SB2018112705 - Red Hat update for kernel
Published: November 27, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Use-after-free (CVE-ID: CVE-2018-17182)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in vmacache_flush_all() function in mm/vmacache.c file. A local user can trigger the use-after-free error via certain thread creation, map, unmap, invalidation, and dereference operations and execute arbitrary code on the system with elevated privileges.
2) Improper input validation (CVE-ID: CVE-2018-18021)
The vulnerability allows a local attacker to cause DoS condition on the target system.
The vulnerability exists in the arch/arm64/kvm/guest.c source code file due to the mishandling of the sanity check for the KVM_SET_ON_REG IOCTL function. A local attacker can create a malicious Kernel-based Virtual Machine (KVM), cause an illegal exception return and cause the system to crash.
Remediation
Install update from vendor's website.