[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2016:3049-1 -- SLES kernel

ID: oval:org.secpod.oval:def:89045161Date: (C)2021-08-03   (M)2023-12-07
Class: PATCHFamily: unix




The SUSE Linux Enterprise 12 SP2 kernel was updated to receive critical security fixes. The following security bugs were fixed: - CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges . - CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service by leveraging the CAP_NET_ADMIN capability . - CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service or possibly have unspecified other impact via crafted SCTP data .

Platform:
SUSE Linux Enterprise Server 12 SP2
Product:
kernel
Reference:
SUSE-SU-2016:3049-1
CVE-2016-8632
CVE-2016-8655
CVE-2016-9555
CVE    3
CVE-2016-8632
CVE-2016-8655
CVE-2016-9555
CPE    2
cpe:/o:linux:linux_kernel
cpe:/o:suse:suse_linux_enterprise_server:12:sp2

© SecPod Technologies