[FEDORA-2016-5aff4a6bbc] Fedora 23: kernel
Severity
High
Affected Packages
1
CVEs
3
The 4.8.13 stable kernel update contains a number of important fixes across the
tree.
Package | Affected Version |
---|---|
pkg:rpm/fedora/kernel?distro=fedora-23 | < 4.8.13.100.fc23 |
- ID
- FEDORA-2016-5aff4a6bbc
- Severity
- high
- Severity from
- CVE-2016-8655
- URL
- https://bodhi.fedoraproject.org/updates/FEDORA-2016-5aff4a6bbc
- Published
-
2016-12-13T04:22:46
(7 years ago) - Modified
-
2016-12-13T04:22:46
(7 years ago) - Rights
- Copyright 2016 Red Hat, Inc.
- Other Advisories
-
- ALAS-2016-772
- ALAS-2017-782
- ASA-201612-6
- ASA-201612-7
- ASA-201612-8
- ELSA-2017-0386
- ELSA-2017-0817
- ELSA-2017-0933
- ELSA-2017-1842
- ELSA-2017-3508
- ELSA-2017-3509
- ELSA-2017-3510
- ELSA-2017-3514
- FEDORA-2016-107f03cc00
- FEDORA-2016-5cb5b4082d
- RHSA-2017:0386
- RHSA-2017:0387
- RHSA-2017:0817
- RHSA-2017:0931
- RHSA-2017:0933
- RHSA-2017:1842
- RHSA-2017:2077
- SSA:2016-347-01
- SUSE-SU-2016:3039-1
- SUSE-SU-2016:3049-1
- SUSE-SU-2016:3063-1
- SUSE-SU-2016:3093-1
- SUSE-SU-2016:3094-1
- SUSE-SU-2016:3096-1
- SUSE-SU-2016:3098-1
- SUSE-SU-2016:3100-1
- SUSE-SU-2016:3104-1
- SUSE-SU-2016:3109-1
- SUSE-SU-2016:3111-1
- SUSE-SU-2016:3112-1
- SUSE-SU-2016:3113-1
- SUSE-SU-2016:3116-1
- SUSE-SU-2016:3117-1
- SUSE-SU-2016:3119-1
- SUSE-SU-2016:3146-1
- SUSE-SU-2016:3169-1
- SUSE-SU-2016:3183-1
- SUSE-SU-2016:3188-1
- SUSE-SU-2016:3197-1
- SUSE-SU-2016:3203-1
- SUSE-SU-2016:3205-1
- SUSE-SU-2016:3206-1
- SUSE-SU-2016:3217-1
- SUSE-SU-2016:3247-1
- SUSE-SU-2016:3248-1
- SUSE-SU-2016:3249-1
- SUSE-SU-2016:3252-1
- SUSE-SU-2017:0181-1
- SUSE-SU-2017:0226-1
- SUSE-SU-2017:0227-1
- SUSE-SU-2017:0228-1
- SUSE-SU-2017:0229-1
- SUSE-SU-2017:0230-1
- SUSE-SU-2017:0231-1
- SUSE-SU-2017:0233-1
- SUSE-SU-2017:0234-1
- SUSE-SU-2017:0235-1
- SUSE-SU-2017:0244-1
- SUSE-SU-2017:0245-1
- SUSE-SU-2017:0246-1
- SUSE-SU-2017:0247-1
- SUSE-SU-2017:0248-1
- SUSE-SU-2017:0249-1
- SUSE-SU-2017:0267-1
- SUSE-SU-2017:0268-1
- SUSE-SU-2017:0278-1
- SUSE-SU-2017:0293-1
- SUSE-SU-2017:0294-1
- SUSE-SU-2017:0333-1
- SUSE-SU-2017:0407-1
- SUSE-SU-2017:0437-1
- SUSE-SU-2017:0464-1
- SUSE-SU-2017:0471-1
- SUSE-SU-2017:0494-1
- SUSE-SU-2017:1102-1
- USN-3149-1
- USN-3149-2
- USN-3150-1
- USN-3150-2
- USN-3151-1
- USN-3151-2
- USN-3151-3
- USN-3151-4
- USN-3152-1
- USN-3152-2
- USN-3168-1
- USN-3168-2
- USN-3169-1
- USN-3169-2
- USN-3169-3
- USN-3169-4
- USN-3170-1
- USN-3170-2
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 1403145 | Bug #1403145 - CVE-2016-9576 kernel: Use after free in SCSI generic device interface | https://bugzilla.redhat.com/show_bug.cgi?id=1403145 |
Bugzilla | 1402013 | Bug #1402013 - CVE-2016-9793 kernel: Signed overflow for SO_{SND|RCV}BUFFORCE | https://bugzilla.redhat.com/show_bug.cgi?id=1402013 |
Bugzilla | 1400019 | Bug #1400019 - CVE-2016-8655 kernel: Race condition in packet_set_ring leads to use after free | https://bugzilla.redhat.com/show_bug.cgi?id=1400019 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/fedora/kernel?distro=fedora-23 | fedora | kernel | < 4.8.13.100.fc23 | fedora-23 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |