SB2017091432 - Red Hat Enterprise Linux 6 update for kernel
Published: September 14, 2017 Updated: April 24, 2025
Security Bulletin ID
SB2017091432
Severity
Low
Patch available
YES
Number of vulnerabilities
2
Exploitation vector
Remote access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Stack-based buffer overflow (CVE-ID: CVE-2017-1000251)
The vulnerability allows an adjacent attacker to execute arbitrary code on the host system.The weakness exists due to a stack-based buffer overflow in the processing of L2CAP configuration. An adjacent attacker can submit a specially crafted Bluetooth protocol, trigger memory corruption in the Bluetooth stack and execute arbitrary code in kernel space.
Successful exploitation of the vulnerability may result in host system compromise.
2) Security restrictions bypass (CVE-ID: CVE-2017-7895)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to boundary error when handling a user-supplied input. A remote attacker can send a specially crafted request, trigger pointer-arithmetic errors or possibly have unspecified other impact related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.
Successful exploitation of the vulnerability results in access to the system.
Remediation
Install update from vendor's website.