The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Micro Focus openSUSE

vulnerability alert CVE-2016-2384

Linux kernel: use after free in the usb-audio driver

Synthesis of the vulnerability

An attacker can force a double free in the usb-audio driver of the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Impacted products: Debian, Fedora, Linux, openSUSE, openSUSE Leap, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 1/4.
Creation date: 15/02/2016.
Revision date: 15/05/2017.
Identifiers: CERTFR-2016-AVI-082, CERTFR-2016-AVI-099, CERTFR-2016-AVI-103, CERTFR-2016-AVI-110, CVE-2016-2384, DSA-3503-1, FEDORA-2016-7e12ae5359, FEDORA-2016-9fbe2c258b, FEDORA-2016-e7162262b0, openSUSE-SU-2016:1008-1, openSUSE-SU-2016:2144-1, openSUSE-SU-2016:2649-1, RHSA-2016:2574-02, RHSA-2016:2584-02, RHSA-2017:0817-01, SUSE-SU-2016:0785-1, SUSE-SU-2016:0911-1, SUSE-SU-2016:1019-1, SUSE-SU-2016:1102-1, SUSE-SU-2016:1203-1, SUSE-SU-2016:1764-1, SUSE-SU-2016:2074-1, USN-2928-1, USN-2928-2, USN-2929-1, USN-2929-2, USN-2930-1, USN-2930-2, USN-2930-3, USN-2931-1, USN-2932-1, VIGILANCE-VUL-18941.

Description of the vulnerability

The Linux kernel includes a generic device driver for devices that comply with the MIDI interface.

However, in case of error, the function snd_usbmidi_create() frees an objet describing the MIDI interface, although this freeing is already handled by a caller function. The net result is a double free.

An attacker can therefore force a double free in the usb-audio driver of the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability announce CVE-2016-9131 CVE-2016-9147 CVE-2016-9444

ISC BIND: four vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of ISC BIND.
Impacted products: Debian, BIG-IP Hardware, TMOS, Fedora, HP-UX, AIX, BIND, Juniper J-Series, JUNOS, openSUSE, openSUSE Leap, Solaris, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Creation date: 12/01/2017.
Identifiers: bulletinjan2017, c05381687, CERTFR-2017-AVI-013, CERTFR-2017-AVI-111, CVE-2016-9131, CVE-2016-9147, CVE-2016-9444, CVE-2016-9778, DLA-805-1, DSA-3758-1, FEDORA-2017-59ca54c94e, FEDORA-2017-87992a0557, FEDORA-2017-8f23f564ad, FEDORA-2017-f44f2f5a48, HPESBUX03699, JSA10785, K02138183, openSUSE-SU-2017:0182-1, openSUSE-SU-2017:0193-1, RHSA-2017:0062-01, RHSA-2017:0063-01, RHSA-2017:0064-01, SSA:2017-011-01, SSRT110304, SUSE-SU-2017:0111-1, SUSE-SU-2017:0112-1, SUSE-SU-2017:0113-1, USN-3172-1, VIGILANCE-VUL-21552.

Description of the vulnerability

Several vulnerabilities were announced in ISC BIND.

An attacker can force an assertion error via ANY Response, in order to trigger a denial of service. [severity:2/4; CVE-2016-9131]

An attacker can force an assertion error via DNSSEC Information Response, in order to trigger a denial of service. [severity:2/4; CVE-2016-9147]

An attacker can force an assertion error via DS Record Response, in order to trigger a denial of service. [severity:2/4; CVE-2016-9444]

An attacker can force an assertion error via nxdomain-redirect, in order to trigger a denial of service. [severity:2/4; CVE-2016-9778]
Complete Vigil@nce bulletin.... (Free trial)

vulnerability announce CVE-2017-5193 CVE-2017-5194 CVE-2017-5195

irssi: four vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of irssi.
Impacted products: Fedora, openSUSE, openSUSE Leap, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Creation date: 10/01/2017.
Identifiers: CVE-2017-5193, CVE-2017-5194, CVE-2017-5195, CVE-2017-5196, FEDORA-2017-7f9e997585, FEDORA-2017-d2e7217e2a, openSUSE-SU-2017:0093-1, openSUSE-SU-2017:0094-1, SSA:2017-011-03, USN-3184-1, VIGILANCE-VUL-21532.

Description of the vulnerability

Several vulnerabilities were announced in irssi.

