SB2017101917 - SUSE Linux update for Linux Kernel Live Patch 14 for SLE 12 SP1 



SB2017101917 - SUSE Linux update for Linux Kernel Live Patch 14 for SLE 12 SP1

Published: October 19, 2017

Security Bulletin ID SB2017101917
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Adjecent network
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Stack-based buffer overflow (CVE-ID: CVE-2017-1000251)

The vulnerability allows an adjacent attacker to execute arbitrary code on the host system.

The weakness exists due to a stack-based buffer overflow in the processing of L2CAP configuration. An adjacent attacker can submit a specially crafted Bluetooth protocol, trigger memory corruption in the Bluetooth stack and execute arbitrary code in kernel space.

Successful exploitation of the vulnerability may result in host system compromise.

2) NULL pointer dereference (CVE-ID: CVE-2017-15274)

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists in he security/keys/keyctl.c due to a NULL pointer dereference. A local attacker can create a specially crafted add_key or keyctl system call and cause a denial of service.

Remediation

Install update from vendor's website.