SB2018041704 - OpenSUSE Linux update for the Linux Kernel
Published: April 17, 2018
Security Bulletin ID
SB2018041704
Severity
Low
Patch available
YES
Number of vulnerabilities
3
Exploitation vector
Local access
Highest impact
Denial of service
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Denial of service (CVE-ID: CVE-2018-1091)
The vulnerability allows a local attacker to cause DoS condition on the target system.The weakness exists in the flush_tmregs_to_thread function, as defined in the arch/powerpc/kernel/ptrace.c source code, due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path. A local attacker can use unprivileged userspace during a core dump on a POWER host and cause the service to crash.
2) Memory corruption (CVE-ID: CVE-2018-7740)
The vulnerability allows a local attacker to cause DoS condition no the target system.The weakness exists in the resv_map_release function due to boundary error when handling user-supplied input. A local attacker can execute an application that submits malicious input, trigger memory corruption and cause the system to crash.
3) NULL pointer dereference (CVE-ID: CVE-2018-8043)
The vulnerability allows a local attacker to cause DoS condition on the target system.The weakness exists in the unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c due to improper validation of certain resource availability. A local attacker can trigger NULL pointer dereference and cause the service to crash.
Remediation
Install update from vendor's website.