SUSE-SU-2017:2802-1: important: Security update for Linux Kernel Live Patch 1 for SLE 12 SP2

SUSE Security Update: Security update for Linux Kernel Live Patch 1 for SLE 12 SP2
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2802-1
Rating: important
References: #1053150 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-12762
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 4.4.21-81 fixes several issues.

The following security bugs were fixed:

– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).
– CVE-2017-12762: In drivers/isdn/i4l/isdn_net.c a user-controlled buffer
was copied into a local buffer of constant size using strcpy without a
length check which can cause a buffer overflow (bsc#1053150).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Live Patching 12:

zypper in -t patch SUSE-SLE-Live-Patching-12-2017-1738=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Live Patching 12 (x86_64):

kgraft-patch-4_4_21-81-default-10-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-12762.html
https://bugzilla.suse.com/1053150
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

[Dovecot-news] v2.2.33.2 released

https://dovecot.org/releases/2.2/dovecot-2.2.33.2.tar.gz
https://dovecot.org/releases/2.2/dovecot-2.2.33.2.tar.gz.sig

One more patch release with some fixes:

– doveadm: Fix crash in proxying (or dsync replication) if remote is
running older than v2.2.33
– auth: Fix memory leak in %{ldap_dn}
– dict-sql: Fix data types to work correctly with Cassandra

_______________________________________________
Dovecot-news mailing list
Dovecot-news@dovecot.org
https://dovecot.org/mailman/listinfo/dovecot-news

SUSE-SU-2017:2796-1: important: Security update for Linux Kernel Live Patch 20 for SLE 12 SP1

SUSE Security Update: Security update for Linux Kernel Live Patch 20 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2796-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.74-60_64_57 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1735=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1735=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_74-60_64_57-default-3-4.1
kgraft-patch-3_12_74-60_64_57-xen-3-4.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_74-60_64_57-default-3-4.1
kgraft-patch-3_12_74-60_64_57-xen-3-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2791-1: important: Security update for Linux Kernel Live Patch 21 for SLE 12 SP1

SUSE Security Update: Security update for Linux Kernel Live Patch 21 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2791-1
Rating: important
References: #1038564 #1042892 #1045327 #1052311 #1052368

Cross-References: CVE-2017-1000112 CVE-2017-15274 CVE-2017-8890
CVE-2017-9242
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that solves four vulnerabilities and has one
errata is now available.

Description:

This update for the Linux Kernel 3.12.74-60_64_60 fixes several issues.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000112: Updated patch for this issue to be in sync with the
other livepatches. Description of the issue: Prevent race condition in
net-packet code that could have been exploited by unprivileged users to
gain root access (bsc#1052368, bsc#1052311).
– CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c
was too late in checking whether an overwrite of an skb data structure
may occur, which allowed local users to cause a denial of service
(system crash) via crafted system calls (bsc#1042892).
– CVE-2017-8890: The inet_csk_clone_lock function in
net/ipv4/inet_connection_sock.c allowed attackers to cause a denial of
service (double free) or possibly have unspecified other impact by
leveraging use of the accept system call (bsc#1038564).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1732=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1732=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_74-60_64_60-default-2-4.1
kgraft-patch-3_12_74-60_64_60-xen-2-4.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_74-60_64_60-default-2-4.1
kgraft-patch-3_12_74-60_64_60-xen-2-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000112.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://www.suse.com/security/cve/CVE-2017-8890.html
https://www.suse.com/security/cve/CVE-2017-9242.html
https://bugzilla.suse.com/1038564
https://bugzilla.suse.com/1042892
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1052311
https://bugzilla.suse.com/1052368


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2792-1: important: Security update for Linux Kernel Live Patch 19 for SLE 12 SP1

SUSE Security Update: Security update for Linux Kernel Live Patch 19 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2792-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.74-60_64_54 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1737=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1737=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_74-60_64_54-default-3-4.1
kgraft-patch-3_12_74-60_64_54-xen-3-4.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_74-60_64_54-default-3-4.1
kgraft-patch-3_12_74-60_64_54-xen-3-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2794-1: important: Security update for Linux Kernel Live Patch 1 for SLE 12 SP3

SUSE Security Update: Security update for Linux Kernel Live Patch 1 for SLE 12 SP3
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2794-1
Rating: important
References: #1057950
Cross-References: CVE-2017-1000251
Affected Products:
SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for the Linux Kernel 4.4.82-6_3 fixes one issue.

