<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for Linux Kernel Live Patch 1 for SLE 12 SP1</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2016:2630-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-10-25T15:35:30Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-10-25T15:35:30Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-10-25T15:35:30Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for Linux Kernel Live Patch 1 for SLE 12 SP1</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for the Linux Kernel 3.12.51-60_20 fixes several issues.

The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Live-Patching-12-2016-1547</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162630-1/</URL>
      <Description>Link for SUSE-SU-2016:2630-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2016-October/002354.html</URL>
      <Description>E-Mail link for SUSE-SU-2016:2630-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1001487</URL>
      <Description>SUSE Bug 1001487</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1004419</URL>
      <Description>SUSE Bug 1004419</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5195/</URL>
      <Description>SUSE CVE CVE-2016-5195 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8666/</URL>
      <Description>SUSE CVE CVE-2016-8666 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 12">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12" CPE="cpe:/o:suse:sle-live-patching:12">SUSE Linux Enterprise Live Patching 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-3_12_51-60_20-default-7-2.1">
      <FullProductName ProductID="kgraft-patch-3_12_51-60_20-default-7-2.1">kgraft-patch-3_12_51-60_20-default-7-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-3_12_51-60_20-xen-7-2.1">
      <FullProductName ProductID="kgraft-patch-3_12_51-60_20-xen-7-2.1">kgraft-patch-3_12_51-60_20-xen-7-2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kgraft-patch-3_12_51-60_20-default-7-2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-7-2.1">kgraft-patch-3_12_51-60_20-default-7-2.1 as a component of SUSE Linux Enterprise Live Patching 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kgraft-patch-3_12_51-60_20-xen-7-2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-7-2.1">kgraft-patch-3_12_51-60_20-xen-7-2.1 as a component of SUSE Linux Enterprise Live Patching 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."</Note>
    </Notes>
    <CVE>CVE-2016-5195</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-7-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-7-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.6</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5195.html</URL>
        <Description>CVE-2016-5195</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004418</URL>
        <Description>SUSE Bug 1004418</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004419</URL>
        <Description>SUSE Bug 1004419</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004436</URL>
        <Description>SUSE Bug 1004436</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1006323</URL>
        <Description>SUSE Bug 1006323</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1006695</URL>
        <Description>SUSE Bug 1006695</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007291</URL>
        <Description>SUSE Bug 1007291</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008110</URL>
        <Description>SUSE Bug 1008110</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1030118</URL>
        <Description>SUSE Bug 1030118</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1046453</URL>
        <Description>SUSE Bug 1046453</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1069496</URL>
        <Description>SUSE Bug 1069496</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149725</URL>
        <Description>SUSE Bug 1149725</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870618</URL>
        <Description>SUSE Bug 870618</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986445</URL>
        <Description>SUSE Bug 986445</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998689</URL>
        <Description>SUSE Bug 998689</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.</Note>
    </Notes>
    <CVE>CVE-2016-8666</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-7-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-7-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162630-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8666.html</URL>
        <Description>CVE-2016-8666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001486</URL>
        <Description>SUSE Bug 1001486</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001487</URL>
        <Description>SUSE Bug 1001487</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003964</URL>
        <Description>SUSE Bug 1003964</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
