SB2018053104 - Multiple vulnerabilities in Linux Kernel 



SB2018053104 - Multiple vulnerabilities in Linux Kernel

Published: May 31, 2018

Security Bulletin ID SB2018053104
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2018-11508)

The vulnerability allows a local attacker to obtain potentially sensitive information.

The vulnerability exists in the compat_get_timex function, as defined in the kernel/compat.c source code file due to an uninitialized struct field in compat adjtimex system calls. A local attacker can send a compat adjtimex system call that submits malicious input and access sensitive kernel memory content, which could be used to conduct further attacks.


2) Stack-based buffer overflow (CVE-ID: CVE-2018-11506)

The vulnerability allows a local attacker to cause DoS condition on the target system.

The vulnerability exists in the sr_do_ioctl function, as defined in the drivers/scsi/sr_ioctl.c source code file due to differing buffer sizes in the CDROM layer and the SCSI layer. A local attacker can submit specially crafted input, trigger a stack-based overflow and cause the system to crash.


3) Memory corruption (CVE-ID: CVE-2018-11412)

The vulnerability allows a local attacker to gain elevated privileges or cause DoS condition on the target system.

The vulnerability exists due to improper memory operations performed by the ext4_read_inline_data() function, as defined in the fs/ext4/inline.c source code file. A local attacker can mount a customized ext4 filesystem that stores the system.data extended attribute value in a dedicated inode, supply malicious input containing an untrusted length value, trigger memory corruption and gain elevated privileges or cause a DoS condition.


Remediation

Install update from vendor's website.