[SUSE-SU-2016:3063-1] Security update for the Linux Kernel
Severity
Important
Affected Packages
21
CVEs
3
Security update for the Linux Kernel
The SUSE Linux Enterprise 12 kernel was updated to receive critical security fixes.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012754).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685).
- ID
- SUSE-SU-2016:3063-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2016/suse-su-20163063-1/
- Published
-
2016-12-09T08:13:47
(7 years ago) - Modified
-
2016-12-09T08:13:47
(7 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2016-772
- ASA-201612-6
- ASA-201612-7
- ASA-201612-8
- ELSA-2016-3648
- ELSA-2016-3651
- ELSA-2016-3652
- ELSA-2017-0086
- ELSA-2017-0307
- ELSA-2017-0386
- ELSA-2017-3508
- ELSA-2017-3509
- ELSA-2017-3533
- FEDORA-2016-107f03cc00
- FEDORA-2016-5aff4a6bbc
- FEDORA-2016-5cb5b4082d
- RHSA-2017:0086
- RHSA-2017:0091
- RHSA-2017:0307
- RHSA-2017:0386
- RHSA-2017:0387
- SSA:2016-347-01
- SUSE-SU-2016:3039-1
- SUSE-SU-2016:3049-1
- SUSE-SU-2016:3093-1
- SUSE-SU-2016:3094-1
- SUSE-SU-2016:3096-1
- SUSE-SU-2016:3098-1
- SUSE-SU-2016:3100-1
- SUSE-SU-2016:3104-1
- SUSE-SU-2016:3109-1
- SUSE-SU-2016:3111-1
- SUSE-SU-2016:3112-1
- SUSE-SU-2016:3113-1
- SUSE-SU-2016:3116-1
- SUSE-SU-2016:3117-1
- SUSE-SU-2016:3119-1
- SUSE-SU-2016:3169-1
- SUSE-SU-2016:3183-1
- SUSE-SU-2016:3197-1
- SUSE-SU-2016:3205-1
- SUSE-SU-2016:3206-1
- SUSE-SU-2016:3247-1
- SUSE-SU-2016:3249-1
- SUSE-SU-2017:0226-1
- SUSE-SU-2017:0227-1
- SUSE-SU-2017:0228-1
- SUSE-SU-2017:0229-1
- SUSE-SU-2017:0230-1
- SUSE-SU-2017:0231-1
- SUSE-SU-2017:0233-1
- SUSE-SU-2017:0234-1
- SUSE-SU-2017:0235-1
- SUSE-SU-2017:0244-1
- SUSE-SU-2017:0245-1
- SUSE-SU-2017:0246-1
- SUSE-SU-2017:0247-1
- SUSE-SU-2017:0248-1
- SUSE-SU-2017:0249-1
- SUSE-SU-2017:0268-1
- SUSE-SU-2017:0278-1
- SUSE-SU-2017:0333-1
- SUSE-SU-2017:0407-1
- SUSE-SU-2017:0437-1
- SUSE-SU-2017:0494-1
- SUSE-SU-2017:1102-1
- USN-3149-1
- USN-3149-2
- USN-3150-1
- USN-3150-2
- USN-3151-1
- USN-3151-2
- USN-3151-3
- USN-3151-4
- USN-3152-1
- USN-3152-2
- USN-3161-1
- USN-3161-2
- USN-3161-3
- USN-3161-4
- USN-3162-1
- USN-3162-2
- USN-3187-1
- USN-3187-2
- USN-3188-1
- USN-3188-2
- USN-3190-1
- USN-3190-2
- USN-3312-1
- USN-3312-2
- USN-3470-1
- USN-3470-2
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings | https://www.suse.com/support/security/rating/ | |
Suse | URL of this CSAF notice | https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3063-1.json | |
Suse | URL for SUSE-SU-2016:3063-1 | https://www.suse.com/support/update/announcement/2016/suse-su-20163063-1/ | |
Suse | E-Mail link for SUSE-SU-2016:3063-1 | https://lists.suse.com/pipermail/sle-security-updates/2016-December/002458.html | |
Bugzilla | SUSE Bug 1008831 | https://bugzilla.suse.com/1008831 | |
Bugzilla | SUSE Bug 1011685 | https://bugzilla.suse.com/1011685 | |
Bugzilla | SUSE Bug 1012754 | https://bugzilla.suse.com/1012754 | |
CVE | SUSE CVE CVE-2016-8632 page | https://www.suse.com/security/cve/CVE-2016-8632/ | |
CVE | SUSE CVE CVE-2016-8655 page | https://www.suse.com/security/cve/CVE-2016-8655/ | |
CVE | SUSE CVE CVE-2016-9555 page | https://www.suse.com/security/cve/CVE-2016-9555/ |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/kgraft-patch-3_12_60-52_60-xen?arch=x86_64&distro=sles-12 | suse | kgraft-patch-3_12_60-52_60-xen | < 1-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-3_12_60-52_60-default?arch=x86_64&distro=sles-12 | suse | kgraft-patch-3_12_60-52_60-default | < 1-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-xen?arch=x86_64&distro=sles-12 | suse | kernel-xen | < 3.12.60-52.60.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-xen-devel?arch=x86_64&distro=sles-12 | suse | kernel-xen-devel | < 3.12.60-52.60.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-xen-base?arch=x86_64&distro=sles-12 | suse | kernel-xen-base | < 3.12.60-52.60.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-12 | suse | kernel-syms | < 3.12.60-52.60.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-12 | suse | kernel-syms | < 3.12.60-52.60.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-12 | suse | kernel-syms | < 3.12.60-52.60.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-12 | suse | kernel-source | < 3.12.60-52.60.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-12 | suse | kernel-macros | < 3.12.60-52.60.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-12 | suse | kernel-devel | < 3.12.60-52.60.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-12 | suse | kernel-default | < 3.12.60-52.60.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-12 | suse | kernel-default | < 3.12.60-52.60.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-12 | suse | kernel-default | < 3.12.60-52.60.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-man?arch=s390x&distro=sles-12 | suse | kernel-default-man | < 3.12.60-52.60.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-12 | suse | kernel-default-devel | < 3.12.60-52.60.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-12 | suse | kernel-default-devel | < 3.12.60-52.60.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-12 | suse | kernel-default-devel | < 3.12.60-52.60.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-12 | suse | kernel-default-base | < 3.12.60-52.60.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-12 | suse | kernel-default-base | < 3.12.60-52.60.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-12 | suse | kernel-default-base | < 3.12.60-52.60.1 | sles-12 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |