Описание
Security update for Linux Kernel Live Patch 8 for SLE 12 SP1
This update for the Linux Kernel 3.12.62-60_64_8 fixes several issues.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).
Список пакетов
SUSE Linux Enterprise Live Patching 12
kgraft-patch-3_12_62-60_64_8-default-3-2.1
kgraft-patch-3_12_62-60_64_8-xen-3-2.1
Ссылки
- Link for SUSE-SU-2016:3116-1
- E-Mail link for SUSE-SU-2016:3116-1
- SUSE Security Ratings
- SUSE Bug 1012183
- SUSE Bug 1012759
- SUSE CVE CVE-2016-8655 page
- SUSE CVE CVE-2016-9555 page
Описание
Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.
Затронутые продукты
SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-default-3-2.1
SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-xen-3-2.1
Ссылки
- CVE-2016-8655
- SUSE Bug 1012754
- SUSE Bug 1012759
- SUSE Bug 1013822
- SUSE Bug 1052365
Описание
The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.
Затронутые продукты
SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-default-3-2.1
SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-xen-3-2.1
Ссылки
- CVE-2016-9555
- SUSE Bug 1011685
- SUSE Bug 1012183
- SUSE Bug 1115893