Описание
Security update for the Linux Kernel
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive critical security fixes.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012754).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685).
Список пакетов
SUSE Linux Enterprise Desktop 12 SP2
SUSE Linux Enterprise High Availability Extension 12 SP2
SUSE Linux Enterprise Live Patching 12
SUSE Linux Enterprise Server 12 SP2
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
SUSE Linux Enterprise Server for SAP Applications 12 SP2
SUSE Linux Enterprise Software Development Kit 12 SP2
SUSE Linux Enterprise Workstation Extension 12 SP2
Ссылки
- Link for SUSE-SU-2016:3049-1
- E-Mail link for SUSE-SU-2016:3049-1
- SUSE Security Ratings
- SUSE Bug 1008831
- SUSE Bug 1011685
- SUSE Bug 1012754
- SUSE CVE CVE-2016-8632 page
- SUSE CVE CVE-2016-8655 page
- SUSE CVE CVE-2016-9555 page
Описание
The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.
Затронутые продукты
Ссылки
- CVE-2016-8632
- SUSE Bug 1008831
- SUSE Bug 1012852
- SUSE Bug 1115893
Описание
Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.
Затронутые продукты
Ссылки
- CVE-2016-8655
- SUSE Bug 1012754
- SUSE Bug 1012759
- SUSE Bug 1013822
- SUSE Bug 1052365
Описание
The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.
Затронутые продукты
Ссылки
- CVE-2016-9555
- SUSE Bug 1011685
- SUSE Bug 1012183
- SUSE Bug 1115893