You are here
Home > Preporuke > Sigurnosni nedostaci Live Patching servisa

Sigurnosni nedostaci Live Patching servisa

SUSE Security Update: Security update for Linux Kernel Live Patch 0 for SLE 12 SP2

______________________________________________________________________________

 

Announcement ID:    SUSE-SU-2017:2801-1

Rating:             important

References:         #1053150 #1057950 #1062471 

Cross-References:   CVE-2017-1000251 CVE-2017-12762 CVE-2017-15274

                   

Affected Products:

                    SUSE Linux Enterprise Live Patching 12

______________________________________________________________________________

 

   An update that fixes three vulnerabilities is now available.

 

Description:

 

   This update for the Linux Kernel 4.4.21-69 fixes several issues.

 

   The following security bugs were fixed:

 

   - CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not

     consider the case of a NULL payload in conjunction with a nonzero length

     value, which allowed local users to cause a denial of service (NULL

     pointer dereference and OOPS) via a crafted add_key or keyctl system

     call (bsc#1062471).

   - CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)

     was vulnerable to a stack overflow vulnerability in the processing of

     L2CAP configuration responses resulting in Remote code execution in

     kernel space (bsc#1057950).

   - CVE-2017-12762: In drivers/isdn/i4l/isdn_net.c a user-controlled buffer

     was copied into a local buffer of constant size using strcpy without a

     length check which can cause a buffer overflow (bsc#1053150).

 

 

Patch Instructions:

 

   To install this SUSE Security Update use YaST online_update.

   Alternatively you can run the command listed for your product:

 

   - SUSE Linux Enterprise Live Patching 12:

 

      zypper in -t patch SUSE-SLE-Live-Patching-12-2017-1744=1

 

   To bring your system up-to-date, use “zypper patch”.

 

 

Package List:

 

   - SUSE Linux Enterprise Live Patching 12 (x86_64):

 

      kgraft-patch-4_4_21-69-default-10-18.13.1

 

 

References:

 

   https://www.suse.com/security/cve/CVE-2017-1000251.html

   https://www.suse.com/security/cve/CVE-2017-12762.html

   https://www.suse.com/security/cve/CVE-2017-15274.html

   https://bugzilla.suse.com/1053150

   https://bugzilla.suse.com/1057950

   https://bugzilla.suse.com/1062471

 

– 

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org

For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

 

 

 

   SUSE Security Update: Security update for Linux Kernel Live Patch 1 for SLE 12 SP2

______________________________________________________________________________

 

Announcement ID:    SUSE-SU-2017:2802-1

Rating:             important

References:         #1053150 #1057950 

Cross-References:   CVE-2017-1000251 CVE-2017-12762

Affected Products:

                    SUSE Linux Enterprise Live Patching 12

______________________________________________________________________________

 

   An update that fixes two vulnerabilities is now available.

 

Description:

 

   This update for the Linux Kernel 4.4.21-81 fixes several issues.

 

   The following security bugs were fixed:

 

   - CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)

     was vulnerable to a stack overflow vulnerability in the processing of

     L2CAP configuration responses resulting in Remote code execution in

     kernel space (bsc#1057950).

   - CVE-2017-12762: In drivers/isdn/i4l/isdn_net.c a user-controlled buffer

     was copied into a local buffer of constant size using strcpy without a

     length check which can cause a buffer overflow (bsc#1053150).

 

 

Patch Instructions:

 

   To install this SUSE Security Update use YaST online_update.

   Alternatively you can run the command listed for your product:

 

   - SUSE Linux Enterprise Live Patching 12:

 

      zypper in -t patch SUSE-SLE-Live-Patching-12-2017-1738=1

 

   To bring your system up-to-date, use “zypper patch”.

