[SUSE-SU-2016:1596-1] Security update for the Linux Kernel
Severity
Important
Affected Packages
28
CVEs
1
Security update for the Linux Kernel
The SUSE Linux Enterprise 12 GA kernel was updated to fix one security issue.
The following security bug was fixed:
- CVE-2016-1583: Prevent the usage of mmap when the lower file system does not allow it. This could have lead to local privilege escalation when ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid (bsc#983143).
- ID
- SUSE-SU-2016:1596-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2016/suse-su-20161596-1/
- Published
-
2016-06-16T09:08:16
(8 years ago) - Modified
-
2016-06-16T09:08:16
(8 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- DSA-3607-1
- ELSA-2016-2124
- ELSA-2016-2766
- ELSA-2016-3635
- ELSA-2016-3636
- ELSA-2016-3644
- ELSA-2016-3646
- ELSA-2019-4644
- FEDORA-2016-1c409313f4
- FEDORA-2016-63ee0999e4
- FEDORA-2016-73a733f4d9
- RHSA-2016:2766
- SUSE-SU-2016:1672-1
- SUSE-SU-2016:1696-1
- SUSE-SU-2016:1937-1
- SUSE-SU-2016:1961-1
- SUSE-SU-2016:1985-1
- SUSE-SU-2016:1994-1
- SUSE-SU-2016:1995-1
- SUSE-SU-2016:2000-1
- SUSE-SU-2016:2002-1
- SUSE-SU-2016:2005-1
- SUSE-SU-2016:2006-1
- SUSE-SU-2016:2007-1
- SUSE-SU-2016:2009-1
- SUSE-SU-2016:2010-1
- SUSE-SU-2016:2014-1
- SUSE-SU-2016:2105-1
- SUSE-SU-2016:2245-1
- SUSE-SU-2017:0333-1
- USN-2996-1
- USN-2997-1
- USN-2998-1
- USN-2999-1
- USN-3000-1
- USN-3001-1
- USN-3002-1
- USN-3003-1
- USN-3004-1
- USN-3005-1
- USN-3006-1
- USN-3007-1
- USN-3008-1
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings | https://www.suse.com/support/security/rating/ | |
Suse | URL of this CSAF notice | https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1596-1.json | |
Suse | URL for SUSE-SU-2016:1596-1 | https://www.suse.com/support/update/announcement/2016/suse-su-20161596-1/ | |
Suse | E-Mail link for SUSE-SU-2016:1596-1 | https://lists.suse.com/pipermail/sle-security-updates/2016-June/002119.html | |
Bugzilla | SUSE Bug 983143 | https://bugzilla.suse.com/983143 | |
CVE | SUSE CVE CVE-2016-1583 page | https://www.suse.com/security/cve/CVE-2016-1583/ |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/kernel-xen?arch=x86_64&distro=sles-12 | suse | kernel-xen | < 3.12.55-52.45.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-xen?arch=x86_64&distro=sled-12 | suse | kernel-xen | < 3.12.55-52.45.1 | sled-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-xen-devel?arch=x86_64&distro=sles-12 | suse | kernel-xen-devel | < 3.12.55-52.45.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-xen-devel?arch=x86_64&distro=sled-12 | suse | kernel-xen-devel | < 3.12.55-52.45.1 | sled-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-xen-base?arch=x86_64&distro=sles-12 | suse | kernel-xen-base | < 3.12.55-52.45.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-12 | suse | kernel-syms | < 3.12.55-52.45.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sled-12 | suse | kernel-syms | < 3.12.55-52.45.1 | sled-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-12 | suse | kernel-syms | < 3.12.55-52.45.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-12 | suse | kernel-syms | < 3.12.55-52.45.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-12 | suse | kernel-source | < 3.12.55-52.45.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-source?arch=noarch&distro=sled-12 | suse | kernel-source | < 3.12.55-52.45.1 | sled-12 | noarch | |
Affected | pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-12 | suse | kernel-macros | < 3.12.55-52.45.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-macros?arch=noarch&distro=sled-12 | suse | kernel-macros | < 3.12.55-52.45.1 | sled-12 | noarch | |
Affected | pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-12 | suse | kernel-devel | < 3.12.55-52.45.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-devel?arch=noarch&distro=sled-12 | suse | kernel-devel | < 3.12.55-52.45.1 | sled-12 | noarch | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-12 | suse | kernel-default | < 3.12.55-52.45.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=sled-12 | suse | kernel-default | < 3.12.55-52.45.1 | sled-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-12 | suse | kernel-default | < 3.12.55-52.45.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-12 | suse | kernel-default | < 3.12.55-52.45.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-man?arch=s390x&distro=sles-12 | suse | kernel-default-man | < 3.12.55-52.45.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default-extra?arch=x86_64&distro=sled-12 | suse | kernel-default-extra | < 3.12.55-52.45.1 | sled-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-12 | suse | kernel-default-devel | < 3.12.55-52.45.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sled-12 | suse | kernel-default-devel | < 3.12.55-52.45.1 | sled-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-12 | suse | kernel-default-devel | < 3.12.55-52.45.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-12 | suse | kernel-default-devel | < 3.12.55-52.45.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-12 | suse | kernel-default-base | < 3.12.55-52.45.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-12 | suse | kernel-default-base | < 3.12.55-52.45.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-12 | suse | kernel-default-base | < 3.12.55-52.45.1 | sles-12 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |