SB2017062116 - OpenSUSE Linux update for the Linux Kernel
Published: June 21, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Memory corruption (CVE-ID: CVE-2017-1000364)
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The vulnerability exists due to memory management errors in implementation of various functions under multiple operating systems. A local or remote attacker can trigger the affected application to process specially crafted data, trigger memory corruption and execute arbitrary code on the target system. The vulnerability is dubbed by Qualys researchers as “Stack Clash”.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
2) Information disclosure (CVE-ID: CVE-2017-1000380)
The vulnerability allows a local attacker to obtain potentially sensitive information.
The vulnerability exists in the sound/core/timer.c code due to a race condition that exists in the timing functionality of the ALSA/dev/snd/timer driver when a read and an ioctl system call happens simultaneously. A local attacker can cause uninitialized memory from the kernel heap to be copied to user space and read kernel-space memory.
3) Denial of service (CVE-ID: CVE-2017-7346)
The vulnerability allows a local attacker to cause DoS condition on the target system.The weakness exists due to the failure to validate certain levels data. A local attacker can use a specially crafted ioctl call for a /dev/dri/renderD device to cause the system to hang.
Successful exploitation of the vulnerability results in denial of service.
4) Denial of service (CVE-ID: CVE-2017-9242)
The vulnerability allows a local attacker to cause DoS condition on the target system.The weakness exists due to an error in the __ip6_append_data function when checking whether an overwrite of an skb data structure may occur. A local attacker can use specially crafted system calls and cause the system to crash.
Successful exploitation of the vulnerability results in denial of service.
Remediation
Install update from vendor's website.