Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2017:2801-1

Опубликовано: 20 окт. 2017
Источник: suse-cvrf

Описание

Security update for Linux Kernel Live Patch 0 for SLE 12 SP2

This update for the Linux Kernel 4.4.21-69 fixes several issues.

The following security bugs were fixed:

  • CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not consider the case of a NULL payload in conjunction with a nonzero length value, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call (bsc#1062471).
  • CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ) was vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space (bsc#1057950).
  • CVE-2017-12762: In drivers/isdn/i4l/isdn_net.c a user-controlled buffer was copied into a local buffer of constant size using strcpy without a length check which can cause a buffer overflow (bsc#1053150).

Список пакетов

SUSE Linux Enterprise Live Patching 12
kgraft-patch-4_4_21-69-default-10-18.13.1

Описание

The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.


Затронутые продукты
SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-10-18.13.1

Ссылки

Описание

In /drivers/isdn/i4l/isdn_net.c: A user-controlled buffer is copied into a local buffer of constant size using strcpy without a length check which can cause a buffer overflow. This affects the Linux kernel 4.9-stable tree, 4.12-stable tree, 3.18-stable tree, and 4.4-stable tree.


Затронутые продукты
SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-10-18.13.1

Ссылки

Описание

security/keys/keyctl.c in the Linux kernel before 4.11.5 does not consider the case of a NULL payload in conjunction with a nonzero length value, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call, a different vulnerability than CVE-2017-12192.


Затронутые продукты
SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-10-18.13.1

Ссылки