SB2018062814 - Privilege escalation in Linux Kernel 



SB2018062814 - Privilege escalation in Linux Kernel

Published: June 28, 2018 Updated: June 29, 2018

Security Bulletin ID SB2018062814
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Privilege escalation (CVE-ID: CVE-2018-12714)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to the filter-parsing component, as defined in the kernel/trace/trace_events_filter.c source code file of the affected software, could be called without a filter, which would result in an N=0 case. A local attacker can make perf_event_open and mmap system calls that submit malicious input, trigger a slab out-of-bounds write condition in the predicate_parse function and cause the system to crash or execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in complete system compromise.


2) Privilege escalation (CVE-ID: CVE-2018-12904)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to insufficient checking of the current privilege level (CPL) for Virtual Machine Extensions (VMX) instructions by the arch/x86/kvm/vmx.c source code file when nested virtualization is used. A local attacker can cause a targeted L1 Kernel-based Virtual Machine (KVM) guest to exit and gain elevated privileges on the targeted L1 system, which could be used to conduct further attacks.


Remediation

Install update from vendor's website.