SB2017050101 - Two vulnerabilities in Linux kernel 



SB2017050101 - Two vulnerabilities in Linux kernel

Published: May 1, 2017

Security Bulletin ID SB2017050101
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Local access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Stack-based buffer overflow (CVE-ID: CVE-2016-8632)

The vulnerability allows a local user to cause kernel panic or escalate privileges.

The vulnerability exists due to a boundary error during minimum bearer MTU check within the tipc_msg_build() function. A local user can set a very short MTU, trigger stack-based buffer overflow and cause kernel panic or execute arbitrary code on the target system with elevated privileges.

Successful exploitation of the vulnerability may allow an attacker to cause kernel panic or escalate privileges on the system.


2) Improper resource management (CVE-ID: CVE-2016-6213)

The vulnerability allows a local user to cause denial of service conditions.

The vulnerability exists due the system does not properly limit the number of mounts created in mount space. A local user can create up to 1048576 mounts and consume all available resources on the system.

Successful exploitation of the vulnerability may allow a local user to cause denial of service (DoS) conditions.


Remediation

Install update from vendor's website.