SB2018070901 - Multiple vulnerabilities in Linux Kernel
Published: July 9, 2018 Updated: July 10, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Divide-by-zero (CVE-ID: CVE-2018-13100)
The vulnerability allows a local attacker to cause DoS condition on the target system.
The vulnerability exists due to improper validation of secs_per_zone information in a corrupted Flash-Friendly File System (F2FS) image. A local attacker can mount a specially crafted F2FS image, trigger a divide-by-zero condition in the reset_curseg() function, as defined in the fs/f2fs/super.c source code file and cause the system to crash.
2) Null pointer dereference (CVE-ID: CVE-2018-12928)
The vulnerability allows a local attacker to cause DoS condition on the target system.
The vulnerability exists due to boundary error when mounting HFS filesystems. A local attacker can access the system, execute an application that submits malicious input, cause a NULL pointer dereference and cause the system to crash.
3) Buffer over-read (CVE-ID: CVE-2018-13098)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to an out-of-bounds read in fs/f2fs/inode.c file that occurs for a modified f2fs filesystem image in which FI_EXTRA_ATTR is set in an inode.
4) Buffer over-read (CVE-ID: CVE-2018-13099)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to an out-of-bounds read in fs/f2fs/inline.c file that occurs for a modified f2fs filesystem image in which an inline inode contains an invalid reserved blkaddr.
5) Security restrictions bypass (CVE-ID: CVE-2018-13405)
The vulnerability allows a local attacker to create arbitrary files on the target system.
The vulnerability exists due to the inode_init_owner function, as defined in the fs/inode.c source code file, allows the creation of arbitrary files in set-group identification (SGID) directories. A local attacker can create arbitrary files with unintended group ownership.
6) Integer overflow (CVE-ID: CVE-2018-13406)
The vulnerability allows a local attacker to cause DoS condition on the target system.
The vulnerability exists due to integer overflow in the uvesafb_setcmap function, as defined in the drivers/video/fbdev/uvesafb.c source code file. A local attacker can execute a file or program that submits malicious input, trigger memory corruption and cause the affected software to crash.
Remediation
Install update from vendor's website.
References
- https://bugzilla.kernel.org/show_bug.cgi?id=200183
- https://bugzilla.kernel.org/show_bug.cgi?id=200173
- https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=3468867...
- https://bugzilla.kernel.org/show_bug.cgi?id=200179
- https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=cc60e90...
- https://sourceforge.net/p/linux-f2fs/mailman/message/36356878/
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848c9c93c2c82...
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9f645bcc566a1e9f921bda...