openSUSE Security Update : the Linux Kernel (openSUSE-2016-1436)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

The openSUSE 13.1 kernel was updated to receive various critical
security fixes.

The following security bugs were fixed :

- CVE-2016-8655: A race condition in the af_packet
packet_set_ring function could be used by local
attackers to crash the kernel or gain privileges
(bsc#1012754).

- CVE-2016-8632: The tipc_msg_build function in
net/tipc/msg.c in the Linux kernel did not validate the
relationship between the minimum fragment length and the
maximum packet size, which allowed local users to gain
privileges or cause a denial of service (heap-based
buffer overflow) by leveraging the CAP_NET_ADMIN
capability (bnc#1008831).

- CVE-2016-9555: The sctp_sf_ootb function in
net/sctp/sm_statefuns.c in the Linux kernel lacks
chunk-length checking for the first chunk, which allowed
remote attackers to cause a denial of service
(out-of-bounds slab access) or possibly have unspecified
other impact via crafted SCTP data (bnc#1011685).

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=1008831
https://bugzilla.opensuse.org/show_bug.cgi?id=1011685
https://bugzilla.opensuse.org/show_bug.cgi?id=1012754

Solution :

Update the affected the Linux Kernel packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Family: SuSE Local Security Checks

Nessus Plugin ID: 95708 ()

Bugtraq ID:

CVE ID: CVE-2016-8632
CVE-2016-8655
CVE-2016-9555

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now