vulnerability
SUSE: CVE-2016-8645: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:N/C:N/I:N/A:C) | Nov 27, 2016 | Jan 19, 2017 | Feb 4, 2022 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:C)
Published
Nov 27, 2016
Added
Jan 19, 2017
Modified
Feb 4, 2022
Description
The TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation, which allows local users to cause a denial of service (system crash) via a crafted application that makes sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c.
Solution(s)
suse-upgrade-cluster-md-kmp-defaultsuse-upgrade-cluster-network-kmp-defaultsuse-upgrade-dlm-kmp-defaultsuse-upgrade-gfs2-kmp-defaultsuse-upgrade-kernel-defaultsuse-upgrade-kernel-docssuse-upgrade-kernel-ec2suse-upgrade-kernel-ec2-develsuse-upgrade-kernel-ec2-extrasuse-upgrade-kernel-obs-buildsuse-upgrade-ocfs2-kmp-default
References
- SUSE-SUSE-SU-2017:0181-1
- SUSE-SUSE-SU-2017:0407-1
- SUSE-SUSE-SU-2017:0464-1
- SUSE-SUSE-SU-2017:0471-1
- BID-94264
- SECTRACK-1037285
- REDHAT-RHSA-2017:1842
- REDHAT-RHSA-2017:2077
- REDHAT-RHSA-2017:2669
- NVD-CVE-2016-8645
- UBUNTU-USN-3161-1
- UBUNTU-USN-3161-2
- UBUNTU-USN-3161-3
- UBUNTU-USN-3161-4
- UBUNTU-USN-3162-1
- UBUNTU-USN-3162-2
- UBUNTU-USN-3290-1
- DEBIAN-DLA-772-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.