

Rewterz Threat Advisory – VMWare Workstation Player Multiple Privilege Escalation Vulnerabilities
March 18, 2019
Rewterz Threat Alert – Malware Campaign Associated With EmpireMonkey Group
March 18, 2019
Rewterz Threat Advisory – VMWare Workstation Player Multiple Privilege Escalation Vulnerabilities
March 18, 2019
Rewterz Threat Alert – Malware Campaign Associated With EmpireMonkey Group
March 18, 2019Severity
Medium
Analysis Summary
CVE-2018-9568
In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2018-17972
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.
CVE-2018-18445
In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.
Impact
- DoS
- Privilege escalation
- Exposure of sensitive information
Affected Products
Red Hat Enterprise Linux Desktop 7
Red Hat Enterprise Linux HPC Node 7
Red Hat Enterprise Linux Server 7
Red Hat Enterprise Linux Workstation 7
Remediation
Updated packages are available via Red Hat Network.