File _patchinfo of Package patchinfo.5793
<patchinfo incident="5793">
<issue id="2017-15274" tracker="cve" />
<issue id="1045327" tracker="bnc" />
<issue id="1057950" tracker="bnc">VUL-0: CVE-2017-1000251: kernel live patch: bluetooth l2cap remote (bluetooth) code execution</issue>
<issue id="2017-1000251" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>mbenes</packager>
<description>This update for the Linux Kernel 3.12.61-52_72 fixes one issue.
The following security bugs were fixed:
- CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not consider the case of a NULL payload in conjunction with a nonzero length value, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call (bsc#1045327).
- CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ) was vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space (bsc#1057950).
</description>
<summary>Security update for Linux Kernel Live Patch 21 for SLE 12</summary>
</patchinfo>