-5829","CVE-2016-6480"]}