Upstream information

CVE-2016-4484 at MITRE

Description

The Debian initrd script for the cryptsetup package 2:1.7.3-2 and earlier allows physically proximate attackers to gain shell access via many log in attempts with an invalid password.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having low severity.

CVSS v2 Scores
  National Vulnerability Database SUSE
Base Score 7.2 4.7
Vector AV:L/AC:L/Au:N/C:C/I:C/A:C AV:L/AC:H/Au:N/C:C/I:P/A:N
Access Vector Local Local
Access Complexity Low High
Authentication None None
Confidentiality Impact Complete Complete
Integrity Impact Complete Partial
Availability Impact Complete None
CVSS v3 Scores
  National Vulnerability Database
Base Score 6.8
Vector CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector Physical
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
CVSSv3 Version 3

Note from the SUSE Security Team

This problem does not affect SUSE Linux Enterprise 11 and older versions, as they use a different method for mounting cryptographic filesystems during boot.

SUSE Bugzilla entry: 1009220 [RESOLVED / INVALID]

No SUSE Security Announcements cross referenced.


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification. The updates are grouped by state of their lifecycle. SUSE product lifecycles are documented on the lifecycle page.

Product(s) Source package State
Products under Long Term Service Pack support and receiving important and critical security fixes.
SUSE Linux Enterprise Server 15-ESPOS yast2-bootloader Already fixed
Products past their end of life and not receiving proactive updates anymore.
HPE Helion OpenStack 8 dracut Not affected
HPE Helion OpenStack 8 grub2 Not affected
HPE Helion OpenStack 8 yast2-bootloader Already fixed
SUSE CaaS Platform 3.0 dracut Not affected
SUSE CaaS Platform 3.0 grub2 Not affected
SUSE Linux Enterprise Desktop 11 SP3 grub2 Not affected
SUSE Linux Enterprise Desktop 11 SP4 grub2 Not affected
SUSE Linux Enterprise Desktop 12 SP1 dracut Not affected
SUSE Linux Enterprise Desktop 12 SP1 grub2 Not affected
SUSE Linux Enterprise Desktop 12 SP2 dracut Ignore
SUSE Linux Enterprise Desktop 12 SP2 grub2 Ignore
SUSE Linux Enterprise Desktop 12 SP3 dracut Not affected
SUSE Linux Enterprise Desktop 12 SP3 grub2 Not affected
SUSE Linux Enterprise Desktop 12 SP3 yast2-bootloader Already fixed
SUSE Linux Enterprise Desktop 15 yast2-bootloader Already fixed
SUSE Linux Enterprise High Performance Computing 15 yast2-bootloader Already fixed
SUSE Linux Enterprise High Performance Computing 15-ESPOS yast2-bootloader Already fixed
SUSE Linux Enterprise High Performance Computing 15-LTSS yast2-bootloader Already fixed
SUSE Linux Enterprise Module for Basesystem 15 yast2-bootloader Already fixed
SUSE Linux Enterprise Point of Sale 12 SP2-CLIENT dracut Ignore
SUSE Linux Enterprise Point of Sale 12 SP2-CLIENT grub2 Ignore
SUSE Linux Enterprise Server 11 SP3 grub2 Not affected
SUSE Linux Enterprise Server 11 SP3-LTSS grub2 Not affected
SUSE Linux Enterprise Server 11 SP4 grub2 Not affected
SUSE Linux Enterprise Server 11 SP4-LTSS grub2 Not affected
SUSE Linux Enterprise Server 12 SP1 dracut Not affected
SUSE Linux Enterprise Server 12 SP1 grub2 Not affected
SUSE Linux Enterprise Server 12 SP1-LTSS dracut Not affected
SUSE Linux Enterprise Server 12 SP1-LTSS grub2 Not affected
SUSE Linux Enterprise Server 12 SP2 dracut Ignore
SUSE Linux Enterprise Server 12 SP2 grub2 Ignore
SUSE Linux Enterprise Server 12 SP2-BCL dracut Ignore
SUSE Linux Enterprise Server 12 SP2-BCL grub2 Ignore
SUSE Linux Enterprise Server 12 SP2-ESPOS dracut Ignore
SUSE Linux Enterprise Server 12 SP2-ESPOS grub2 Ignore
SUSE Linux Enterprise Server 12 SP2-LTSS dracut Ignore
SUSE Linux Enterprise Server 12 SP2-LTSS grub2 Ignore
SUSE Linux Enterprise Server 12 SP3 dracut Not affected
SUSE Linux Enterprise Server 12 SP3 grub2 Not affected
SUSE Linux Enterprise Server 12 SP3 yast2-bootloader Already fixed
SUSE Linux Enterprise Server 12 SP3-BCL dracut Not affected
SUSE Linux Enterprise Server 12 SP3-BCL grub2 Not affected
SUSE Linux Enterprise Server 12 SP3-BCL yast2-bootloader Already fixed
SUSE Linux Enterprise Server 12 SP3-ESPOS dracut Not affected
SUSE Linux Enterprise Server 12 SP3-ESPOS grub2 Not affected
SUSE Linux Enterprise Server 12 SP3-ESPOS yast2-bootloader Already fixed
SUSE Linux Enterprise Server 12 SP3-LTSS dracut Not affected
SUSE Linux Enterprise Server 12 SP3-LTSS grub2 Not affected
SUSE Linux Enterprise Server 12 SP3-LTSS yast2-bootloader Already fixed
SUSE Linux Enterprise Server 15 yast2-bootloader Already fixed
SUSE Linux Enterprise Server 15-LTSS yast2-bootloader Already fixed
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 dracut Ignore
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 grub2 Ignore
SUSE Linux Enterprise Server for SAP Applications 12 SP1 dracut Not affected
SUSE Linux Enterprise Server for SAP Applications 12 SP1 grub2 Not affected
SUSE Linux Enterprise Server for SAP Applications 12 SP2 dracut Ignore
SUSE Linux Enterprise Server for SAP Applications 12 SP2 grub2 Ignore
SUSE Linux Enterprise Server for SAP Applications 12 SP3 dracut Not affected
SUSE Linux Enterprise Server for SAP Applications 12 SP3 grub2 Not affected
SUSE Linux Enterprise Server for SAP Applications 12 SP3 yast2-bootloader Already fixed
SUSE Linux Enterprise Server for SAP Applications 15 yast2-bootloader Already fixed
SUSE OpenStack Cloud 7 dracut Ignore
SUSE OpenStack Cloud 7 grub2 Ignore
SUSE OpenStack Cloud 8 dracut Not affected
SUSE OpenStack Cloud 8 grub2 Not affected
SUSE OpenStack Cloud 8 yast2-bootloader Already fixed
SUSE OpenStack Cloud Crowbar 8 dracut Not affected
SUSE OpenStack Cloud Crowbar 8 grub2 Not affected
SUSE OpenStack Cloud Crowbar 8 yast2-bootloader Already fixed


SUSE Timeline for this CVE

CVE page created: Tue Nov 8 17:29:42 2016
CVE page last modified: Tue Jul 2 16:52:47 2024