SB2018041704 - OpenSUSE Linux update for the Linux Kernel 



SB2018041704 - OpenSUSE Linux update for the Linux Kernel

Published: April 17, 2018

Security Bulletin ID SB2018041704
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Local access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Denial of service (CVE-ID: CVE-2018-1091)

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists in the flush_tmregs_to_thread function, as defined in the arch/powerpc/kernel/ptrace.c source code, due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path. A local attacker can use unprivileged userspace during a core dump on a POWER host and cause the service to crash.

2) Memory corruption (CVE-ID: CVE-2018-7740)

The vulnerability allows a local attacker to cause DoS condition no the target system.

The weakness exists in the resv_map_release function due to boundary error when handling user-supplied input. A local attacker can execute an application that submits malicious input, trigger memory corruption and cause the system to crash.

3) NULL pointer dereference (CVE-ID: CVE-2018-8043)

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists in the unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c due to improper validation of certain resource availability. A local attacker can trigger NULL pointer dereference and cause the service to crash.

Remediation

Install update from vendor's website.