- The join_session_keyring function in security/keys/process_keys.c in the Linux kernel
- The nf_nat_redirect_ipv4 function in net/netfilter/nf_nat_redirect.c in the Linux kernel
- kernel/ptrace.c in the Linux kernel
https://www.suse.com/security/cve/CVE-2016-0728.html
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8787
https://www.suse.com/security/cve/CVE-2015-8787.html
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8709
https://www.suse.com/security/cve/CVE-2015-8709.html
CVE-2016-0728
(https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0728)
The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.
Response: The flaw does not exist
This problem affects Linux Kernels 3.8 and above, so SUSE Linux Enterprise 11 and older products are not affected. (https://www.suse.com/security/cve/CVE-2016-0728.html)
The RSA Authentication Manager 8.x does not use an impacted version of the OS.
CVE-2015-8787
(https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8787)
The nf_nat_redirect_ipv4 function in net/netfilter/nf_nat_redirect.c in the Linux kernel before 4.4 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by sending certain IPv4 packets to an incompletely configured interface, a related issue to CVE-2003-1604.
Response: The flaw does not exist
Problem only impacted openSUSE. (https://bugzilla.suse.com/show_bug.cgi?id=963931)
The RSA Authentication Manager 8.x does not use an impacted version of the OS.
CVE-2015-8709
(https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8709)
DISPUTED ** kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call.
Response: The flaw exists but does not add additional risk
The disputed issue involves an increase of privileges by a non-privileged local user. For the AM appliance there is only a single appliance user, a trusted administrator (as “rsaadmin” who already has root privileges). The potential impact of attacks on the system by the privileged administrator are described “the flaw exists but does not add additional risk” since there is already risk for the administrator to attack the system in much more straight forward means.
Related Articles
DSA-2019-062: RSA Authentication Manager Security Update for Linux Kernel Vulnerabilities 3Number of Views False Positive - RSA Authentication Manager 8.1 SP1 P10 vulnerable to CVE 2016-0728, CVE-2015-8787 and CVE-2015-8709 (Open… 32Number of Views RSA Authentication Manager 8.x Linux Kernel Vulnerability (CVE-2017-2636) - False Positive 28Number of Views Linux Kernel vulnerability CVE-2017-17806 on RSA Appliance 3Number of Views Bulkload aborts with error unknown GrpName. 5Number of Views
Trending Articles
RSA Authentication Manager Upgrade Process RSA Release Notes for RSA Authentication Manager 8.8 RSA RADIUS Server service failed to start in the RSA Authentication Manager 8.1 Operations Console Microsoft Entra ID External MFA - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide RSA Release Notes: Cloud Access Service and RSA Authenticators