SB2018042519 - Denial of service in Linux Kernel
Published: April 25, 2018 Updated: October 30, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) NULL pointer dereference (CVE-ID: CVE-2018-1095)
The vulnerability allows a remote authenticated attacker to cause DoS condition on the target system.The weakness exists in the ext4_xattr_check_entries function in fs/ext4/xattr.c due to improper validation of xattr sizes, which causes misinterpretation of a size as an error code. A remote attacker can submit a specially crafted ext4 image, trigger NULL pointer dereference and cause the service to crash.
2) Improper initialization (CVE-ID: CVE-2018-1108)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in the crng_ready() function due to improper initialization. A remote attacker can cause the service to crash.
3) Improper input validation (CVE-ID: CVE-2018-18690)
The vulnerability allows a local attacker to cause DoS condition on the target system.
The vulnerability exists due to improper handling of ATTR_REPLACE operations by the xfs_attr_shortform_addname function, as defined in the fs/xfs/libxfs/xfs_attr.c source code file. A local attacker can access the system and execute an application that submits malicious input, trigger corruption of the Extended File System (XFS) and cause the service to crash.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=ce3fd194fcc6fbdc00ce095a85...
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43838a23a05fbd13e47d750d3dfd77001536dd33
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7b38460dc8e4eafba06c78...