SUSE: 2019:1353-2 moderate: bluez
Summary
This update for bluez fixes the following issues: Security issues fixed: - CVE-2016-9797: Fixed a buffer over-read in l2cap_dump() (bsc#1013708). - CVE-2016-9798: Fixed a use-after-free in conf_opt() (bsc#1013712). - CVE-2016-9917: Fixed a heap-based buffer overflow in read_n() (bsc#1015171). - CVE-2016-9802: Fixed a buffer over-read in l2cap_packet() (bsc#1013893). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 15-SP1: zypper in -t patch SUSE-SLE-Product-WE-15-SP1-2019-1353=1 - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1: zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1353=1 - SUSE Linux Enterprise Module for Desktop Applications 15-SP1: zypper in -t pa...
Read the Full AdvisoryReferences
#1013708 #1013712 #1013893 #1015171
Cross- CVE-2016-9797 CVE-2016-9798 CVE-2016-9802
CVE-2016-9917
Affected Products:
SUSE Linux Enterprise Workstation Extension 15-SP1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1
SUSE Linux Enterprise Module for Desktop Applications 15-SP1
SUSE Linux Enterprise Module for Basesystem 15-SP1
https://www.suse.com/security/cve/CVE-2016-9797.html
https://www.suse.com/security/cve/CVE-2016-9798.html
https://www.suse.com/security/cve/CVE-2016-9802.html
https://www.suse.com/security/cve/CVE-2016-9917.html
https://bugzilla.suse.com/1013708
https://bugzilla.suse.com/1013712
https://bugzilla.suse.com/1013893
https://bugzilla.suse.com/1015171