SB2019090440 - Multiple vulnerabilities in Linux kernel



SB2019090440 - Multiple vulnerabilities in Linux kernel

Published: September 4, 2019 Updated: July 17, 2020

Security Bulletin ID SB2019090440
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Medium 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Integer overflow (CVE-ID: CVE-2019-18805)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.


2) NULL pointer dereference (CVE-ID: CVE-2019-15924)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in the Linux kernel before 5.0.11. fm10k_init_module in drivers/net/ethernet/intel/fm10k/fm10k_main.c has a NULL pointer dereference because there is no -ENOMEM upon an alloc_workqueue failure. A remote attacker can perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.