[LU-8923] kernel update [SLES12 SP1 3.12.67-60.64.21] Created: 08/Dec/16  Updated: 11/Sep/18  Resolved: 11/Sep/18

Status: Resolved
Project: Lustre
Component/s: None
Affects Version/s: None
Fix Version/s: None

Type: Bug Priority: Minor
Reporter: Bob Glossman (Inactive) Assignee: Bob Glossman (Inactive)
Resolution: Fixed Votes: 0
Labels: None

Severity: 3
Rank (Obsolete): 9223372036854775807

 Description   

The SUSE Linux Enterprise 12 SP1 kernel was updated to receive various critical security fixes.

The following security bugs were fixed:

  • CVE-2016-8655: A race condition in the af_packet packet_set_ring
    function could be used by local attackers to crash the kernel or gain
    privileges (bsc#1012754).
  • CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in
    the Linux kernel did not validate the relationship between the minimum
    fragment length and the maximum packet size, which allowed local users to
    gain privileges or cause a denial of service (heap-based buffer overflow)
    by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
  • CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in
    the Linux kernel lacks chunk-length checking for the first chunk, which
    allowed remote attackers to cause a denial of service (out-of-bounds slab
    access) or possibly have unspecified other impact via crafted SCTP data
    (bnc#1011685).


 Comments   
Comment by Gerrit Updater [ 08/Dec/16 ]

Bob Glossman (bob.glossman@intel.com) uploaded a new patch: https://review.whamcloud.com/24252
Subject: LU-8923 kernel: kernel update [SLES12 SP1 3.12.67-60.64.21]
Project: fs/lustre-release
Branch: master
Current Patch Set: 1
Commit: 50c549e9cbeab8b913eb9331077d2d0527b396f4

Generated at Sat Feb 10 02:21:43 UTC 2024 using Jira 9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c.