Security update for Linux Kernel Live Patch 9 for SLE 12 SP2
SUSE Patch
security@suse.de
SUSE Security Team
SUSE-SU-2017:2804-1
Final
1
1
2017-10-20T13:13:05Z
current
2017-10-20T13:13:05Z
2017-10-20T13:13:05Z
cve-database/bin/generate-cvrf.pl
2017-02-24T01:00:00Z
Security update for Linux Kernel Live Patch 9 for SLE 12 SP2
This update for the Linux Kernel 4.4.59-92_24 fixes several issues.
The following security bugs were fixed:
- CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ) was vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space (bsc#1057950).
- CVE-2017-12762: In drivers/isdn/i4l/isdn_net.c a user-controlled buffer was copied into a local buffer of constant size using strcpy without a length check which can cause a buffer overflow (bsc#1053150).
The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
SUSE-SLE-Live-Patching-12-2017-1748
Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)
https://www.suse.com/support/update/announcement/2017/suse-su-20172804-1/
Link for SUSE-SU-2017:2804-1
https://lists.suse.com/pipermail/sle-security-updates/2017-October/003340.html
E-Mail link for SUSE-SU-2017:2804-1
https://www.suse.com/support/security/rating/
SUSE Security Ratings
https://bugzilla.suse.com/1053150
SUSE Bug 1053150
https://bugzilla.suse.com/1057950
SUSE Bug 1057950
https://www.suse.com/security/cve/CVE-2017-1000251/
SUSE CVE CVE-2017-1000251 page
https://www.suse.com/security/cve/CVE-2017-12762/
SUSE CVE CVE-2017-12762 page
SUSE Linux Enterprise Live Patching 12
kgraft-patch-4_4_59-92_24-default-4-4.1
kgraft-patch-4_4_59-92_24-default-4-4.1 as a component of SUSE Linux Enterprise Live Patching 12
The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.
CVE-2017-1000251
SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-4-4.1
important
7.9
AV:A/AC:M/Au:N/C:C/I:C/A:C
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
https://www.suse.com/support/update/announcement/2017/suse-su-20172804-1/
https://www.suse.com/security/cve/CVE-2017-1000251.html
CVE-2017-1000251
https://bugzilla.suse.com/1057389
SUSE Bug 1057389
https://bugzilla.suse.com/1057950
SUSE Bug 1057950
https://bugzilla.suse.com/1070535
SUSE Bug 1070535
https://bugzilla.suse.com/1072162
SUSE Bug 1072162
https://bugzilla.suse.com/1120758
SUSE Bug 1120758
In /drivers/isdn/i4l/isdn_net.c: A user-controlled buffer is copied into a local buffer of constant size using strcpy without a length check which can cause a buffer overflow. This affects the Linux kernel 4.9-stable tree, 4.12-stable tree, 3.18-stable tree, and 4.4-stable tree.
CVE-2017-12762
SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-4-4.1
important
6.8
AV:L/AC:L/Au:S/C:C/I:C/A:C
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
https://www.suse.com/support/update/announcement/2017/suse-su-20172804-1/
https://www.suse.com/security/cve/CVE-2017-12762.html
CVE-2017-12762
https://bugzilla.suse.com/1053148
SUSE Bug 1053148
https://bugzilla.suse.com/1053150
SUSE Bug 1053150
https://bugzilla.suse.com/1072162
SUSE Bug 1072162
https://bugzilla.suse.com/1115893
SUSE Bug 1115893