 

 

Package List:

 

   - SUSE Linux Enterprise Live Patching 12 (x86_64):

 

      kgraft-patch-4_4_21-81-default-10-4.1

 

 

References:

 

   https://www.suse.com/security/cve/CVE-2017-1000251.html

   https://www.suse.com/security/cve/CVE-2017-12762.html

   https://bugzilla.suse.com/1053150

   https://bugzilla.suse.com/1057950

 

– 

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org

For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

 

   SUSE Security Update: Security update for Linux Kernel Live Patch 2 for SLE 12 SP2

______________________________________________________________________________

 

Announcement ID:    SUSE-SU-2017:2803-1

Rating:             important

References:         #1053150 #1057950 

Cross-References:   CVE-2017-1000251 CVE-2017-12762

Affected Products:

                    SUSE Linux Enterprise Live Patching 12

______________________________________________________________________________

 

   An update that fixes two vulnerabilities is now available.

 

Description:

 

   This update for the Linux Kernel 4.4.21-84 fixes several issues.

 

   The following security bugs were fixed:

 

   - CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)

     was vulnerable to a stack overflow vulnerability in the processing of

     L2CAP configuration responses resulting in Remote code execution in

     kernel space (bsc#1057950).

   - CVE-2017-12762: In drivers/isdn/i4l/isdn_net.c a user-controlled buffer

     was copied into a local buffer of constant size using strcpy without a

     length check which can cause a buffer overflow (bsc#1053150).

 

 

Patch Instructions:

 

   To install this SUSE Security Update use YaST online_update.

   Alternatively you can run the command listed for your product:

 

   - SUSE Linux Enterprise Live Patching 12:

 

      zypper in -t patch SUSE-SLE-Live-Patching-12-2017-1739=1

 

   To bring your system up-to-date, use “zypper patch”.

 

 

Package List:

 

   - SUSE Linux Enterprise Live Patching 12 (x86_64):

 

      kgraft-patch-4_4_21-84-default-9-4.1

 

 

References:

 

   https://www.suse.com/security/cve/CVE-2017-1000251.html

   https://www.suse.com/security/cve/CVE-2017-12762.html

   https://bugzilla.suse.com/1053150

   https://bugzilla.suse.com/1057950

 

– 

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org

For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

 

 

 

   SUSE Security Update: Security update for Linux Kernel Live Patch 3 for SLE 12 SP2

______________________________________________________________________________

 

Announcement ID:    SUSE-SU-2017:2805-1

Rating:             important

References:         #1053150 #1057950 

Cross-References:   CVE-2017-1000251 CVE-2017-12762

Affected Products:

                    SUSE Linux Enterprise Live Patching 12

______________________________________________________________________________

 

   An update that fixes two vulnerabilities is now available.

 

Description:

 

   This update for the Linux Kernel 4.4.21-90 fixes several issues.

 

   The following security bugs were fixed:

 

   - CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)

     was vulnerable to a stack overflow vulnerability in the processing of

     L2CAP configuration responses resulting in Remote code execution in

     kernel space (bsc#1057950).

   - CVE-2017-12762: In drivers/isdn/i4l/isdn_net.c a user-controlled buffer

     was copied into a local buffer of constant size using strcpy without a

     length check which can cause a buffer overflow (bsc#1053150).

 

 

Patch Instructions:

 

   To install this SUSE Security Update use YaST online_update.

   Alternatively you can run the command listed for your product:

 

   - SUSE Linux Enterprise Live Patching 12:

 

      zypper in -t patch SUSE-SLE-Live-Patching-12-2017-1740=1

 

   To bring your system up-to-date, use “zypper patch”.

 

 

Package List:

 

   - SUSE Linux Enterprise Live Patching 12 (x86_64):

 

      kgraft-patch-4_4_21-90-default-9-4.1

 

 

References:

 

   https://www.suse.com/security/cve/CVE-2017-1000251.html

   https://www.suse.com/security/cve/CVE-2017-12762.html

   https://bugzilla.suse.com/1053150

   https://bugzilla.suse.com/1057950

 

– 

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org

For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

 

 

 

   SUSE Security Update: Security update for Linux Kernel Live Patch 4 for SLE 12 SP2

______________________________________________________________________________

 

Announcement ID:    SUSE-SU-2017:2811-1

Rating:             important

References:         #1053150 #1057950 

Cross-References:   CVE-2017-1000251 CVE-2017-12762

Affected Products:

                    SUSE Linux Enterprise Live Patching 12

______________________________________________________________________________

 

   An update that fixes two vulnerabilities is now available.

