SB2017041227 - Red Hat Enterprise Linux 7 update for kernel
Published: April 12, 2017 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2016-8650)
The vulnerability allows a local authenticated user to perform a denial of service (DoS) attack.
The mpi_powm function in lib/mpi/mpi-pow.c in the Linux kernel through 4.8.11 does not ensure that memory is allocated for limb data, which allows local users to cause a denial of service (stack memory corruption and panic) via an add_key system call for an RSA key with a zero exponent.
2) Buffer overflow (CVE-ID: CVE-2016-9793)
The vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to memory corruption within the sock_setsockopt() and max_t() functions in net/core/sock.c. A local user can execute arbitrary code.
3) Off-by-one error (CVE-ID: CVE-2017-2618)
The vulnerability allows a local user to cause denial of service.
The vulnerability exists due to off-by-one error in setprocattr. A local process with the process:setfscreate permission can cause a kernel panic.
Successful exploitation of this vulnerability may lead to denial of service conditions.
4) Race condition (CVE-ID: CVE-2017-2636)
The vulnerability allows a local user to execute arbitrary code.
Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.
Remediation
Install update from vendor's website.