<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for Linux Kernel Live Patch 15 for SLE 12 SP1</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2017:1943-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-07-24T13:36:36Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-07-24T13:36:36Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-07-24T13:36:36Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for Linux Kernel Live Patch 15 for SLE 12 SP1</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for the Linux Kernel 3.12.74-60_64_40 fixes one issue.

The following security bugs were fixed:

- CVE-2017-1000364: An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be 'jumped' over (the stack guard page is bypassed) (bsc#1039496).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-SAP-12-SP1-2017-1209,SUSE-SLE-SERVER-12-SP1-2017-1209</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171943-1/</URL>
      <Description>Link for SUSE-SU-2017:1943-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2017-July/003064.html</URL>
      <Description>E-Mail link for SUSE-SU-2017:1943-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1039496</URL>
      <Description>SUSE Bug 1039496</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-1000364/</URL>
      <Description>SUSE CVE CVE-2017-1000364 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP1-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP1-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1-LTSS" CPE="cpe:/o:suse:sles-ltss:12:sp1">SUSE Linux Enterprise Server 12 SP1-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1" CPE="cpe:/o:suse:sles_sap:12:sp1">SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-3_12_74-60_64_40-default-2-3.1">
      <FullProductName ProductID="kgraft-patch-3_12_74-60_64_40-default-2-3.1">kgraft-patch-3_12_74-60_64_40-default-2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-3_12_74-60_64_40-xen-2-3.1">
      <FullProductName ProductID="kgraft-patch-3_12_74-60_64_40-xen-2-3.1">kgraft-patch-3_12_74-60_64_40-xen-2-3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kgraft-patch-3_12_74-60_64_40-default-2-3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-2-3.1">kgraft-patch-3_12_74-60_64_40-default-2-3.1 as a component of SUSE Linux Enterprise Server 12 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kgraft-patch-3_12_74-60_64_40-xen-2-3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-2-3.1">kgraft-patch-3_12_74-60_64_40-xen-2-3.1 as a component of SUSE Linux Enterprise Server 12 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kgraft-patch-3_12_74-60_64_40-default-2-3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-2-3.1">kgraft-patch-3_12_74-60_64_40-default-2-3.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kgraft-patch-3_12_74-60_64_40-xen-2-3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-2-3.1">kgraft-patch-3_12_74-60_64_40-xen-2-3.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).</Note>
    </Notes>
    <CVE>CVE-2017-1000364</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-2-3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-2-3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-2-3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-2-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171943-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-1000364.html</URL>
        <Description>CVE-2017-1000364</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1039346</URL>
        <Description>SUSE Bug 1039346</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1039348</URL>
        <Description>SUSE Bug 1039348</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042200</URL>
        <Description>SUSE Bug 1042200</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044985</URL>
        <Description>SUSE Bug 1044985</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1071943</URL>
        <Description>SUSE Bug 1071943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075506</URL>
        <Description>SUSE Bug 1075506</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077345</URL>
        <Description>SUSE Bug 1077345</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149726</URL>
        <Description>SUSE Bug 1149726</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