An attacker can force a NULL pointer to be dereferenced via nickcmp(), in order to trigger a denial of service. [severity:2/4; CVE-2017-5193]

An attacker can force a read at an invalid address via Incomplete Control Codes, in order to trigger a denial of service, or to obtain sensitive information. [severity:2/4; CVE-2017-5194]

An attacker can force a read at an invalid address via Incomplete Character Sequences, in order to trigger a denial of service, or to obtain sensitive information. [severity:2/4; CVE-2017-5195]

An attacker can trigger a fatal error via Invalid Nick Message, in order to trigger a denial of service. [severity:2/4; CVE-2017-5196]
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability announce CVE-2016-9810

GStreamer Plugin: out-of-bounds memory reading via FLIC

Synthesis of the vulnerability

An attacker can force a read at an invalid address via FLIC of GStreamer Plugin, in order to trigger a denial of service, or to obtain sensitive information.
Impacted products: openSUSE, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES.
Severity: 2/4.
Creation date: 29/12/2016.
Identifiers: CVE-2016-9810, openSUSE-SU-2017:0071-1, openSUSE-SU-2017:0141-1, openSUSE-SU-2017:0151-1, openSUSE-SU-2017:0160-1, openSUSE-SU-2017:0298-1, openSUSE-SU-2017:0847-1, SUSE-SU-2016:3288-1, SUSE-SU-2016:3303-1, SUSE-SU-2017:0210-1, SUSE-SU-2017:0225-1, SUSE-SU-2017:0237-1, VIGILANCE-VUL-21477.

Description of the vulnerability

The GStreamer Plugin product offers a web service.

However, it tries to read a memory area located outside the expected range, which triggers a fatal error, or leads to the disclosure of a memory fragment.

An attacker can therefore force a read at an invalid address via FLIC of GStreamer Plugin, in order to trigger a denial of service, or to obtain sensitive information.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability bulletin CVE-2016-10013

Xen: privilege escalation via SYSCALL

Synthesis of the vulnerability

An attacker can trigger a debug trap on a SYSCALL instruction in a guest system managed by Xen, in order to get guest operating system privileges on non Linux systems.
Impacted products: XenServer, Debian, Fedora, openSUSE, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES, Xen.
Severity: 2/4.
Creation date: 20/12/2016.
Identifiers: CERTFR-2016-AVI-424, CTX222565, CVE-2016-10013, DLA-783-1, DSA-3847-1, FEDORA-2016-92e3ea2d1b, FEDORA-2016-bc02bff7f5, openSUSE-SU-2017:0005-1, openSUSE-SU-2017:0007-1, openSUSE-SU-2017:0008-1, SUSE-SU-2016:3207-1, SUSE-SU-2016:3208-1, SUSE-SU-2016:3221-1, SUSE-SU-2016:3241-1, SUSE-SU-2017:0718-1, VIGILANCE-VUL-21423, XSA-204.

Description of the vulnerability

Processing the interrupts, exceptions and traps is part of the job of the hypervisor Xen.

A user program like a debugger in a guest system can define the conditions that trigger debug traps. However, Xen wrongly handles one of these traps when it applies to a SYSCALL instruction, which triggers a privilege transition as part of the processing of system calls.

An attacker can therefore trigger a debug trap on a SYSCALL instruction in a guest system managed by Xen, in order to get guest operating system privileges on non Linux systems.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability alert CVE-2016-9932

Xen: information disclosure via CMPXCHG8B

Synthesis of the vulnerability

A local attacker, inside a guest system, can use an instruction CMPXCHG8B, in order to fetch some bytes of Xen' stack, on the host system.
Impacted products: XenServer, Debian, Fedora, openSUSE, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES, Xen.
Severity: 1/4.
Creation date: 14/12/2016.
Identifiers: CERTFR-2016-AVI-418, CERTFR-2016-AVI-428, CTX219378, CVE-2016-9932, DSA-3847-1, FEDORA-2016-1b868c23a9, FEDORA-2016-bcbae0781f, openSUSE-SU-2017:0005-1, openSUSE-SU-2017:0007-1, openSUSE-SU-2017:0008-1, SUSE-SU-2016:3207-1, SUSE-SU-2016:3208-1, SUSE-SU-2016:3221-1, SUSE-SU-2016:3241-1, SUSE-SU-2017:0718-1, VIGILANCE-VUL-21386, XSA-200.

