SB2020030418 - Red Hat Enterprise Linux 7.6 update for kpatch-patch



SB2020030418 - Red Hat Enterprise Linux 7.6 update for kpatch-patch

Published: March 4, 2020

Security Bulletin ID SB2020030418
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Use-after-free (CVE-ID: CVE-2018-20856)

The vulnerability allows a local attacker to execute arbitrary code on a targeted system.

The vulnerability exists due to a use-after-free error when the "__blk_drain_queue()" function in the "block/blk-core.c" file mishandles error cases. A local authenticated attacker can access the system and execute an application that submits malicious input, cause a use-after-free memory operation error and execute arbitrary code on the targeted system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


Remediation

Install update from vendor's website.