SUSE-SU-2026:0765-1

Vulnerability from csaf_suse - Published: 2026-03-03 12:59 - Updated: 2026-03-03 12:59
Summary
Security update for smc-tools
Severity
Important
Notes
Title of the patch: Security update for smc-tools
Description of the patch: This update for smc-tools fixes the following issues: Update to version 1.8.7 (jsc#PED-14601). Security issues fixed: - VUL-1: smc-tools: predictable /tmp file allows for local denial of service (bsc#1230052, bsc#1258495). Other updates and bugfixes: - smc_rnics: fix regression when PFT not available - smcd/smcr: prevent DoS on statistics workfile present in /tmp/ - man pages: update man page for smc_pnet - smc-tools: display sndbuf/RMB stats only if supported by the kernel - smc_rnics: add support for Network Express RNIC in smc_rnics - smc_rnics: add PFT and VF columns to smc_rnics output - libnetlink: fix function declaration to use a void prototype - smc_rnics: update smc_chk to extract PNetID from column 9 - man pages: update man page for --rawids option and PFT and VF columns - smc_rnics: fix missing PPrt values in smc_rnics -r output
Patchnames: SUSE-2026-765,SUSE-SLE-Module-Basesystem-15-SP7-2026-765,SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-765
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for smc-tools",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for smc-tools fixes the following issues:\n\nUpdate to version 1.8.7 (jsc#PED-14601).\n\nSecurity issues fixed:\n\n- VUL-1: smc-tools: predictable /tmp file allows for local denial of service (bsc#1230052, bsc#1258495).\n\nOther updates and bugfixes:\n\n- smc_rnics: fix regression when PFT not available\n- smcd/smcr: prevent DoS on statistics workfile present in /tmp/\n- man pages: update man page for smc_pnet\n- smc-tools: display sndbuf/RMB stats only if supported by the kernel\n- smc_rnics: add support for Network Express RNIC in smc_rnics\n- smc_rnics: add PFT and VF columns to smc_rnics output\n- libnetlink: fix function declaration to use a void prototype\n- smc_rnics: update smc_chk to extract PNetID from column 9\n- man pages: update man page for --rawids option and PFT and VF columns\n- smc_rnics: fix missing PPrt values in smc_rnics -r output\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2026-765,SUSE-SLE-Module-Basesystem-15-SP7-2026-765,SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-765",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0765-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2026:0765-1",
        "url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260765-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2026:0765-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024552.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1230052",
        "url": "https://bugzilla.suse.com/1230052"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1258495",
        "url": "https://bugzilla.suse.com/1258495"
      }
    ],
    "title": "Security update for smc-tools",
    "tracking": {
      "current_release_date": "2026-03-03T12:59:51Z",
      "generator": {
        "date": "2026-03-03T12:59:51Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2026:0765-1",
      "initial_release_date": "2026-03-03T12:59:51Z",
      "revision_history": [
        {
          "date": "2026-03-03T12:59:51Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "smc-tools-1.8.7-150700.3.3.1.aarch64",
                "product": {
                  "name": "smc-tools-1.8.7-150700.3.3.1.aarch64",
                  "product_id": "smc-tools-1.8.7-150700.3.3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "smc-tools-completion-1.8.7-150700.3.3.1.aarch64",
                "product": {
                  "name": "smc-tools-completion-1.8.7-150700.3.3.1.aarch64",
                  "product_id": "smc-tools-completion-1.8.7-150700.3.3.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "smc-tools-1.8.7-150700.3.3.1.i586",
                "product": {
                  "name": "smc-tools-1.8.7-150700.3.3.1.i586",
                  "product_id": "smc-tools-1.8.7-150700.3.3.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "smc-tools-completion-1.8.7-150700.3.3.1.i586",
                "product": {
                  "name": "smc-tools-completion-1.8.7-150700.3.3.1.i586",
                  "product_id": "smc-tools-completion-1.8.7-150700.3.3.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "smc-tools-1.8.7-150700.3.3.1.ppc64le",
                "product": {
                  "name": "smc-tools-1.8.7-150700.3.3.1.ppc64le",
                  "product_id": "smc-tools-1.8.7-150700.3.3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "smc-tools-completion-1.8.7-150700.3.3.1.ppc64le",
                "product": {
                  "name": "smc-tools-completion-1.8.7-150700.3.3.1.ppc64le",
                  "product_id": "smc-tools-completion-1.8.7-150700.3.3.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "smc-tools-1.8.7-150700.3.3.1.s390x",
                "product": {
                  "name": "smc-tools-1.8.7-150700.3.3.1.s390x",
                  "product_id": "smc-tools-1.8.7-150700.3.3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "smc-tools-completion-1.8.7-150700.3.3.1.s390x",
                "product": {
                  "name": "smc-tools-completion-1.8.7-150700.3.3.1.s390x",
                  "product_id": "smc-tools-completion-1.8.7-150700.3.3.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "smc-tools-1.8.7-150700.3.3.1.x86_64",
                "product": {
                  "name": "smc-tools-1.8.7-150700.3.3.1.x86_64",
                  "product_id": "smc-tools-1.8.7-150700.3.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "smc-tools-completion-1.8.7-150700.3.3.1.x86_64",
                "product": {
                  "name": "smc-tools-completion-1.8.7-150700.3.3.1.x86_64",
                  "product_id": "smc-tools-completion-1.8.7-150700.3.3.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
                  "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Package Hub 15 SP7",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Package Hub 15 SP7",
                  "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:packagehub:15:sp7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "smc-tools-1.8.7-150700.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:smc-tools-1.8.7-150700.3.3.1.s390x"
        },
        "product_reference": "smc-tools-1.8.7-150700.3.3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "smc-tools-completion-1.8.7-150700.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:smc-tools-completion-1.8.7-150700.3.3.1.s390x"
        },
        "product_reference": "smc-tools-completion-1.8.7-150700.3.3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "smc-tools-1.8.7-150700.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:smc-tools-1.8.7-150700.3.3.1.aarch64"
        },
        "product_reference": "smc-tools-1.8.7-150700.3.3.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "smc-tools-1.8.7-150700.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:smc-tools-1.8.7-150700.3.3.1.ppc64le"
        },
        "product_reference": "smc-tools-1.8.7-150700.3.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "smc-tools-completion-1.8.7-150700.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:smc-tools-completion-1.8.7-150700.3.3.1.aarch64"
        },
        "product_reference": "smc-tools-completion-1.8.7-150700.3.3.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "smc-tools-completion-1.8.7-150700.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:smc-tools-completion-1.8.7-150700.3.3.1.ppc64le"
        },
        "product_reference": "smc-tools-completion-1.8.7-150700.3.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
      }
    ]
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…