SB2017042852 - Fedora 24 update for kernel
Published: April 28, 2017 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Security restrictions bypass (CVE-ID: CVE-2016-9604)
The vulnerability allows a local attacker to write arbitrary files on the target system.The weakness exists due to root can gain direct access to an internal keyring, such as '.dns_resolver' or '.builtin_trusted_keys' upstream, by joining it as its session keyring. A local attacker can bypass module signature verification by adding a new public key of its own devising to the keyring.
2) Heap-based buffer overflow (CVE-ID: CVE-2017-7477)
The vulnerability allows a remote attacker on the local network execute arbitrary code on the target system.The weakness exists due to heap-based buffer overflow in the skb_to_sgvec() function in the MACsec driver. A remote attacker can use a MAX_SKB_FRAGS+1 size in conjunction with the NETIF_F_FRAGLIST feature, trigger memory corruption and execute arbitrary code with root privileges.
Successful exploitation of the vulnerability results in arbitrary code execution.3) Information disclosure (CVE-ID: CVE-2017-7889)
The vulnerability allows a local attacker to gain access to potentially sensitive information.The weakness exists in the CONFIG_STRICT_DEVMEM protection mechanism due to an improper enforcement. A local attacker can read or write to kernel memory locations in the first megabyte and bypass slab-allocation access restrictions.
4) Denial of service (CVE-ID: CVE-2017-7645)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to a flaw in the NFSv2/NFSv3 server in the nfsd subsystem. A remote attacker can use a long RPC reply related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c. and cause the system to crash.
Successful exploitation of the vulnerability results in denial of service.
Remediation
Install update from vendor's website.