[SUSE-SU-2016:1031-1] Security update for Linux Kernel Live Patch 0 for SP 1
Security update for Linux Kernel Live Patch 0 for SP 1
This update for the Linux Kernel 3.12.49-11.1 fixes the following issues:
CVE-2016-2384: A malicious USB device could cause a kernel crash in
the alsa usb-audio driver. (bsc#967773)CVE-2015-8812: A flaw was found in the CXGB3 kernel driver when
the network was considered congested. The kernel would incorrectly
misinterpret the congestion as an error condition and incorrectly
free/clean up the skb. When the device would then send the skb's queued,
these structures would be referenced and may panic the system or allow
an attacker to escalate privileges in a use-after-free scenario. (bsc#966683)CVE-2016-0774: A pipe buffer state corruption after unsuccessful atomic
read from pipe was fixed (bsc#964732).CVE-2015-8709: kernel/ptrace.c in the Linux kernel mishandled uid and
gid mappings, which allowed local users to gain privileges by establishing
a user namespace, waiting for a root process to enter that namespace
with an unsafe uid or gid, and then using the ptrace system call. NOTE:
the vendor states 'there is no kernel bug here.' (bsc#960563)
- ID
- SUSE-SU-2016:1031-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2016/suse-su-20161031-1/
- Published
-
2016-04-14T11:41:48
(8 years ago) - Modified
-
2016-04-14T11:41:48
(8 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2016-648
- DSA-3503-1
- ELSA-2016-0494
- ELSA-2016-2574
- ELSA-2016-3528
- ELSA-2017-0817
- ELSA-2018-4134
- ELSA-2018-4145
- FEDORA-2016-5d43766e33
- FEDORA-2016-6ce812a1e0
- FEDORA-2016-7e12ae5359
- FEDORA-2016-9fbe2c258b
- FEDORA-2016-e7162262b0
- RHSA-2015:2152
- RHSA-2016:0494
- RHSA-2016:2574
- RHSA-2016:2584
- RHSA-2017:0817
- SUSE-SU-2016:0785-1
- SUSE-SU-2016:0911-1
- SUSE-SU-2016:1019-1
- SUSE-SU-2016:1032-1
- SUSE-SU-2016:1033-1
- SUSE-SU-2016:1034-1
- SUSE-SU-2016:1035-1
- SUSE-SU-2016:1037-1
- SUSE-SU-2016:1038-1
- SUSE-SU-2016:1039-1
- SUSE-SU-2016:1040-1
- SUSE-SU-2016:1041-1
- SUSE-SU-2016:1045-1
- SUSE-SU-2016:1046-1
- SUSE-SU-2016:1102-1
- SUSE-SU-2016:1203-1
- SUSE-SU-2016:1764-1
- SUSE-SU-2016:2074-1
- SUSE-SU-2017:0575-1
- USN-2847-1
- USN-2848-1
- USN-2849-1
- USN-2850-1
- USN-2851-1
- USN-2852-1
- USN-2853-1
- USN-2854-1
- USN-2928-1
- USN-2928-2
- USN-2929-1
- USN-2929-2
- USN-2930-1
- USN-2930-2
- USN-2930-3
- USN-2931-1
- USN-2932-1
- USN-2946-1
- USN-2946-2
- USN-2947-1
- USN-2947-2
- USN-2947-3
- USN-2948-1
- USN-2949-1
- USN-2967-1
- USN-2967-2
- USN-2968-1
- USN-2968-2
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings | https://www.suse.com/support/security/rating/ | |
Suse | URL of this CSAF notice | https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1031-1.json | |
Suse | URL for SUSE-SU-2016:1031-1 | https://www.suse.com/support/update/announcement/2016/suse-su-20161031-1/ | |
Suse | E-Mail link for SUSE-SU-2016:1031-1 | https://lists.suse.com/pipermail/sle-security-updates/2016-April/002002.html | |
Bugzilla | SUSE Bug 960563 | https://bugzilla.suse.com/960563 | |
Bugzilla | SUSE Bug 964732 | https://bugzilla.suse.com/964732 | |
Bugzilla | SUSE Bug 966683 | https://bugzilla.suse.com/966683 | |
Bugzilla | SUSE Bug 967773 | https://bugzilla.suse.com/967773 | |
CVE | SUSE CVE CVE-2015-8709 page | https://www.suse.com/security/cve/CVE-2015-8709/ | |
CVE | SUSE CVE CVE-2015-8812 page | https://www.suse.com/security/cve/CVE-2015-8812/ | |
CVE | SUSE CVE CVE-2016-0774 page | https://www.suse.com/security/cve/CVE-2016-0774/ | |
CVE | SUSE CVE CVE-2016-2384 page | https://www.suse.com/security/cve/CVE-2016-2384/ |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |