SB2019031419 - Red Hat Enterprise Linux 7 update for kernel
Published: March 14, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Improper access control (CVE-ID: CVE-2018-17972)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists within the proc_pid_stack() function in fs/proc/base.c due to the Linux kernel does not ensure that only root may inspect the kernel stack of an arbitrary task. A local user can exploit racy stack unwinding and leak kernel task stack contents.
2) Memory corruption (CVE-ID: CVE-2018-18445)
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The vulnerability exists in the adjust_scalar_min_max_vals function, as defined in the kernel/bpf/verifier.c source code file due to boundary error in the BPF verifier. A local attacker can trigger the BPF verifier to mishandle 32-bit right shifts and cause an out-of-bounds memory access condition to access sensitive information, escalate privileges, or cause a DoS condition on the targeted system.
3) Type Confusion (CVE-ID: CVE-2018-9568)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a type confusion error in the sk_clone_lock() function in sock.c. A local user can run a specially crafted application to trigger memory corruption and execute arbitrary code on the target system with elevated privileges.
Remediation
Install update from vendor's website.