SB2018042519 - Denial of service in Linux Kernel



SB2018042519 - Denial of service in Linux Kernel

Published: April 25, 2018 Updated: October 30, 2018

Security Bulletin ID SB2018042519
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) NULL pointer dereference (CVE-ID: CVE-2018-1095)

The vulnerability allows a remote authenticated attacker to cause DoS condition on the target system.

The weakness exists in the ext4_xattr_check_entries function in fs/ext4/xattr.c due to improper validation of xattr sizes, which causes misinterpretation of a size as an error code. A remote attacker can submit a specially crafted ext4 image, trigger NULL pointer dereference and cause the service to crash.

2) Improper initialization (CVE-ID: CVE-2018-1108)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the crng_ready() function due to improper initialization. A remote attacker can cause the service to crash.

3) Improper input validation (CVE-ID: CVE-2018-18690)

The vulnerability allows a local attacker to cause DoS condition on the target system.

The vulnerability exists due to improper handling of ATTR_REPLACE operations by the xfs_attr_shortform_addname function, as defined in the fs/xfs/libxfs/xfs_attr.c source code file. A local attacker can access the system and execute an application that submits malicious input, trigger corruption of the Extended File System (XFS) and cause the service to crash.


Remediation

Install update from vendor's website.