SB2018042036 - SUSE Linux update for the Linux Kernel
Published: April 20, 2018
Security Bulletin ID
SB2018042036
Severity
Medium
Patch available
YES
Number of vulnerabilities
4
Exploitation vector
Remote access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Privilege escalation (CVE-ID: CVE-2017-13166)
The vulnerability allows a local attacker to gain elevated privileges on the target system.The weakness exists in the V4L2 video driver component of the Google Android kernel due to insufficient validation of user-supplied input. A local attacker can use a specially crafted application and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
2) Race condition (CVE-ID: CVE-2018-1000004)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to race condition in the sound system. A remote attacker can trigger deadlock and cause the system to crash.
3) Privilege escalation (CVE-ID: CVE-2018-1068)
The vulnerability allows a local attacker to gain elevated privileges on the target system.The weakness exists due to an error in the implementation of 32 bit syscall interface. A local attacker can gain root privileges.
4) Memory corruption (CVE-ID: CVE-2018-7566)
The vulnerability allows a local attacker to write arbitrary files on the target system.The weakness exists due to out-of-bounds write while ALSA sequencer core initializes the event pool on demand by invoking snd_seq_pool_init() when the first write happens and the pool is empty. A local attacker can trigger buffer overflow and use after free and reset the pool size manually via ioctl concurrently and write arbitrary files.
Remediation
Install update from vendor's website.