[SUSE-SU-2017:2521-1] Security update for the Linux Kernel
Severity
Important
Affected Packages
27
CVEs
1
Security update for the Linux Kernel
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive the following security fixes:
- CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel was vulnerable to a stack overflow while processing L2CAP configuration responses, resulting in a potential remote denial-of-service vulnerability but no remote code execution due to use of CONFIG_CC_STACKPROTECTOR. [bnc#1057389]
- ID
- SUSE-SU-2017:2521-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2017/suse-su-20172521-1/
- Published
-
2017-09-18T12:58:15
(7 years ago) - Modified
-
2017-09-18T12:58:15
(7 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2017-914
- ASA-201709-12
- ASA-201709-4
- ASA-201709-8
- ASA-201709-9
- DSA-3981-1
- ELSA-2017-2679
- ELSA-2017-2681
- ELSA-2017-3620
- ELSA-2017-3621
- ELSA-2017-3622
- FEDORA-2017-7369ea045c
- FEDORA-2017-e07d7fb18e
- FEDORA-2018-4ca01704a2
- FEDORA-2018-6367a17aa3
- FEDORA-2018-884a105c04
- RHSA-2017:2679
- RHSA-2017:2681
- RHSA-2017:2704
- SSA:2017-258-02
- SUSE-SU-2017:2459-1
- SUSE-SU-2017:2523-1
- SUSE-SU-2017:2534-1
- SUSE-SU-2017:2548-1
- SUSE-SU-2017:2694-1
- SUSE-SU-2017:2769-1
- SUSE-SU-2017:2770-1
- SUSE-SU-2017:2771-1
- SUSE-SU-2017:2772-1
- SUSE-SU-2017:2773-1
- SUSE-SU-2017:2774-1
- SUSE-SU-2017:2776-1
- SUSE-SU-2017:2777-1
- SUSE-SU-2017:2778-1
- SUSE-SU-2017:2779-1
- SUSE-SU-2017:2780-1
- SUSE-SU-2017:2781-1
- SUSE-SU-2017:2782-1
- SUSE-SU-2017:2783-1
- SUSE-SU-2017:2784-1
- SUSE-SU-2017:2785-1
- SUSE-SU-2017:2786-1
- SUSE-SU-2017:2787-1
- SUSE-SU-2017:2788-1
- SUSE-SU-2017:2790-1
- SUSE-SU-2017:2792-1
- SUSE-SU-2017:2793-1
- SUSE-SU-2017:2794-1
- SUSE-SU-2017:2796-1
- SUSE-SU-2017:2797-1
- SUSE-SU-2017:2798-1
- SUSE-SU-2017:2799-1
- SUSE-SU-2017:2800-1
- SUSE-SU-2017:2801-1
- SUSE-SU-2017:2802-1
- SUSE-SU-2017:2803-1
- SUSE-SU-2017:2804-1
- SUSE-SU-2017:2805-1
- SUSE-SU-2017:2806-1
- SUSE-SU-2017:2807-1
- SUSE-SU-2017:2809-1
- SUSE-SU-2017:2811-1
- SUSE-SU-2017:2816-1
- SUSE-SU-2017:2956-1
- SUSE-SU-2018:0040-1
- USN-3419-1
- USN-3419-2
- USN-3420-1
- USN-3420-2
- USN-3422-1
- USN-3422-2
- USN-3423-1
- VU:240311
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings | https://www.suse.com/support/security/rating/ | |
Suse | URL of this CSAF notice | https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2521-1.json | |
Suse | URL for SUSE-SU-2017:2521-1 | https://www.suse.com/support/update/announcement/2017/suse-su-20172521-1/ | |
Suse | E-Mail link for SUSE-SU-2017:2521-1 | https://lists.suse.com/pipermail/sle-security-updates/2017-September/003245.html | |
Bugzilla | SUSE Bug 1057389 | https://bugzilla.suse.com/1057389 | |
CVE | SUSE CVE CVE-2017-1000251 page | https://www.suse.com/security/cve/CVE-2017-1000251/ |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-12&sp=2 | suse | kernel-syms | < 4.4.74-92.38.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sled-12&sp=2 | suse | kernel-syms | < 4.4.74-92.38.1 | sled-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-12&sp=2 | suse | kernel-syms | < 4.4.74-92.38.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-12&sp=2 | suse | kernel-syms | < 4.4.74-92.38.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-syms?arch=aarch64&distro=sles-12&sp=2 | suse | kernel-syms | < 4.4.74-92.38.1 | sles-12 | aarch64 | |
Affected | pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-12&sp=2 | suse | kernel-source | < 4.4.74-92.38.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-source?arch=noarch&distro=sled-12&sp=2 | suse | kernel-source | < 4.4.74-92.38.1 | sled-12 | noarch | |
Affected | pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-12&sp=2 | suse | kernel-macros | < 4.4.74-92.38.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-macros?arch=noarch&distro=sled-12&sp=2 | suse | kernel-macros | < 4.4.74-92.38.1 | sled-12 | noarch | |
Affected | pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-12&sp=2 | suse | kernel-devel | < 4.4.74-92.38.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-devel?arch=noarch&distro=sled-12&sp=2 | suse | kernel-devel | < 4.4.74-92.38.1 | sled-12 | noarch | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-12&sp=2 | suse | kernel-default | < 4.4.74-92.38.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=sled-12&sp=2 | suse | kernel-default | < 4.4.74-92.38.1 | sled-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-12&sp=2 | suse | kernel-default | < 4.4.74-92.38.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-12&sp=2 | suse | kernel-default | < 4.4.74-92.38.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default?arch=aarch64&distro=sles-12&sp=2 | suse | kernel-default | < 4.4.74-92.38.1 | sles-12 | aarch64 | |
Affected | pkg:rpm/suse/kernel-default-man?arch=s390x&distro=sles-12&sp=2 | suse | kernel-default-man | < 4.4.74-92.38.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default-extra?arch=x86_64&distro=sled-12&sp=2 | suse | kernel-default-extra | < 4.4.74-92.38.1 | sled-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-12&sp=2 | suse | kernel-default-devel | < 4.4.74-92.38.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sled-12&sp=2 | suse | kernel-default-devel | < 4.4.74-92.38.1 | sled-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-12&sp=2 | suse | kernel-default-devel | < 4.4.74-92.38.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-12&sp=2 | suse | kernel-default-devel | < 4.4.74-92.38.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=aarch64&distro=sles-12&sp=2 | suse | kernel-default-devel | < 4.4.74-92.38.1 | sles-12 | aarch64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-12&sp=2 | suse | kernel-default-base | < 4.4.74-92.38.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-12&sp=2 | suse | kernel-default-base | < 4.4.74-92.38.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-12&sp=2 | suse | kernel-default-base | < 4.4.74-92.38.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=sles-12&sp=2 | suse | kernel-default-base | < 4.4.74-92.38.1 | sles-12 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |