SB2017102007 - SUSE Linux update for Linux Kernel Live Patch 20 for SLE 12 SP1 



SB2017102007 - SUSE Linux update for Linux Kernel Live Patch 20 for SLE 12 SP1

Published: October 20, 2017

Security Bulletin ID SB2017102007
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Adjecent network
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Stack-based buffer overflow (CVE-ID: CVE-2017-1000251)

The vulnerability allows an adjacent attacker to execute arbitrary code on the host system.

The weakness exists due to a stack-based buffer overflow in the processing of L2CAP configuration. An adjacent attacker can submit a specially crafted Bluetooth protocol, trigger memory corruption in the Bluetooth stack and execute arbitrary code in kernel space.

Successful exploitation of the vulnerability may result in host system compromise.

2) NULL pointer dereference (CVE-ID: CVE-2017-15274)

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists in he security/keys/keyctl.c due to a NULL pointer dereference. A local attacker can create a specially crafted add_key or keyctl system call and cause a denial of service.

Remediation

Install update from vendor's website.