Security update for Linux Kernel Live Patch 17 for SLE 12 SP1
SUSE Patch
security@suse.de
SUSE Security Team
SUSE-SU-2017:2793-1
Final
1
1
2017-10-20T09:30:59Z
current
2017-10-20T09:30:59Z
2017-10-20T09:30:59Z
cve-database/bin/generate-cvrf.pl
2017-02-24T01:00:00Z
Security update for Linux Kernel Live Patch 17 for SLE 12 SP1
This update for the Linux Kernel 3.12.74-60_64_48 fixes one issue.
The following security bugs were fixed:
- CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not consider the case of a NULL payload in conjunction with a nonzero length value, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call (bsc#1045327).
- CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ) was vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space (bsc#1057950).
The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
SUSE-SLE-SAP-12-SP1-2017-1736,SUSE-SLE-SERVER-12-SP1-2017-1736
Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)
https://www.suse.com/support/update/announcement/2017/suse-su-20172793-1/
Link for SUSE-SU-2017:2793-1
https://lists.suse.com/pipermail/sle-security-updates/2017-October/003330.html
E-Mail link for SUSE-SU-2017:2793-1
https://www.suse.com/support/security/rating/
SUSE Security Ratings
https://bugzilla.suse.com/1045327
SUSE Bug 1045327
https://bugzilla.suse.com/1057950
SUSE Bug 1057950
https://www.suse.com/security/cve/CVE-2017-1000251/
SUSE CVE CVE-2017-1000251 page
https://www.suse.com/security/cve/CVE-2017-15274/
SUSE CVE CVE-2017-15274 page
SUSE Linux Enterprise Server 12 SP1-LTSS
SUSE Linux Enterprise Server for SAP Applications 12 SP1
kgraft-patch-3_12_74-60_64_48-default-4-4.1
kgraft-patch-3_12_74-60_64_48-xen-4-4.1
kgraft-patch-3_12_74-60_64_48-default-4-4.1 as a component of SUSE Linux Enterprise Server 12 SP1-LTSS
kgraft-patch-3_12_74-60_64_48-xen-4-4.1 as a component of SUSE Linux Enterprise Server 12 SP1-LTSS
kgraft-patch-3_12_74-60_64_48-default-4-4.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1
kgraft-patch-3_12_74-60_64_48-xen-4-4.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1
The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.
CVE-2017-1000251
SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-4-4.1
SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-4-4.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-4-4.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-4-4.1
important
7.9
AV:A/AC:M/Au:N/C:C/I:C/A:C
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
https://www.suse.com/support/update/announcement/2017/suse-su-20172793-1/
https://www.suse.com/security/cve/CVE-2017-1000251.html
CVE-2017-1000251
https://bugzilla.suse.com/1057389
SUSE Bug 1057389
https://bugzilla.suse.com/1057950
SUSE Bug 1057950
https://bugzilla.suse.com/1070535
SUSE Bug 1070535
https://bugzilla.suse.com/1072162
SUSE Bug 1072162
https://bugzilla.suse.com/1120758
SUSE Bug 1120758
security/keys/keyctl.c in the Linux kernel before 4.11.5 does not consider the case of a NULL payload in conjunction with a nonzero length value, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call, a different vulnerability than CVE-2017-12192.
CVE-2017-15274
SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-4-4.1
SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-4-4.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-4-4.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-4-4.1
moderate
4.9
AV:L/AC:L/Au:N/C:N/I:N/A:C
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
https://www.suse.com/support/update/announcement/2017/suse-su-20172793-1/
https://www.suse.com/security/cve/CVE-2017-15274.html
CVE-2017-15274
https://bugzilla.suse.com/1045327
SUSE Bug 1045327
https://bugzilla.suse.com/1062471
SUSE Bug 1062471