Rewterz
Rewterz Threat Advisory – VMWare Workstation Player Multiple Privilege Escalation Vulnerabilities
March 18, 2019
Rewterz
Rewterz Threat Alert – Malware Campaign Associated With EmpireMonkey Group
March 18, 2019

Rewterz Threat Advisory – Red Hat Update for Kernel

Severity

Medium

Analysis Summary

CVE-2018-9568
In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

CVE-2018-17972
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.

CVE-2018-18445
In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.

Impact

  • DoS
  • Privilege escalation
  • Exposure of sensitive information

Affected Products

Red Hat Enterprise Linux Desktop 7
Red Hat Enterprise Linux HPC Node 7
Red Hat Enterprise Linux Server 7
Red Hat Enterprise Linux Workstation 7

Remediation

Updated packages are available via Red Hat Network.

https://rhn.redhat.com/