SB2018051128 - SUSE Linux update for the Linux Kernel
Published: May 11, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2017-18257)
The vulnerability allows a local attacker to cause DoS condition on the target system.The weakness exists in get_data_block function of the fs/f2fs/data.c library due to improper validation of user-supplied input. A local attacker can run a specially crafted program, designed to send malicious requests to the Linux Kernel and cause the system to stop responding.
2) Improper input validation (CVE-ID: CVE-2018-10087)
The vulnerability allows a local attacker to cause DoS condition on the target system.
The weakness exists in the kernel_wait4 function in kernel/exit.c due to improper validation of the INT_MIN parameter. A local attacker can trigger an error condition and cause the service to crash.
3) Improper input validation (CVE-ID: CVE-2018-10124)
The vulnerability allows a local attacker to cause DoS condition on the target system.
The weakness exists in the kill_something_info function in kernel/signal.c due to improper validation of input. A local attacker can run a program designed to send malicious requests and cause the service to crash.
4) Denial of service (CVE-ID: CVE-2018-1091)
The vulnerability allows a local attacker to cause DoS condition on the target system.The weakness exists in the flush_tmregs_to_thread function, as defined in the arch/powerpc/kernel/ptrace.c source code, due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path. A local attacker can use unprivileged userspace during a core dump on a POWER host and cause the service to crash.
5) Memory corruption (CVE-ID: CVE-2018-7740)
The vulnerability allows a local attacker to cause DoS condition no the target system.The weakness exists in the resv_map_release function due to boundary error when handling user-supplied input. A local attacker can execute an application that submits malicious input, trigger memory corruption and cause the system to crash.
6) NULL pointer dereference (CVE-ID: CVE-2018-8043)
The vulnerability allows a local attacker to cause DoS condition on the target system.The weakness exists in the unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c due to improper validation of certain resource availability. A local attacker can trigger NULL pointer dereference and cause the service to crash.
7) Privilege escalation (CVE-ID: CVE-2018-8822)
The vulnerability allows a local attacker to gain elevated privileges on the target system.The weakness exists in the ncp_read_kernel function due to incorrect buffer length handling. A local attacker can submit specially crafted data from a malicious NCPFS server, trigger memory corruption and execute arbitrary code with root privileges.
Remediation
Install update from vendor's website.