Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2016:3112-1

Опубликовано: 13 дек. 2016
Источник: suse-cvrf

Описание

Security update for Linux Kernel Live Patch 12 for SLE 12

This update for the Linux Kernel 3.12.55-52_42 fixes several issues.

The following security bugs were fixed:

  • CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).
  • CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).
  • CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003253).

Список пакетов

SUSE Linux Enterprise Server 12-LTSS
kgraft-patch-3_12_55-52_42-default-4-2.1
kgraft-patch-3_12_55-52_42-xen-4-2.1
SUSE Linux Enterprise Server for SAP Applications 12
kgraft-patch-3_12_55-52_42-default-4-2.1
kgraft-patch-3_12_55-52_42-xen-4-2.1

Описание

Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.


Затронутые продукты
SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-4-2.1
SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-4-2.1
SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-4-2.1
SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-4-2.1

Ссылки

Описание

Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.


Затронутые продукты
SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-4-2.1
SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-4-2.1
SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-4-2.1
SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-4-2.1

Ссылки

Описание

The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.


Затронутые продукты
SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-4-2.1
SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-4-2.1
SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-4-2.1
SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-4-2.1

Ссылки
Уязвимость SUSE-SU-2016:3112-1