Vulnerability from csaf_suse
Published
2016-08-09 11:23
Modified
2016-08-09 11:23
Summary
Security update for Linux Kernel Live Patch 11 for SLE 12

Notes

Title of the patch
Security update for Linux Kernel Live Patch 11 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.51-52_39 fixes several issues. The following security bugs were fixed: - CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764). - CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144). - CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883). - CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856). - CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074). - CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bsc#979064). - CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793). - CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bsc#973570, bsc#955837).
Patchnames
SUSE-SLE-SAP-12-2016-1174,SUSE-SLE-SERVER-12-2016-1174
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
   document: {
      aggregate_severity: {
         namespace: "https://www.suse.com/support/security/rating/",
         text: "important",
      },
      category: "csaf_security_advisory",
      csaf_version: "2.0",
      distribution: {
         text: "Copyright 2024 SUSE LLC. All rights reserved.",
         tlp: {
            label: "WHITE",
            url: "https://www.first.org/tlp/",
         },
      },
      lang: "en",
      notes: [
         {
            category: "summary",
            text: "Security update for Linux Kernel Live Patch 11 for SLE 12",
            title: "Title of the patch",
         },
         {
            category: "description",
            text: "This update for the Linux Kernel 3.12.51-52_39 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883).\n- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856).\n- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074).\n- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bsc#979064).\n- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793).\n- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bsc#973570, bsc#955837).\n",
            title: "Description of the patch",
         },
         {
            category: "details",
            text: "SUSE-SLE-SAP-12-2016-1174,SUSE-SLE-SERVER-12-2016-1174",
            title: "Patchnames",
         },
         {
            category: "legal_disclaimer",
            text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
            title: "Terms of use",
         },
      ],
      publisher: {
         category: "vendor",
         contact_details: "https://www.suse.com/support/security/contact/",
         name: "SUSE Product Security Team",
         namespace: "https://www.suse.com/",
      },
      references: [
         {
            category: "external",
            summary: "SUSE ratings",
            url: "https://www.suse.com/support/security/rating/",
         },
         {
            category: "self",
            summary: "URL of this CSAF notice",
            url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2010-1.json",
         },
         {
            category: "self",
            summary: "URL for SUSE-SU-2016:2010-1",
            url: "https://www.suse.com/support/update/announcement/2016/suse-su-20162010-1/",
         },
         {
            category: "self",
            summary: "E-Mail link for SUSE-SU-2016:2010-1",
            url: "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002196.html",
         },
         {
            category: "self",
            summary: "SUSE Bug 955837",
            url: "https://bugzilla.suse.com/955837",
         },
         {
            category: "self",
            summary: "SUSE Bug 971793",
            url: "https://bugzilla.suse.com/971793",
         },
         {
            category: "self",
            summary: "SUSE Bug 973570",
            url: "https://bugzilla.suse.com/973570",
         },
         {
            category: "self",
            summary: "SUSE Bug 979064",
            url: "https://bugzilla.suse.com/979064",
         },
         {
            category: "self",
            summary: "SUSE Bug 979074",
            url: "https://bugzilla.suse.com/979074",
         },
         {
            category: "self",
            summary: "SUSE Bug 980856",
            url: "https://bugzilla.suse.com/980856",
         },
         {
            category: "self",
            summary: "SUSE Bug 980883",
            url: "https://bugzilla.suse.com/980883",
         },
         {
            category: "self",
            summary: "SUSE Bug 983144",
            url: "https://bugzilla.suse.com/983144",
         },
         {
            category: "self",
            summary: "SUSE Bug 984764",
            url: "https://bugzilla.suse.com/984764",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2013-7446 page",
            url: "https://www.suse.com/security/cve/CVE-2013-7446/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2015-8816 page",
            url: "https://www.suse.com/security/cve/CVE-2015-8816/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2016-0758 page",
            url: "https://www.suse.com/security/cve/CVE-2016-0758/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2016-1583 page",
            url: "https://www.suse.com/security/cve/CVE-2016-1583/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2016-2053 page",
            url: "https://www.suse.com/security/cve/CVE-2016-2053/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2016-3134 page",
            url: "https://www.suse.com/security/cve/CVE-2016-3134/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2016-4470 page",
            url: "https://www.suse.com/security/cve/CVE-2016-4470/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2016-4565 page",
            url: "https://www.suse.com/security/cve/CVE-2016-4565/",
         },
      ],
      title: "Security update for Linux Kernel Live Patch 11 for SLE 12",
      tracking: {
         current_release_date: "2016-08-09T11:23:39Z",
         generator: {
            date: "2016-08-09T11:23:39Z",
            engine: {
               name: "cve-database.git:bin/generate-csaf.pl",
               version: "1",
            },
         },
         id: "SUSE-SU-2016:2010-1",
         initial_release_date: "2016-08-09T11:23:39Z",
         revision_history: [
            {
               date: "2016-08-09T11:23:39Z",
               number: "1",
               summary: "Current version",
            },
         ],
         status: "final",
         version: "1",
      },
   },
   product_tree: {
      branches: [
         {
            branches: [
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                        product: {
                           name: "kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                           product_id: "kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
                        product: {
