SB2017113026 - SUSE Linux update for the Linux Kernel
Published: November 30, 2017 Updated: September 9, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Memory corruption (CVE-ID: CVE-2017-1000253)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to an error when loading of Executable and Linkable Format (ELF) executables. A local user can create a specially crafted ELF binary, trigger memory corruption and execute arbitrary code on the vulnerable system with root privileges.
2) Key management errors (CVE-ID: CVE-2017-13080)
The vulnerability allows an adjacent attacker to force a supplicant to reinstall a previously used group key.The weakness exists in the processing of the 802.11i 4-way handshake messages of the WPA and WPA2 protocols due to ambiguities in the processing of associated protocol messages. An adjacent attacker can use man-in-the-middle techniques to retransmit previously used message exchanges between supplicant and authenticator.
The vulnerability is dubbed "KRACK" attack.
3) Denial of service (CVE-ID: CVE-2017-14489)
The vulnerability allows a local attacker to cause DoS condition on the target system.The weakness exists in the drivers/scsi/scsi_transport_iscsi.c due to leveraging incorrect length validation. A local attacker can cause a denial of service.
4) Use-after-free (CVE-ID: CVE-2017-15265)
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The vulnerability exists due to use-after-free error in the ALSA sequencer interface (/dev/snd/seq). A local attacker can run a specially crafted application, trigger memory corruption and execute arbitrary code with root privileges.
Successful exploitation of the vulnerability may result in system compromise.
5) NULL pointer dereference (CVE-ID: CVE-2017-15274)
The vulnerability allows a local attacker to cause DoS condition on the target system.The weakness exists in he security/keys/keyctl.c due to a NULL pointer dereference. A local attacker can create a specially crafted add_key or keyctl system call and cause a denial of service.
6) NULL pointer dereference (CVE-ID: CVE-2017-12192)
The vulnerability allows a local attacker to cause DoS condition on the target system.The weakness exists in the Key Management sub component of the Linux kernel when trying to issue a KEYTCL_READ on a negative key due to a NULL pointer dereference. A local attacker can cause the kernel and service to crash.
Remediation
Install update from vendor's website.