 

Description:

 

   This update for the Linux Kernel 4.4.38-93 fixes several issues.

 

   The following security bugs were fixed:

 

   - CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)

     was vulnerable to a stack overflow vulnerability in the processing of

     L2CAP configuration responses resulting in Remote code execution in

     kernel space (bsc#1057950).

   - CVE-2017-12762: In drivers/isdn/i4l/isdn_net.c a user-controlled buffer

     was copied into a local buffer of constant size using strcpy without a

     length check which can cause a buffer overflow (bsc#1053150).

 

 

Patch Instructions:

 

   To install this SUSE Security Update use YaST online_update.

   Alternatively you can run the command listed for your product:

 

   - SUSE Linux Enterprise Live Patching 12:

 

      zypper in -t patch SUSE-SLE-Live-Patching-12-2017-1754=1

 

   To bring your system up-to-date, use “zypper patch”.

 

 

Package List:

 

   - SUSE Linux Enterprise Live Patching 12 (x86_64):

 

      kgraft-patch-4_4_38-93-default-9-4.1

 

 

References:

 

   https://www.suse.com/security/cve/CVE-2017-1000251.html

   https://www.suse.com/security/cve/CVE-2017-12762.html

   https://bugzilla.suse.com/1053150

   https://bugzilla.suse.com/1057950

 

– 

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org

For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

 

 

 

   SUSE Security Update: Security update for Linux Kernel Live Patch 5 for SLE 12 SP2

______________________________________________________________________________

 

Announcement ID:    SUSE-SU-2017:2798-1

Rating:             important

References:         #1053150 #1057950 

Cross-References:   CVE-2017-1000251 CVE-2017-12762

Affected Products:

                    SUSE Linux Enterprise Live Patching 12

______________________________________________________________________________

 

   An update that fixes two vulnerabilities is now available.

 

Description:

 

   This update for the Linux Kernel 4.4.49-92_11 fixes several issues.

 

   The following security bugs were fixed:

 

   - CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)

     was vulnerable to a stack overflow vulnerability in the processing of

     L2CAP configuration responses resulting in Remote code execution in

     kernel space (bsc#1057950).

   - CVE-2017-12762: In drivers/isdn/i4l/isdn_net.c a user-controlled buffer

     was copied into a local buffer of constant size using strcpy without a

     length check which can cause a buffer overflow (bsc#1053150).

 

 

Patch Instructions:

 

   To install this SUSE Security Update use YaST online_update.

   Alternatively you can run the command listed for your product:

 

   - SUSE Linux Enterprise Live Patching 12:

 

      zypper in -t patch SUSE-SLE-Live-Patching-12-2017-1741=1

 

   To bring your system up-to-date, use “zypper patch”.

 

 

Package List:

 

   - SUSE Linux Enterprise Live Patching 12 (x86_64):

 

      kgraft-patch-4_4_49-92_11-default-7-4.1

 

 

References:

 

   https://www.suse.com/security/cve/CVE-2017-1000251.html

   https://www.suse.com/security/cve/CVE-2017-12762.html

   https://bugzilla.suse.com/1053150

   https://bugzilla.suse.com/1057950

 

– 

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org

For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

 

 

 

   SUSE Security Update: Security update for Linux Kernel Live Patch 6 for SLE 12 SP2

______________________________________________________________________________

 

Announcement ID:    SUSE-SU-2017:2807-1

Rating:             important

References:         #1053150 #1057950 

Cross-References:   CVE-2017-1000251 CVE-2017-12762

Affected Products:

                    SUSE Linux Enterprise Live Patching 12

______________________________________________________________________________

 

   An update that fixes two vulnerabilities is now available.

 

Description:

 

   This update for the Linux Kernel 4.4.49-92_14 fixes several issues.

 

   The following security bugs were fixed:

 

   - CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)

     was vulnerable to a stack overflow vulnerability in the processing of

     L2CAP configuration responses resulting in Remote code execution in

     kernel space (bsc#1057950).

   - CVE-2017-12762: In drivers/isdn/i4l/isdn_net.c a user-controlled buffer

     was copied into a local buffer of constant size using strcpy without a

     length check which can cause a buffer overflow (bsc#1053150).

 

 

Patch Instructions:

 

   To install this SUSE Security Update use YaST online_update.

   Alternatively you can run the command listed for your product:

 

   - SUSE Linux Enterprise Live Patching 12:

 

      zypper in -t patch SUSE-SLE-Live-Patching-12-2017-1743=1

 

   To bring your system up-to-date, use “zypper patch”.

 

 

Package List:

 

   - SUSE Linux Enterprise Live Patching 12 (x86_64):

 

      kgraft-patch-4_4_49-92_14-default-6-4.1

 

 

References:

 

   https://www.suse.com/security/cve/CVE-2017-1000251.html

   https://www.suse.com/security/cve/CVE-2017-12762.html

   https://bugzilla.suse.com/1053150

   https://bugzilla.suse.com/1057950

 

– 

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org

For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

 

 

 

   SUSE Security Update: Security update for Linux Kernel Live Patch 7 for SLE 12 SP2

______________________________________________________________________________

 

Announcement ID:    SUSE-SU-2017:2809-1

Rating:             important

References:         #1053150 #1057950 

Cross-References:   CVE-2017-1000251 CVE-2017-12762

Affected Products:

                    SUSE Linux Enterprise Live Patching 12

______________________________________________________________________________

 

   An update that fixes two vulnerabilities is now available.

 

Description:

 

   This update for the Linux Kernel 4.4.59-92_17 fixes several issues.

 

   The following security bugs were fixed:

 

   - CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)

     was vulnerable to a stack overflow vulnerability in the processing of

     L2CAP configuration responses resulting in Remote code execution in

     kernel space (bsc#1057950).

   - CVE-2017-12762: In drivers/isdn/i4l/isdn_net.c a user-controlled buffer

     was copied into a local buffer of constant size using strcpy without a

     length check which can cause a buffer overflow (bsc#1053150).

 

 

Patch Instructions:

 

   To install this SUSE Security Update use YaST online_update.

   Alternatively you can run the command listed for your product:

 

   - SUSE Linux Enterprise Live Patching 12:

 

      zypper in -t patch SUSE-SLE-Live-Patching-12-2017-1742=1

 

   To bring your system up-to-date, use “zypper patch”.

 

 

Package List:

 

   - SUSE Linux Enterprise Live Patching 12 (x86_64):

 

      kgraft-patch-4_4_59-92_17-default-5-4.1

 

 

References:

 

   https://www.suse.com/security/cve/CVE-2017-1000251.html

   https://www.suse.com/security/cve/CVE-2017-12762.html

   https://bugzilla.suse.com/1053150

   https://bugzilla.suse.com/1057950

 

– 

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org

For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

 

SUSE Security Update: Security update for Linux Kernel Live Patch 8 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2785-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.62-60_64_8 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1720=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1720=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_62-60_64_8-default-12-4.1
kgraft-patch-3_12_62-60_64_8-xen-12-4.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_62-60_64_8-default-12-4.1
kgraft-patch-3_12_62-60_64_8-xen-12-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
 

SUSE Security Update: Security update for Linux Kernel Live Patch 9 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2778-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.67-60_64_18 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1722=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1722=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_67-60_64_18-default-11-4.1
kgraft-patch-3_12_67-60_64_18-xen-11-4.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_67-60_64_18-default-11-4.1
kgraft-patch-3_12_67-60_64_18-xen-11-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
 

SUSE Security Update: Security update for Linux Kernel Live Patch 10 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2779-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.67-60_64_21 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1721=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1721=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_67-60_64_21-default-10-4.1
kgraft-patch-3_12_67-60_64_21-xen-10-4.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_67-60_64_21-default-10-4.1
kgraft-patch-3_12_67-60_64_21-xen-10-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
 

SUSE Security Update: Security update for Linux Kernel Live Patch 11 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2786-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.67-60_64_24 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1725=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1725=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_67-60_64_24-default-9-4.1
kgraft-patch-3_12_67-60_64_24-xen-9-4.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_67-60_64_24-default-9-4.1
kgraft-patch-3_12_67-60_64_24-xen-9-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
 

SUSE Security Update: Security update for Linux Kernel Live Patch 12 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2783-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.69-60_64_29 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1723=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1723=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_69-60_64_29-default-8-4.1
kgraft-patch-3_12_69-60_64_29-xen-8-4.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_69-60_64_29-default-8-4.1
kgraft-patch-3_12_69-60_64_29-xen-8-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
 

SUSE Security Update: Security update for Linux Kernel Live Patch 13 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2782-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.69-60_64_32 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1724=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1724=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_69-60_64_32-default-7-4.1
kgraft-patch-3_12_69-60_64_32-xen-7-4.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_69-60_64_32-default-7-4.1
kgraft-patch-3_12_69-60_64_32-xen-7-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for Linux Kernel Live Patch 14 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2790-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.69-60_64_35 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1731=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1731=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_69-60_64_35-default-6-4.1
kgraft-patch-3_12_69-60_64_35-xen-6-4.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_69-60_64_35-default-6-4.1
kgraft-patch-3_12_69-60_64_35-xen-6-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for Linux Kernel Live Patch 15 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2787-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.74-60_64_40 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1730=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1730=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_74-60_64_40-default-5-4.1
kgraft-patch-3_12_74-60_64_40-xen-5-4.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_74-60_64_40-default-5-4.1
kgraft-patch-3_12_74-60_64_40-xen-5-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for Linux Kernel Live Patch 16 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2776-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.60-52_57 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1717=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_60-52_57-default-10-4.1
kgraft-patch-3_12_60-52_57-xen-10-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for Linux Kernel Live Patch 17 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2777-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.60-52_60 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1718=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_60-52_60-default-9-4.1
kgraft-patch-3_12_60-52_60-xen-9-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for Linux Kernel Live Patch 18 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2784-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.60-52_63 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1727=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_60-52_63-default-9-4.1
kgraft-patch-3_12_60-52_63-xen-9-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for Linux Kernel Live Patch 19 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2771-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_66 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1715=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_66-default-8-4.1
kgraft-patch-3_12_61-52_66-xen-8-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for Linux Kernel Live Patch 20 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2769-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_69 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1714=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_69-default-6-4.1
kgraft-patch-3_12_61-52_69-xen-6-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for Linux Kernel Live Patch 21 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2780-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_72 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1726=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_72-default-5-4.1
kgraft-patch-3_12_61-52_72-xen-5-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for Linux Kernel Live Patch 22 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2772-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_77 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1713=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_77-default-5-4.1
kgraft-patch-3_12_61-52_77-xen-5-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for Linux Kernel Live Patch 23 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2770-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_80 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1712=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_80-default-4-4.1
kgraft-patch-3_12_61-52_80-xen-4-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for Linux Kernel Live Patch 24 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2781-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_83 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1719=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_83-default-3-4.1
kgraft-patch-3_12_61-52_83-xen-3-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for Linux Kernel Live Patch 25 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2774-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_86 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1711=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_86-default-3-4.1
kgraft-patch-3_12_61-52_86-xen-3-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

Top
More in Preporuke
Sigurnosni nedostatak programskog paketa yadifa

Otkriven je sigurnosni nedostatak u programskom paketu yadifa za operacijski sustav Debian. Otkriveni nedostatak potencijalnim napadačima omogućuje izvođenje napada uskraćivanja...

Close