SB2017052509 - Red Hat Enterprise Linux for Real Time update for kernel
Published: May 25, 2017
Security Bulletin ID
SB2017052509
Severity
Low
Patch available
YES
Number of vulnerabilities
3
Exploitation vector
Local access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Out-of-bounds read (CVE-ID: CVE-2016-10208)
The vulnerability allows a local attacker to cause DoS condition on the target systsem.The weakness exists due to memory corruption when validating meta block groups by the ext4_fill_super function. A local attacker can use a specially crafted EXT4 image to trigger an out-of-bounds read and cause the system to crash.
Successful exploitation of the vulnerability results in denial of service.
2) Use-after-free error (CVE-ID: CVE-2016-7910)
The vulnerability allows a local attacker to gain elevated privileges on the target system.The weakness exists due to use-after-free error in the disk_seqf_stop function in block/genhd.c. a local attacker can leverage the execution of a certain stop operation and execute arbitrary code on the system with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
3) Null pointer dereference (CVE-ID: CVE-2016-8646)
The vulnerability allows a local attacker to cause DoS condition on the target system.The weakness exists due to NULL pointer dereference in the hash_accept function in crypto/algif_hash.c. A local attacker can trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data and cause a kernel oops.
Successful exploitation of the vulnerability results in denial of service.
Remediation
Install update from vendor's website.