Description of the vulnerability

The Xen product can emulate x86 instructions.

Some instructions may be modified with an operand size prefix that states the length of the memory access. Thus prefix should not be taken into account for the instruction CMPXCHG8B. However, some parts of the hypervisor do use it.

A local attacker, inside a guest system, can therefore use an instruction CMPXCHG8B, in order to fetch some bytes of Xen' stack, on the host system.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability alert CVE-2016-9572 CVE-2016-9573

OpenJPEG: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of OpenJPEG.
Impacted products: Debian, Fedora, openSUSE, openSUSE Leap, RHEL, SUSE Linux Enterprise Desktop, SLES.
Severity: 2/4.
Creation date: 12/12/2016.
Identifiers: CVE-2016-9572, CVE-2016-9573, DSA-3678-1, FEDORA-2016-0b80dcfe5a, FEDORA-2016-52a1b18397, FEDORA-2016-89ee54c661, FEDORA-2016-fc8577bf00, openSUSE-SU-2017:0155-1, openSUSE-SU-2017:0185-1, openSUSE-SU-2017:0207-1, RHSA-2017:0838-01, SUSE-SU-2016:3270-1, VIGILANCE-VUL-21351.

Description of the vulnerability

Several vulnerabilities were announced in OpenJPEG.

An unknown vulnerability was announced. [severity:2/4; CVE-2016-9572]

An unknown vulnerability was announced. [severity:2/4; CVE-2016-9573]
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability announce CVE-2016-9935 CVE-2016-9936

PHP: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of PHP.
Impacted products: Mac OS X, Debian, openSUSE, openSUSE Leap, PHP, Slackware, Ubuntu.
Severity: 2/4.
Creation date: 08/12/2016.
Identifiers: 61183, 71494, 72978, 73087, 73392, 73631, CVE-2016-9935, CVE-2016-9936, DLA-818-1, DSA-3737-1, HT207615, openSUSE-SU-2016:3239-1, openSUSE-SU-2017:0061-1, openSUSE-SU-2017:0081-1, openSUSE-SU-2017:0598-1, SSA:2016-347-03, USN-3196-1, USN-3211-1, USN-3211-2, VIGILANCE-VUL-21327.

Description of the vulnerability

Several vulnerabilities were announced in PHP.

An attacker can create a memory leak via Spl Hash, in order to trigger a denial of service. [severity:1/4]

An attacker can generate an integer overflow via Calendar, in order to trigger a denial of service, and possibly to run code. [severity:2/4]

An attacker can force the usage of a freed memory area via Zend Allocator Management, in order to trigger a denial of service, and possibly to run code. [severity:2/4; 73392]

An attacker can generate a memory corruption via PDO_Firebird bindParam, in order to trigger a denial of service, and possibly to run code. [severity:2/4; 61183, 71494, 73087]

An attacker can create a memory leak via wddx, in order to trigger a denial of service. [severity:1/4; 73631, CVE-2016-9935]

An unknown vulnerability was announced via wddx. [severity:2/4; 73631, CVE-2016-9935]

An attacker can force the usage of a freed memory area via unserialize(), in order to trigger a denial of service, and possibly to run code. [severity:2/4; 72978, CVE-2016-9936]
Complete Vigil@nce bulletin.... (Free trial)

vulnerability announce CVE-2016-9840 CVE-2016-9841 CVE-2016-9842

zlib: five vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of zlib.
Impacted products: SPSS Statistics, openSUSE, openSUSE Leap, RHEL, zlib.
Severity: 2/4.
Creation date: 05/12/2016.
Identifiers: 2003212, CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843, openSUSE-SU-2016:3202-1, openSUSE-SU-2017:0077-1, openSUSE-SU-2017:0080-1, RHSA-2017:1220-01, RHSA-2017:1221-01, RHSA-2017:1222-01, VIGILANCE-VUL-21262.

Description of the vulnerability

Several vulnerabilities were announced in zlib.