                           name: "kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
                           product_id: "kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "x86_64",
               },
               {
                  branches: [
                     {
                        category: "product_name",
                        name: "SUSE Linux Enterprise Server for SAP Applications 12",
                        product: {
                           name: "SUSE Linux Enterprise Server for SAP Applications 12",
                           product_id: "SUSE Linux Enterprise Server for SAP Applications 12",
                           product_identification_helper: {
                              cpe: "cpe:/o:suse:sles_sap:12",
                           },
                        },
                     },
                     {
                        category: "product_name",
                        name: "SUSE Linux Enterprise Server 12-LTSS",
                        product: {
                           name: "SUSE Linux Enterprise Server 12-LTSS",
                           product_id: "SUSE Linux Enterprise Server 12-LTSS",
                           product_identification_helper: {
                              cpe: "cpe:/o:suse:sles-ltss:12",
                           },
                        },
                     },
                  ],
                  category: "product_family",
                  name: "SUSE Linux Enterprise",
               },
            ],
            category: "vendor",
            name: "SUSE",
         },
      ],
      relationships: [
         {
            category: "default_component_of",
            full_product_name: {
               name: "kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
               product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
            },
            product_reference: "kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
               product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
            },
            product_reference: "kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
               product_id: "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
            },
            product_reference: "kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
               product_id: "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
            },
            product_reference: "kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS",
         },
      ],
   },
   vulnerabilities: [
      {
         cve: "CVE-2013-7446",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2013-7446",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
               "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
               "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
               "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2013-7446",
               url: "https://www.suse.com/security/cve/CVE-2013-7446",
            },
            {
               category: "external",
               summary: "SUSE Bug 1020452 for CVE-2013-7446",
               url: "https://bugzilla.suse.com/1020452",
            },
            {
               category: "external",
               summary: "SUSE Bug 955654 for CVE-2013-7446",
               url: "https://bugzilla.suse.com/955654",
            },
            {
               category: "external",
               summary: "SUSE Bug 955837 for CVE-2013-7446",
               url: "https://bugzilla.suse.com/955837",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2016-08-09T11:23:39Z",
               details: "moderate",
            },
         ],
         title: "CVE-2013-7446",
      },
      {
         cve: "CVE-2015-8816",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2015-8816",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
               "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
               "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
               "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2015-8816",
               url: "https://www.suse.com/security/cve/CVE-2015-8816",
            },
            {
               category: "external",
               summary: "SUSE Bug 1020452 for CVE-2015-8816",
               url: "https://bugzilla.suse.com/1020452",
            },
            {
               category: "external",
               summary: "SUSE Bug 968010 for CVE-2015-8816",
               url: "https://bugzilla.suse.com/968010",
            },
            {
               category: "external",
               summary: "SUSE Bug 979064 for CVE-2015-8816",
               url: "https://bugzilla.suse.com/979064",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.8,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2016-08-09T11:23:39Z",
               details: "moderate",
            },
         ],
         title: "CVE-2015-8816",
      },
      {
         cve: "CVE-2016-0758",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2016-0758",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
               "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
               "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
               "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2016-0758",
               url: "https://www.suse.com/security/cve/CVE-2016-0758",
            },
            {
               category: "external",
               summary: "SUSE Bug 1020452 for CVE-2016-0758",
               url: "https://bugzilla.suse.com/1020452",
            },
            {
               category: "external",
               summary: "SUSE Bug 1072204 for CVE-2016-0758",
               url: "https://bugzilla.suse.com/1072204",
            },
            {
               category: "external",
               summary: "SUSE Bug 1115893 for CVE-2016-0758",
               url: "https://bugzilla.suse.com/1115893",
            },
            {
               category: "external",
               summary: "SUSE Bug 979867 for CVE-2016-0758",
               url: "https://bugzilla.suse.com/979867",
            },
            {
               category: "external",
               summary: "SUSE Bug 980856 for CVE-2016-0758",
               url: "https://bugzilla.suse.com/980856",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2016-08-09T11:23:39Z",
               details: "important",
            },
         ],
         title: "CVE-2016-0758",
      },
      {
         cve: "CVE-2016-1583",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2016-1583",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
               "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
               "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
               "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2016-1583",
               url: "https://www.suse.com/security/cve/CVE-2016-1583",
            },
