[SUSE-SU-2016:1596-1] Security update for the Linux Kernel

Severity Important
Affected Packages 28
CVEs 1

Security update for the Linux Kernel

The SUSE Linux Enterprise 12 GA kernel was updated to fix one security issue.

The following security bug was fixed:
- CVE-2016-1583: Prevent the usage of mmap when the lower file system does not allow it. This could have lead to local privilege escalation when ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid (bsc#983143).

Package Affected Version
pkg:rpm/suse/kernel-xen?arch=x86_64&distro=sles-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-xen?arch=x86_64&distro=sled-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-xen-devel?arch=x86_64&distro=sles-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-xen-devel?arch=x86_64&distro=sled-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-xen-base?arch=x86_64&distro=sles-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sled-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-source?arch=noarch&distro=sled-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-macros?arch=noarch&distro=sled-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-devel?arch=noarch&distro=sled-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-default?arch=x86_64&distro=sled-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-default-man?arch=s390x&distro=sles-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-default-extra?arch=x86_64&distro=sled-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sled-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-12 < 3.12.55-52.45.1
pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-12 < 3.12.55-52.45.1
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/suse/kernel-xen?arch=x86_64&distro=sles-12 suse kernel-xen < 3.12.55-52.45.1 sles-12 x86_64
Affected pkg:rpm/suse/kernel-xen?arch=x86_64&distro=sled-12 suse kernel-xen < 3.12.55-52.45.1 sled-12 x86_64
Affected pkg:rpm/suse/kernel-xen-devel?arch=x86_64&distro=sles-12 suse kernel-xen-devel < 3.12.55-52.45.1 sles-12 x86_64
Affected pkg:rpm/suse/kernel-xen-devel?arch=x86_64&distro=sled-12 suse kernel-xen-devel < 3.12.55-52.45.1 sled-12 x86_64
Affected pkg:rpm/suse/kernel-xen-base?arch=x86_64&distro=sles-12 suse kernel-xen-base < 3.12.55-52.45.1 sles-12 x86_64
Affected pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-12 suse kernel-syms < 3.12.55-52.45.1 sles-12 x86_64
Affected pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sled-12 suse kernel-syms < 3.12.55-52.45.1 sled-12 x86_64
Affected pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-12 suse kernel-syms < 3.12.55-52.45.1 sles-12 s390x
Affected pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-12 suse kernel-syms < 3.12.55-52.45.1 sles-12 ppc64le
Affected pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-12 suse kernel-source < 3.12.55-52.45.1 sles-12 noarch
Affected pkg:rpm/suse/kernel-source?arch=noarch&distro=sled-12 suse kernel-source < 3.12.55-52.45.1 sled-12 noarch
Affected pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-12 suse kernel-macros < 3.12.55-52.45.1 sles-12 noarch
Affected pkg:rpm/suse/kernel-macros?arch=noarch&distro=sled-12 suse kernel-macros < 3.12.55-52.45.1 sled-12 noarch
Affected pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-12 suse kernel-devel < 3.12.55-52.45.1 sles-12 noarch
Affected pkg:rpm/suse/kernel-devel?arch=noarch&distro=sled-12 suse kernel-devel < 3.12.55-52.45.1 sled-12 noarch
Affected pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-12 suse kernel-default < 3.12.55-52.45.1 sles-12 x86_64
Affected pkg:rpm/suse/kernel-default?arch=x86_64&distro=sled-12 suse kernel-default < 3.12.55-52.45.1 sled-12 x86_64
Affected pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-12 suse kernel-default < 3.12.55-52.45.1 sles-12 s390x
Affected pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-12 suse kernel-default < 3.12.55-52.45.1 sles-12 ppc64le
Affected pkg:rpm/suse/kernel-default-man?arch=s390x&distro=sles-12 suse kernel-default-man < 3.12.55-52.45.1 sles-12 s390x
Affected pkg:rpm/suse/kernel-default-extra?arch=x86_64&distro=sled-12 suse kernel-default-extra < 3.12.55-52.45.1 sled-12 x86_64
Affected pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-12 suse kernel-default-devel < 3.12.55-52.45.1 sles-12 x86_64
Affected pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sled-12 suse kernel-default-devel < 3.12.55-52.45.1 sled-12 x86_64
Affected pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-12 suse kernel-default-devel < 3.12.55-52.45.1 sles-12 s390x
Affected pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-12 suse kernel-default-devel < 3.12.55-52.45.1 sles-12 ppc64le
Affected pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-12 suse kernel-default-base < 3.12.55-52.45.1 sles-12 x86_64
Affected pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-12 suse kernel-default-base < 3.12.55-52.45.1 sles-12 s390x
Affected pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-12 suse kernel-default-base < 3.12.55-52.45.1 sles-12 ppc64le
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...