SB2017041228 - Red Hat Enterprise MRG 2 update for kernel-rt



SB2017041228 - Red Hat Enterprise MRG 2 update for kernel-rt

Published: April 12, 2017 Updated: April 24, 2025

Security Bulletin ID SB2017041228
Severity
Low
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Local access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2016-8650)

The vulnerability allows a local authenticated user to perform a denial of service (DoS) attack.

The mpi_powm function in lib/mpi/mpi-pow.c in the Linux kernel through 4.8.11 does not ensure that memory is allocated for limb data, which allows local users to cause a denial of service (stack memory corruption and panic) via an add_key system call for an RSA key with a zero exponent.


2) Buffer overflow (CVE-ID: CVE-2016-9793)

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to memory corruption within the sock_setsockopt() and max_t() functions in net/core/sock.c. A local user can execute arbitrary code.


3) Off-by-one error (CVE-ID: CVE-2017-2618)

The vulnerability allows a local user to cause denial of service.

The vulnerability exists due to off-by-one error in setprocattr. A local process with the process:setfscreate permission can cause a kernel panic.

Successful exploitation of this vulnerability may lead to denial of service conditions.


4) Race condition (CVE-ID: CVE-2017-2636)

The vulnerability allows a local user to execute arbitrary code.

Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.


5) Resource management error (CVE-ID: CVE-2017-6074)

The vulnerability allows a local user to cause kernel panic.

The vulnerability exists due to invalid free in the dccp_rcv_state_process() function in net/dccp/input.c file in the Linux kernel through 4.9.11 when processing DCCP_PKT_REQUEST packet data structures in the LISTEN state. A local user can use userspace application to make an IPV6_RECVPKTINFO setsockopt system call and cause kernel panic.

Successful exploitation of this vulnerability may result in denial of service condition.



Remediation

Install update from vendor's website.