Red Hat update for kernel



Published: 2018-04-17
Risk Medium
Patch available YES
Number of vulnerabilities 8
CVE-ID CVE-2017-8824
CVE-2017-9725
CVE-2017-13166
CVE-2017-15265
CVE-2017-17449
CVE-2017-18017
CVE-2017-1000252
CVE-2017-1000410
CWE-ID CWE-416
CWE-789
CWE-264
CWE-200
CWE-617
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions
Operating systems & Components / Operating system package or component

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions
Operating systems & Components / Operating system package or component

kernel (Red Hat package)
Operating systems & Components / Operating system package or component

Red Hat Enterprise Linux Server - TUS
Operating systems & Components / Operating system

Red Hat Enterprise Linux for Power, little endian - Extended Update Support
Operating systems & Components / Operating system

Red Hat Enterprise Linux for Power, big endian - Extended Update Support
Operating systems & Components / Operating system

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support
Operating systems & Components / Operating system

Red Hat Enterprise Linux Server - AUS
Operating systems & Components / Operating system

Red Hat Enterprise Linux Server - Extended Update Support
Operating systems & Components / Operating system

Red Hat Enterprise Linux EUS Compute Node
Operating systems & Components / Operating system

Vendor Red Hat Inc.

Security Bulletin

This security bulletin contains information about 8 vulnerabilities.

1) Use-after-free error

EUVDB-ID: #VU9767

Risk: Low

CVSSv3.1: 7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2017-8824

CWE-ID: CWE-416 - Use After Free

Exploit availability: Yes

Description

The vulnerability allows a local attacker to gain elevated privileges or cause DoS condition on the target system.

The weakness exists due to an error in the dccp_disconnect function in net/dccp/proto.c in the Linux kernel. A local attacker can make specially crafted AF_UNSPEC connect system call during the DCCP_LISTEN state, trigger use-after-free error and gain root privileges or cause the system to crash.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions: 7.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 7.4

Red Hat Enterprise Linux Server - TUS: 7.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4

Red Hat Enterprise Linux Server - AUS: 7.4

Red Hat Enterprise Linux Server - Extended Update Support: 7.4

kernel (Red Hat package): 3.10.0-123.1.2.el7 - 3.10.0-693.21.1.el7

Red Hat Enterprise Linux EUS Compute Node: 7.4

:

External links

http://access.redhat.com/errata/RHSA-2018:1130


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

2) Uncontrolled memory allocation

EUVDB-ID: #VU12262

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-9725

CWE-ID: CWE-789 - Uncontrolled Memory Allocation

Exploit availability: No

Description

The vulnerability allows a local attacker to case DoS condition or gain elevated privileges on the target system.

The weakness exists in all Qualcomm products with Android releases from CAF during DMA allocation due to wrong data type of size allocation size gets truncated which makes allocation succeed when it should fail. A local attacker can cause the service to crash or gain root privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions: 7.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 7.4

Red Hat Enterprise Linux Server - TUS: 7.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4

Red Hat Enterprise Linux Server - AUS: 7.4

Red Hat Enterprise Linux Server - Extended Update Support: 7.4

kernel (Red Hat package): 3.10.0-123.1.2.el7 - 3.10.0-693.21.1.el7

Red Hat Enterprise Linux EUS Compute Node: 7.4

:

External links

http://access.redhat.com/errata/RHSA-2018:1130


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Privilege escalation

EUVDB-ID: #VU10345

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-13166

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists in the V4L2 video driver component of the Google Android kernel due to insufficient validation of user-supplied input. A local attacker can use a specially crafted application and execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions: 7.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 7.4

Red Hat Enterprise Linux Server - TUS: 7.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4

Red Hat Enterprise Linux Server - AUS: 7.4

Red Hat Enterprise Linux Server - Extended Update Support: 7.4

kernel (Red Hat package): 3.10.0-123.1.2.el7 - 3.10.0-693.21.1.el7

Red Hat Enterprise Linux EUS Compute Node: 7.4

:

External links

http://access.redhat.com/errata/RHSA-2018:1130


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Use-after-free

EUVDB-ID: #VU8816

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-15265

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to use-after-free error in the ALSA sequencer interface (/dev/snd/seq). A local attacker can run a specially crafted application, trigger memory corruption and execute arbitrary code with root privileges.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions: 7.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 7.4

Red Hat Enterprise Linux Server - TUS: 7.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4

Red Hat Enterprise Linux Server - AUS: 7.4

Red Hat Enterprise Linux Server - Extended Update Support: 7.4

kernel (Red Hat package): 3.10.0-123.1.2.el7 - 3.10.0-693.21.1.el7

Red Hat Enterprise Linux EUS Compute Node: 7.4

:

External links

http://access.redhat.com/errata/RHSA-2018:1130


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Information disclosure

EUVDB-ID: #VU9769

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-17449

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.

The weakness exists due to the __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace. A local attacker can leverage the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system and read arbitrary files.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions: 7.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 7.4

Red Hat Enterprise Linux Server - TUS: 7.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4

Red Hat Enterprise Linux Server - AUS: 7.4

Red Hat Enterprise Linux Server - Extended Update Support: 7.4

kernel (Red Hat package): 3.10.0-123.1.2.el7 - 3.10.0-693.21.1.el7

Red Hat Enterprise Linux EUS Compute Node: 7.4

:

External links

http://access.redhat.com/errata/RHSA-2018:1130


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Use-after-free error

EUVDB-ID: #VU10678

Risk: Medium

CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-18017

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition no the target system.

The weakness exists in the tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel due to use-after-free error. A remote attacker can leverage the presence of xt_TCPMSS in an iptables action, trigger memory corruption and cause the system to crash.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions: 7.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 7.4

Red Hat Enterprise Linux Server - TUS: 7.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4

Red Hat Enterprise Linux Server - AUS: 7.4

Red Hat Enterprise Linux Server - Extended Update Support: 7.4

kernel (Red Hat package): 3.10.0-123.1.2.el7 - 3.10.0-693.21.1.el7

Red Hat Enterprise Linux EUS Compute Node: 7.4

:

External links

http://access.redhat.com/errata/RHSA-2018:1130


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Assertion failure

EUVDB-ID: #VU8695

Risk: Low

CVSSv3.1: 5.9 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-1000252

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The KVM subsystem in the Linux kernel through 4.13.3 allows guest OS users to cause a denial of service (assertion failure, and hypervisor hang or crash) via an out-of bounds guest_irq value, related to arch/x86/kvm/vmx.c and virt/kvm/eventfd.c.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions: 7.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 7.4

Red Hat Enterprise Linux Server - TUS: 7.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4

Red Hat Enterprise Linux Server - AUS: 7.4

Red Hat Enterprise Linux Server - Extended Update Support: 7.4

kernel (Red Hat package): 3.10.0-123.1.2.el7 - 3.10.0-693.21.1.el7

Red Hat Enterprise Linux EUS Compute Node: 7.4

:

External links

http://access.redhat.com/errata/RHSA-2018:1130


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Information disclosure

EUVDB-ID: #VU9774

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-1000410

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to a flaw when processing the incoming of L2CAP commands, ConfigRequest and ConfigResponse messages. A remote attacker can manipulate the code flows that precede the handling of the configuration messages and read important data.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions: 7.4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 7.4

Red Hat Enterprise Linux Server - TUS: 7.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4

Red Hat Enterprise Linux Server - AUS: 7.4

Red Hat Enterprise Linux Server - Extended Update Support: 7.4

kernel (Red Hat package): 3.10.0-123.1.2.el7 - 3.10.0-693.21.1.el7

Red Hat Enterprise Linux EUS Compute Node: 7.4

:

External links

http://access.redhat.com/errata/RHSA-2018:1130


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###