SB2018022706 - Denial of service in Linux Kernel 



SB2018022706 - Denial of service in Linux Kernel

Published: February 27, 2018 Updated: March 1, 2018

Security Bulletin ID SB2018022706
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Local access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Double-free error (CVE-ID: CVE-2018-7480)

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists in the block/blk-cgroup.c source code in the blkcg_init_queue function due to double free. A remote attacker can trigger memory corruption and cause the service to crash.

2) Denial of service (CVE-ID: CVE-2017-18200)

The vulnerability allows a local attacker to cause DoS condition ob the target system.

The weakness exists in the Flash-Friendly File System (F2FS) implementation due to the improper handling of reference counts that are associated with f2fs_wait_discard_bios calls. A remote attacker can send a specially crafted fstrim command and cause a kernel panic.

3) Memory corruption (CVE-ID: CVE-2017-18202)

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists in the mm/oom_kill.c source code in the __oom_reap_task_mm function due to boundary error. A local attacker can trigger memory corruption and cause the system to crash.

Remediation

Install update from vendor's website.