[SUSE-SU-2016:3249-1] Security update for Linux Kernel Live Patch 10 for SLE 12

Severity Important
Affected Packages 2
CVEs 3

Security update for Linux Kernel Live Patch 10 for SLE 12

This update for the Linux Kernel 3.12.51-52_34 fixes several issues.

The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003253).

ID
SUSE-SU-2016:3249-1
Severity
important
URL
https://www.suse.com/support/update/announcement/2016/suse-su-20163249-1/
Published
2016-12-22T14:59:18
(7 years ago)
Modified
2016-12-22T14:59:18
(7 years ago)
Rights
Copyright 2024 SUSE LLC. All rights reserved.
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/suse/kgraft-patch-3_12_51-52_34-xen?arch=x86_64&distro=sles-12 suse kgraft-patch-3_12_51-52_34-xen < 7-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_51-52_34-default?arch=x86_64&distro=sles-12 suse kgraft-patch-3_12_51-52_34-default < 7-2.1 sles-12 x86_64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...