SB2018061406 - Denial of service in Linux Kernel
Published: June 14, 2018 Updated: June 15, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Race condition (CVE-ID: CVE-2018-12232)
The vulnerability allows a local attacker to cause DoS condition on the target system.
The vulnerability exists in the net/socket.c source code file due to the fchownat() function does not increment the reference count of a socket file descriptor, which could trigger a race condition between the sock_close() and sockfs_setattr() functions. A local attacker can submit specially crafted input, trigger a NULL pointer dereference condition and cause the system to crash..
2) Race condition (CVE-ID: CVE-2018-5814)
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The vulnerability exists due to race condition when processing malicious input. A remote attacker can send multiple specially crafted USB over IP packets, trigger a use-after-free memory error or a null pointer dereference and cause the system to crash.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d8c50dcb029872b298eea...
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=22076557b07c12086eeb16...
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c171654caa875919be3c53...