SB2017041227 - Red Hat Enterprise Linux 7 update for kernel 



SB2017041227 - Red Hat Enterprise Linux 7 update for kernel

Published: April 12, 2017 Updated: April 24, 2025

Security Bulletin ID SB2017041227
Severity
Low
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2016-8650)

The vulnerability allows a local authenticated user to perform a denial of service (DoS) attack.

The mpi_powm function in lib/mpi/mpi-pow.c in the Linux kernel through 4.8.11 does not ensure that memory is allocated for limb data, which allows local users to cause a denial of service (stack memory corruption and panic) via an add_key system call for an RSA key with a zero exponent.


2) Buffer overflow (CVE-ID: CVE-2016-9793)

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to memory corruption within the sock_setsockopt() and max_t() functions in net/core/sock.c. A local user can execute arbitrary code.


3) Off-by-one error (CVE-ID: CVE-2017-2618)

The vulnerability allows a local user to cause denial of service.

The vulnerability exists due to off-by-one error in setprocattr. A local process with the process:setfscreate permission can cause a kernel panic.

Successful exploitation of this vulnerability may lead to denial of service conditions.


4) Race condition (CVE-ID: CVE-2017-2636)

The vulnerability allows a local user to execute arbitrary code.

Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.


Remediation

Install update from vendor's website.