SB2017050101 - Two vulnerabilities in Linux kernel
Published: May 1, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Stack-based buffer overflow (CVE-ID: CVE-2016-8632)
The vulnerability allows a local user to cause kernel panic or escalate privileges.
The vulnerability exists due to a boundary error during minimum bearer MTU check within the tipc_msg_build() function. A local user can set a very short MTU, trigger stack-based buffer overflow and cause kernel panic or execute arbitrary code on the target system with elevated privileges.
Successful exploitation of the vulnerability may allow an attacker to cause kernel panic or escalate privileges on the system.
2) Improper resource management (CVE-ID: CVE-2016-6213)
The vulnerability allows a local user to cause denial of service conditions.
The vulnerability exists due the system does not properly limit the number of mounts created in mount space. A local user can create up to 1048576 mounts and consume all available resources on the system.
Successful exploitation of the vulnerability may allow a local user to cause denial of service (DoS) conditions.
Remediation
Install update from vendor's website.