An attacker can generate a memory corruption via Deflate External Linkage, in order to trigger a denial of service, and possibly to run code. [severity:2/4]

A pointer error may have a consequence. [severity:1/4]

An attacker can force a read at an invalid address via inftrees.c, in order to trigger a denial of service, or to obtain sensitive information. [severity:1/4; CVE-2016-9840, CVE-2016-9841]

A negative number shift is undefined. [severity:1/4; CVE-2016-9842]

An attacker can force a read at an invalid address via Big-endian Pointer, in order to trigger a denial of service, or to obtain sensitive information. [severity:1/4; CVE-2016-9843]
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability alert CVE-2016-4412 CVE-2016-9847 CVE-2016-9848

phpMyAdmin: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of phpMyAdmin.
Impacted products: Debian, Fedora, openSUSE, openSUSE Leap, phpMyAdmin, Synology DSM, Synology DS***, Synology RS***.
Severity: 2/4.
Creation date: 25/11/2016.
Identifiers: CERTFR-2016-AVI-390, CVE-2016-4412, CVE-2016-9847, CVE-2016-9848, CVE-2016-9849, CVE-2016-9850, CVE-2016-9851, CVE-2016-9852, CVE-2016-9853, CVE-2016-9854, CVE-2016-9855, CVE-2016-9856, CVE-2016-9857, CVE-2016-9858, CVE-2016-9859, CVE-2016-9860, CVE-2016-9861, CVE-2016-9862, CVE-2016-9863, CVE-2016-9864, CVE-2016-9865, CVE-2016-9866, DLA-757-1, DLA-834-1, FEDORA-2016-2424eeca35, FEDORA-2016-6576a8536b, FEDORA-2016-7fc142da66, openSUSE-SU-2016:3007-1, PMASA-2016-57, PMASA-2016-58, PMASA-2016-59, PMASA-2016-60, PMASA-2016-61, PMASA-2016-62, PMASA-2016-63, PMASA-2016-64, PMASA-2016-65, PMASA-2016-66, PMASA-2016-67, PMASA-2016-68, PMASA-2016-69, PMASA-2016-70, PMASA-2016-71, VIGILANCE-VUL-21206.

Description of the vulnerability

Several vulnerabilities were announced in phpMyAdmin.

An attacker can deceive the user, in order to redirect him to a malicious site. [severity:1/4; CVE-2016-4412, PMASA-2016-57]

An attacker can bypass security features via blowfish_secret, in order to obtain sensitive information. [severity:2/4; CVE-2016-9847, PMASA-2016-58]

An attacker can bypass security features via HttpOnly Cookies, in order to obtain sensitive information. [severity:1/4; CVE-2016-9848, PMASA-2016-59]

An attacker can bypass security features via Null Byte, in order to escalate his privileges. [severity:2/4; CVE-2016-9849, PMASA-2016-60]

An attacker can bypass security features via Allow/deny Rules, in order to escalate his privileges. [severity:2/4; CVE-2016-9850, PMASA-2016-61]

An attacker can bypass security features via Logout Timeout, in order to escalate his privileges. [severity:1/4; CVE-2016-9851, PMASA-2016-62]

An attacker can bypass security features via Full Path Disclosure, in order to obtain sensitive information. [severity:1/4; CVE-2016-9852, CVE-2016-9853, CVE-2016-9854, CVE-2016-9855, PMASA-2016-63]

An attacker can trigger a Cross Site Scripting, in order to run JavaScript code in the context of the web site. [severity:2/4; CVE-2016-9856, CVE-2016-9857, PMASA-2016-64]

An attacker can trigger a fatal error, in order to trigger a denial of service. [severity:2/4; CVE-2016-9858, CVE-2016-9859, CVE-2016-9860, PMASA-2016-65]

An attacker can deceive the user, in order to redirect him to a malicious site. [severity:1/4; CVE-2016-9861, PMASA-2016-66]

An attacker can use a vulnerability via BBCode, in order to run code. [severity:2/4; CVE-2016-9862, PMASA-2016-67]

An attacker can trigger a fatal error via Table Partitioning, in order to trigger a denial of service. [severity:2/4; CVE-2016-9863, PMASA-2016-68]

An attacker can use a SQL injection, in order to read or alter data. [severity:2/4; CVE-2016-9864, PMASA-2016-69]

An attacker can use a vulnerability via PMA_safeUnserialize, in order to run code. [severity:2/4; CVE-2016-9865, PMASA-2016-70]

An attacker can trigger a Cross Site Request Forgery, in order to force the victim to perform operations. [severity:2/4; CVE-2016-9866, PMASA-2016-71]
Complete Vigil@nce bulletin.... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Micro Focus openSUSE: