SB2019031324 - Red Hat Enterprise Linux 7 update for kernel-alt



SB2019031324 - Red Hat Enterprise Linux 7 update for kernel-alt

Published: March 13, 2019

Security Bulletin ID SB2019031324
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Use-after-free (CVE-ID: CVE-2018-10876)

The vulnerability allows a local authenticated user to perform a denial of service (DoS) attack.

A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.


2) Memory corruption (CVE-ID: CVE-2018-11412)

The vulnerability allows a local attacker to gain elevated privileges or cause DoS condition on the target system.

The vulnerability exists due to improper memory operations performed by the ext4_read_inline_data() function, as defined in the fs/ext4/inline.c source code file. A local attacker can mount a customized ext4 filesystem that stores the system.data extended attribute value in a dedicated inode, supply malicious input containing an untrusted length value, trigger memory corruption and gain elevated privileges or cause a DoS condition.


Remediation

Install update from vendor's website.