Red Hat 7.5 update for kernel



Risk High
Patch available YES
Number of vulnerabilities 8
CVE-ID CVE-2019-6974
CVE-2019-7221
CVE-2019-5489
CVE-2019-3900
CVE-2018-9568
CVE-2018-10902
CVE-2018-18559
CVE-2017-18208
CWE-ID CWE-362
CWE-416
CWE-200
CWE-835
CWE-843
CWE-415
Exploitation vector Local network
Public exploit Public exploit code for vulnerability #1 is available.
Public exploit code for vulnerability #2 is available.
Public exploit code for vulnerability #3 is available.
Public exploit code for vulnerability #7 is available.
Vulnerable software
Red Hat Enterprise Linux for x86_64 - Extended Update Support
Operating systems & Components / Operating system

Red Hat Enterprise Linux for Power, little endian - Extended Update Support
Operating systems & Components / Operating system

Red Hat Enterprise Linux for Power, big endian - Extended Update Support
Operating systems & Components / Operating system

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support
Operating systems & Components / Operating system

Red Hat Enterprise Linux EUS Compute Node
Operating systems & Components / Operating system

kernel (Red Hat package)
Operating systems & Components / Operating system package or component


Other

Vendor Red Hat Inc.

Security Bulletin

This security bulletin contains information about 8 vulnerabilities.

1) Race condition

EUVDB-ID: #VU17555

Risk: Low

CVSSv4.0: 7.4 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2019-6974

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows an adjacent attacker to gain elevated privileges or cause a denial of service (DoS) condition.

The weakness exists due to exists due to a race condition that causes the kvm_ioctl_create_device function, as defined in the virt/kvm/kvm_main.c source code file of the affected software, to improperly handle reference counting. An adjacent attacker can access the system and execute an application that submits malicious input, trigger a use-after-free condition and cause a targeted guest virtual machine to crash, resulting in a DoS condition. In addition, a successful exploit could allow the attacker to gain elevated privileges on a targeted system. 

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.5

kernel (Red Hat package): 3.10.0-123.1.2.el7 - 3.10.0-862.43.3.el7

Red Hat Enterprise Linux EUS Compute Node: 7.5

:

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2019:3967


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

2) Use-after-free

EUVDB-ID: #VU17760

Risk: Medium

CVSSv4.0: 7.4 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2019-7221

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows an adjacent attacker to cause DoS condition or execute arbitrary code.

The weakness exists due to exists due to use-after-free error when using emulated vmx preemption timer. An adjacent attacker can cause the service to crash or execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.5

kernel (Red Hat package): 3.10.0-123.1.2.el7 - 3.10.0-862.43.3.el7

Red Hat Enterprise Linux EUS Compute Node: 7.5

:

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2019:3967


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

3) Information disclosure

EUVDB-ID: #VU16896

Risk: Low

CVSSv4.0: 5.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2019-5489

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local attacker to gain access to potentially sensitive information.

The vulnerability exists due to a flaw in the mincore() implementation in mm/mincore.c. A local attacker can observe page cache access patterns of other processes on the same system and sniff secret information.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.5

kernel (Red Hat package): 3.10.0-123.1.2.el7 - 3.10.0-862.43.3.el7

Red Hat Enterprise Linux EUS Compute Node: 7.5

:

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2019:3967


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

4) Infinite loop

EUVDB-ID: #VU19998

Risk: Low

CVSSv4.0: 1.2 [CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2019-3900

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop in vhost_net kernel module when processing incoming packets in handle_rx(). A remote attacker with access to guest operating system can stall the vhost_net kernel thread and cause denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.5

kernel (Red Hat package): 3.10.0-123.1.2.el7 - 3.10.0-862.43.3.el7

Red Hat Enterprise Linux EUS Compute Node: 7.5

:

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2019:3967


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Type Confusion

EUVDB-ID: #VU21092

Risk: High

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2018-9568

CWE-ID: CWE-843 - Type confusion

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a type confusion error in the sk_clone_lock() function in sock.c. A local user can run a specially crafted application to trigger memory corruption and execute arbitrary code on the target system with elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.5

kernel (Red Hat package): 3.10.0-123.1.2.el7 - 3.10.0-862.43.3.el7

Red Hat Enterprise Linux EUS Compute Node: 7.5

:

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2019:3967


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Double-free memory error

EUVDB-ID: #VU14490

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-10902

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to double-free memory error in snd_rawmidi_input_params() and snd_rawmidi_output_status() in 'rawmidi.c'. A local attacker can gain elevated privileges and execute arbitrary code.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.5

kernel (Red Hat package): 3.10.0-123.1.2.el7 - 3.10.0-862.43.3.el7

Red Hat Enterprise Linux EUS Compute Node: 7.5

:

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2019:3967


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Privilege escalation

EUVDB-ID: #VU15526

Risk: Low

CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2018-18559

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to improper handling of a certain multithreaded case involving packet_do_bind unregister and packet_notifier register actions after a race condition between fanout_add, from setsockopt, and a bind on an AF_PACKET socket. A local attacker can execute a program or file that submits malicious input, trigger a use-after-free condition and execute arbitrary code with kernel privileges.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.5

kernel (Red Hat package): 3.10.0-123.1.2.el7 - 3.10.0-862.43.3.el7

Red Hat Enterprise Linux EUS Compute Node: 7.5

:

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2019:3967


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

8) Infinite loop

EUVDB-ID: #VU11181

Risk: Low

CVSSv4.0: 1.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-18208

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists in the madvise_willneed function due to infinite loop. A local attacker can trigger use of MADVISE_WILLNEED for a DAX mapping and cause the service to crash.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.5

kernel (Red Hat package): 3.10.0-123.1.2.el7 - 3.10.0-862.43.3.el7

Red Hat Enterprise Linux EUS Compute Node: 7.5

:

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2019:3967


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###