SB2017091432 - Red Hat Enterprise Linux 6 update for kernel 



SB2017091432 - Red Hat Enterprise Linux 6 update for kernel

Published: September 14, 2017 Updated: April 24, 2025

Security Bulletin ID SB2017091432
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Stack-based buffer overflow (CVE-ID: CVE-2017-1000251)

The vulnerability allows an adjacent attacker to execute arbitrary code on the host system.

The weakness exists due to a stack-based buffer overflow in the processing of L2CAP configuration. An adjacent attacker can submit a specially crafted Bluetooth protocol, trigger memory corruption in the Bluetooth stack and execute arbitrary code in kernel space.

Successful exploitation of the vulnerability may result in host system compromise.

2) Security restrictions bypass (CVE-ID: CVE-2017-7895)

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to boundary error when handling a user-supplied input. A remote attacker can send a specially crafted request, trigger pointer-arithmetic errors or possibly have unspecified other impact related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.

Successful exploitation of the vulnerability results in access to the system.

Remediation

Install update from vendor's website.