SB2017101822 - Fedora 25 update for kernel
Published: October 18, 2017 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Memory leak (CVE-ID: CVE-2017-12190)
The vulnerability allows a local attacker to cause DoS condition on the target system.The weakness exists due to an out-of-memory condition. A local attacker can cause a memory leak and possible system lock up.
2) Use-after-free (CVE-ID: CVE-2017-15265)
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The vulnerability exists due to use-after-free error in the ALSA sequencer interface (/dev/snd/seq). A local attacker can run a specially crafted application, trigger memory corruption and execute arbitrary code with root privileges.
Successful exploitation of the vulnerability may result in system compromise.
3) Null pointer dereference (CVE-ID: CVE-2017-15299)
The vulnerability allows a local attacker to cause DoS condition on the target system.The weakness exists due to the KEYS subsystem mishandles use of add_key for a key that already exists but is uninstantiated. A local attacker can supply specially crafted keys, trigger null pointer dereference and cause the service to crash.
Successful exploitation of the vulnerability results in denial of service.
4) Memory corruption (CVE-ID: CVE-2017-1000255)
The vulnerability allows a local user to execute arbitrary code with escalated privileges.The vulnerability exists due to a boundary error in the Linux kernel's when handling signal frame on PowerPC systems. A malicious local user process could craft a signal frame allowing an attacker to corrupt memory and execute arbitrary code on the target system with escalated privileges.
5) Privilege escalation (CVE-ID: CVE-2017-5123)
The vulnerability allows a local user to escalate privileges on the system.The waitid implementation in kernel/exit.c in the Linux kernel through 4.13.4 does not check that the incoming argument points to the userspace. This can allow local users to write directly to kernel memory, which could lead to privilege escalation.
Remediation
Install update from vendor's website.