<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for Linux Kernel Live Patch 17 for SLE 12</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2017:1906-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-07-20T08:05:46Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-07-20T08:05:46Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-07-20T08:05:46Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for Linux Kernel Live Patch 17 for SLE 12</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for the Linux Kernel 3.12.60-52_60 fixes several issues.

The following security bugs were fixed:

- CVE-2017-1000364: An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be 'jumped' over (the stack guard page is bypassed) (bsc#1039496).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-SAP-12-2017-1179,SUSE-SLE-SERVER-12-2017-1179</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171906-1/</URL>
      <Description>Link for SUSE-SU-2017:1906-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2017-July/003044.html</URL>
      <Description>E-Mail link for SUSE-SU-2017:1906-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1013543</URL>
      <Description>SUSE Bug 1013543</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1014271</URL>
      <Description>SUSE Bug 1014271</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1017589</URL>
      <Description>SUSE Bug 1017589</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1025013</URL>
      <Description>SUSE Bug 1025013</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1030575</URL>
      <Description>SUSE Bug 1030575</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1031660</URL>
      <Description>SUSE Bug 1031660</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1039496</URL>
      <Description>SUSE Bug 1039496</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-1000364/</URL>
      <Description>SUSE CVE CVE-2017-1000364 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS" CPE="cpe:/o:suse:sles-ltss:12">SUSE Linux Enterprise Server 12-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12" CPE="cpe:/o:suse:sles_sap:12">SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-3_12_60-52_60-default-6-3.1">
      <FullProductName ProductID="kgraft-patch-3_12_60-52_60-default-6-3.1">kgraft-patch-3_12_60-52_60-default-6-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-3_12_60-52_60-xen-6-3.1">
      <FullProductName ProductID="kgraft-patch-3_12_60-52_60-xen-6-3.1">kgraft-patch-3_12_60-52_60-xen-6-3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kgraft-patch-3_12_60-52_60-default-6-3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-6-3.1">kgraft-patch-3_12_60-52_60-default-6-3.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kgraft-patch-3_12_60-52_60-xen-6-3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-6-3.1">kgraft-patch-3_12_60-52_60-xen-6-3.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kgraft-patch-3_12_60-52_60-default-6-3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-6-3.1">kgraft-patch-3_12_60-52_60-default-6-3.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="kgraft-patch-3_12_60-52_60-xen-6-3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-6-3.1">kgraft-patch-3_12_60-52_60-xen-6-3.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).</Note>
    </Notes>
    <CVE>CVE-2017-1000364</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-6-3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-6-3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-6-3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-6-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171906-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-1000364.html</URL>
        <Description>CVE-2017-1000364</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1039346</URL>
        <Description>SUSE Bug 1039346</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1039348</URL>
        <Description>SUSE Bug 1039348</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042200</URL>
        <Description>SUSE Bug 1042200</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044985</URL>
        <Description>SUSE Bug 1044985</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1071943</URL>
        <Description>SUSE Bug 1071943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075506</URL>
        <Description>SUSE Bug 1075506</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077345</URL>
        <Description>SUSE Bug 1077345</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149726</URL>
        <Description>SUSE Bug 1149726</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
