SB2019030622 - Fedora 28 update for kernel, kernel-headers



SB2019030622 - Fedora 28 update for kernel, kernel-headers

Published: March 6, 2019 Updated: April 24, 2025

Security Bulletin ID SB2019030622
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Memory leak (CVE-ID: CVE-2019-8980)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper memory operations in the kernel_read_file function, as defined in the fs/exec.c source code file. A remote attacker can send malicious file that triggers vfs_read failures and memory leak condition and perform a denial of service attack.


2) Privilege escalation (CVE-ID: CVE-2019-9162)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to array index error in SNMP NAT module (net/ipv4/netfilter/nf_nat_snmp_basic_main.c) when parsing ASN.1-encoded payloads in SNMP messages. A local user can set up new network namespaces that invoke iptables configuration and triggers SNMP translations, cause out-of-bounds read and write operations and execute arbitrary code  on the system with elevated privileges.


3) NULL pointer dereference (CVE-ID: CVE-2019-9213)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dreference error in expand_downwards() in mm/mmap.c that does not check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task. A local user can perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.