SB2016121001 - Two vulnerabilities in Linux kernel
Published: December 10, 2016
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Stack-based buffer overflow (CVE-ID: CVE-2016-8399)
The vulnerability allows a local user to cause kernel panic or escalate privileges.
The vulnerability exists due to a boundary error when crating an ICMP header. A local user can create a very short ICMP header and execute arbitrary code within the contest of the kernel.
Successful exploitation of the vulnerability may allow a local user to escalate privileges on the system.
2) Stack-based buffer overflow (CVE-ID: CVE-2016-8632)
The vulnerability allows a local user to cause kernel panic or escalate privileges.
The vulnerability exists due to a boundary error during minimum bearer MTU check within the tipc_msg_build() function. A local user can set a very short MTU, trigger stack-based buffer overflow and cause kernel panic or execute arbitrary code on the target system with elevated privileges.
Successful exploitation of the vulnerability may allow an attacker to cause kernel panic or escalate privileges on the system.
Remediation
Install update from vendor's website.