            {
               category: "external",
               summary: "SUSE Bug 1020452 for CVE-2016-1583",
               url: "https://bugzilla.suse.com/1020452",
            },
            {
               category: "external",
               summary: "SUSE Bug 1052256 for CVE-2016-1583",
               url: "https://bugzilla.suse.com/1052256",
            },
            {
               category: "external",
               summary: "SUSE Bug 983143 for CVE-2016-1583",
               url: "https://bugzilla.suse.com/983143",
            },
            {
               category: "external",
               summary: "SUSE Bug 983144 for CVE-2016-1583",
               url: "https://bugzilla.suse.com/983144",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2016-08-09T11:23:39Z",
               details: "important",
            },
         ],
         title: "CVE-2016-1583",
      },
      {
         cve: "CVE-2016-2053",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2016-2053",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
               "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
               "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
               "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2016-2053",
               url: "https://www.suse.com/security/cve/CVE-2016-2053",
            },
            {
               category: "external",
               summary: "SUSE Bug 1020452 for CVE-2016-2053",
               url: "https://bugzilla.suse.com/1020452",
            },
            {
               category: "external",
               summary: "SUSE Bug 963762 for CVE-2016-2053",
               url: "https://bugzilla.suse.com/963762",
            },
            {
               category: "external",
               summary: "SUSE Bug 979074 for CVE-2016-2053",
               url: "https://bugzilla.suse.com/979074",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.7,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2016-08-09T11:23:39Z",
               details: "moderate",
            },
         ],
         title: "CVE-2016-2053",
      },
      {
         cve: "CVE-2016-3134",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2016-3134",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
               "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
               "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
               "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2016-3134",
               url: "https://www.suse.com/security/cve/CVE-2016-3134",
            },
            {
               category: "external",
               summary: "SUSE Bug 1020452 for CVE-2016-3134",
               url: "https://bugzilla.suse.com/1020452",
            },
            {
               category: "external",
               summary: "SUSE Bug 1052256 for CVE-2016-3134",
               url: "https://bugzilla.suse.com/1052256",
            },
            {
               category: "external",
               summary: "SUSE Bug 1115893 for CVE-2016-3134",
               url: "https://bugzilla.suse.com/1115893",
            },
            {
               category: "external",
               summary: "SUSE Bug 971126 for CVE-2016-3134",
               url: "https://bugzilla.suse.com/971126",
            },
            {
               category: "external",
               summary: "SUSE Bug 971793 for CVE-2016-3134",
               url: "https://bugzilla.suse.com/971793",
            },
            {
               category: "external",
               summary: "SUSE Bug 986362 for CVE-2016-3134",
               url: "https://bugzilla.suse.com/986362",
            },
            {
               category: "external",
               summary: "SUSE Bug 986365 for CVE-2016-3134",
               url: "https://bugzilla.suse.com/986365",
            },
            {
               category: "external",
               summary: "SUSE Bug 986377 for CVE-2016-3134",
               url: "https://bugzilla.suse.com/986377",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2016-08-09T11:23:39Z",
               details: "moderate",
            },
         ],
         title: "CVE-2016-3134",
      },
      {
         cve: "CVE-2016-4470",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2016-4470",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
               "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
               "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
               "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2016-4470",
               url: "https://www.suse.com/security/cve/CVE-2016-4470",
            },
            {
               category: "external",
               summary: "SUSE Bug 1020452 for CVE-2016-4470",
               url: "https://bugzilla.suse.com/1020452",
            },
            {
               category: "external",
               summary: "SUSE Bug 984755 for CVE-2016-4470",
               url: "https://bugzilla.suse.com/984755",
            },
            {
               category: "external",
               summary: "SUSE Bug 984764 for CVE-2016-4470",
               url: "https://bugzilla.suse.com/984764",
            },
            {
               category: "external",
               summary: "SUSE Bug 991651 for CVE-2016-4470",
               url: "https://bugzilla.suse.com/991651",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2016-08-09T11:23:39Z",
               details: "moderate",
            },
         ],
         title: "CVE-2016-4470",
      },
      {
         cve: "CVE-2016-4565",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2016-4565",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
               "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
               "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
               "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2016-4565",
               url: "https://www.suse.com/security/cve/CVE-2016-4565",
            },
            {
               category: "external",
               summary: "SUSE Bug 1020452 for CVE-2016-4565",
               url: "https://bugzilla.suse.com/1020452",
            },
            {
               category: "external",
               summary: "SUSE Bug 979548 for CVE-2016-4565",
               url: "https://bugzilla.suse.com/979548",
            },
            {
               category: "external",
               summary: "SUSE Bug 980363 for CVE-2016-4565",
               url: "https://bugzilla.suse.com/980363",
            },
            {
               category: "external",
               summary: "SUSE Bug 980883 for CVE-2016-4565",
               url: "https://bugzilla.suse.com/980883",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2016-08-09T11:23:39Z",
               details: "moderate",
            },
         ],
         title: "CVE-2016-4565",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.