SB2019121121 - Red Hat update for kernel-alt



SB2019121121 - Red Hat update for kernel-alt

Published: December 11, 2019

Security Bulletin ID SB2019121121
Severity
Low
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Out-of-bounds write (CVE-ID: CVE-2019-14821)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in the KVM coalesced MMIO support functionality due to incorrect processing of shared indexes. A local user can run a specially crafted application to trigger an out-of-bounds write error and write data to arbitrary address in the kernel memory.

Successful vulnerability exploitation may allow an attacker to execute arbitrary code on the system with root privileges.


2) Buffer over-read (CVE-ID: CVE-2018-16658)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in cdrom_ioctl_drive_status() function in drivers/cdrom/cdrom.c. A local unprivileged user can create a specially crafted application, trigger out-of-bounds read error and read contents of kernel memory.


3) Race condition (CVE-ID: CVE-2018-14625)

The vulnerability allows a local attacker to obtain potentially sensitive information.

The weakness exists due to a race condition between connect() and close() function. A local attacker can use the AF_VSOCK protocol to obtain sensitive information possibly intercept or corrupt AF_VSOCK messages destined to other clients.

4) Race condition (CVE-ID: CVE-2017-18203)

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists in the dm_get_from_kobject function due to race condition. A local attacker can cause the service to crash.

Remediation

Install update from vendor's website.