The following security issue was fixed:

– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Live Patching 12-SP3:

zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2017-1733=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Live Patching 12-SP3 (x86_64):

kgraft-patch-4_4_82-6_3-default-2-2.1
kgraft-patch-4_4_82-6_3-default-debuginfo-2-2.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2793-1: important: Security update for Linux Kernel Live Patch 17 for SLE 12 SP1

SUSE Security Update: Security update for Linux Kernel Live Patch 17 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2793-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.74-60_64_48 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1736=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1736=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_74-60_64_48-default-4-4.1
kgraft-patch-3_12_74-60_64_48-xen-4-4.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_74-60_64_48-default-4-4.1
kgraft-patch-3_12_74-60_64_48-xen-4-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

OPNsense 17.7.6 released
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SUSE-SU-2017:2797-1: important: Security update for Linux Kernel Live Patch 18 for SLE 12 SP1

SUSE Security Update: Security update for Linux Kernel Live Patch 18 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2797-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.74-60_64_51 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1734=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1734=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_74-60_64_51-default-3-4.1
kgraft-patch-3_12_74-60_64_51-xen-3-4.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_74-60_64_51-default-3-4.1
kgraft-patch-3_12_74-60_64_51-xen-3-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2788-1: important: Security update for Linux Kernel Live Patch 16 for SLE 12 SP1

SUSE Security Update: Security update for Linux Kernel Live Patch 16 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2788-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.74-60_64_45 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1729=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1729=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_74-60_64_45-default-5-4.1
kgraft-patch-3_12_74-60_64_45-xen-5-4.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_74-60_64_45-default-5-4.1
kgraft-patch-3_12_74-60_64_45-xen-5-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2790-1: important: Security update for Linux Kernel Live Patch 14 for SLE 12 SP1

SUSE Security Update: Security update for Linux Kernel Live Patch 14 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2790-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.69-60_64_35 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1731=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1731=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_69-60_64_35-default-6-4.1
kgraft-patch-3_12_69-60_64_35-xen-6-4.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_69-60_64_35-default-6-4.1
kgraft-patch-3_12_69-60_64_35-xen-6-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2787-1: important: Security update for Linux Kernel Live Patch 15 for SLE 12 SP1

SUSE Security Update: Security update for Linux Kernel Live Patch 15 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2787-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.74-60_64_40 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1730=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1730=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_74-60_64_40-default-5-4.1
kgraft-patch-3_12_74-60_64_40-xen-5-4.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_74-60_64_40-default-5-4.1
kgraft-patch-3_12_74-60_64_40-xen-5-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2785-1: important: Security update for Linux Kernel Live Patch 8 for SLE 12 SP1

SUSE Security Update: Security update for Linux Kernel Live Patch 8 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2785-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.62-60_64_8 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1720=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1720=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_62-60_64_8-default-12-4.1
kgraft-patch-3_12_62-60_64_8-xen-12-4.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_62-60_64_8-default-12-4.1
kgraft-patch-3_12_62-60_64_8-xen-12-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2786-1: important: Security update for Linux Kernel Live Patch 11 for SLE 12 SP1

SUSE Security Update: Security update for Linux Kernel Live Patch 11 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2786-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.67-60_64_24 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1725=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1725=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_67-60_64_24-default-9-4.1
kgraft-patch-3_12_67-60_64_24-xen-9-4.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_67-60_64_24-default-9-4.1
kgraft-patch-3_12_67-60_64_24-xen-9-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2784-1: important: Security update for Linux Kernel Live Patch 18 for SLE 12

SUSE Security Update: Security update for Linux Kernel Live Patch 18 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2784-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.60-52_63 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1727=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_60-52_63-default-9-4.1
kgraft-patch-3_12_60-52_63-xen-9-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2778-1: important: Security update for Linux Kernel Live Patch 9 for SLE 12 SP1

SUSE Security Update: Security update for Linux Kernel Live Patch 9 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2778-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.67-60_64_18 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1722=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1722=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_67-60_64_18-default-11-4.1
kgraft-patch-3_12_67-60_64_18-xen-11-4.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_67-60_64_18-default-11-4.1
kgraft-patch-3_12_67-60_64_18-xen-11-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2781-1: important: Security update for Linux Kernel Live Patch 24 for SLE 12

SUSE Security Update: Security update for Linux Kernel Live Patch 24 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2781-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_83 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1719=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_83-default-3-4.1
kgraft-patch-3_12_61-52_83-xen-3-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2783-1: important: Security update for Linux Kernel Live Patch 12 for SLE 12 SP1

SUSE Security Update: Security update for Linux Kernel Live Patch 12 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2783-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.69-60_64_29 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1723=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1723=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_69-60_64_29-default-8-4.1
kgraft-patch-3_12_69-60_64_29-xen-8-4.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_69-60_64_29-default-8-4.1
kgraft-patch-3_12_69-60_64_29-xen-8-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2779-1: important: Security update for Linux Kernel Live Patch 10 for SLE 12 SP1

SUSE Security Update: Security update for Linux Kernel Live Patch 10 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2779-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.67-60_64_21 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1721=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1721=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_67-60_64_21-default-10-4.1
kgraft-patch-3_12_67-60_64_21-xen-10-4.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_67-60_64_21-default-10-4.1
kgraft-patch-3_12_67-60_64_21-xen-10-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2780-1: important: Security update for Linux Kernel Live Patch 21 for SLE 12

SUSE Security Update: Security update for Linux Kernel Live Patch 21 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2780-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_72 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1726=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_72-default-5-4.1
kgraft-patch-3_12_61-52_72-xen-5-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org