Fedora 29 update for kernel, kernel-headers, kernel-tools



| Updated: 2025-04-24
Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2018-16862
CVE-2018-19407
CWE-ID CWE-20
CWE-476
Exploitation vector Local
Public exploit Public exploit code for vulnerability #2 is available.
Vulnerable software
Fedora
Operating systems & Components / Operating system

kernel-tools
Operating systems & Components / Operating system package or component

kernel-headers
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor Fedoraproject

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Security restrictions bypass

EUVDB-ID: #VU16060

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-16862

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local attacker to bypass security restrictions on the target system.

The vulnerability exists due to an error when the cleancache subsystem clears an inode after the final file truncation (removal). A local attacker can supply new file created with the same inode that may contain leftover pages from cleancache and bypass security restrictions to conduct further attacks.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Fedora: 29

kernel-tools: before 4.19.5-300.fc29

kernel-headers: before 4.19.5-300.fc29

kernel: before 4.19.5-300.fc29

CPE2.3 External links

https://bodhi.fedoraproject.org/updates/FEDORA-2018-87ba0312c2


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Null pointer dereference

EUVDB-ID: #VU16022

Risk: Low

CVSSv4.0: 5.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2018-19407

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists in the vcpu_scan_ioapic function, as defined in the arch/x86/kvm/x86.c source code file due to the failure of the I/O Advanced Programmable Interrupt Controller (I/O APIC) to initialize. A local attacker can access the system and execute an application that submits malicious system calls, trigger a NULL pointer dereference, which could result in a DoS condition.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Fedora: 29

kernel-tools: before 4.19.5-300.fc29

kernel-headers: before 4.19.5-300.fc29

kernel: before 4.19.5-300.fc29

CPE2.3 External links

https://bodhi.fedoraproject.org/updates/FEDORA-2018-87ba0312c2


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###