SB2019031324 - Red Hat Enterprise Linux 7 update for kernel-alt
Published: March 13, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Use-after-free (CVE-ID: CVE-2018-10876)
The vulnerability allows a local authenticated user to perform a denial of service (DoS) attack.
A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.
2) Memory corruption (CVE-ID: CVE-2018-11412)
The vulnerability allows a local attacker to gain elevated privileges or cause DoS condition on the target system.
The vulnerability exists due to improper memory operations performed by the ext4_read_inline_data() function, as defined in the fs/ext4/inline.c source code file. A local attacker can mount a customized ext4 filesystem that stores the system.data extended attribute value in a dedicated inode, supply malicious input containing an untrusted length value, trigger memory corruption and gain elevated privileges or cause a DoS condition.
Remediation
Install update from vendor's website.