The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Linux kernel: privilege escalation via KVM GDT.LIMIT

Synthesis of the vulnerability 

An attacker can bypass restrictions via KVM GDT.LIMIT of the Linux kernel, in order to escalate his privileges.
Impacted systems: BIG-IP Hardware, TMOS, Junos Space, Linux, Oracle Communications, RHEL.
Severity of this alert: 2/4.
Creation date: 27/07/2018.
Références of this alert: CERTFR-2018-AVI-386, cpuapr2019, cpujul2020, CVE-2018-10901, JSA10917, K07721343, RHSA-2018:2390-01, RHSA-2018:2391-01, RHSA-2018:2392-01, RHSA-2018:2393-01, RHSA-2018:2394-01, VIGILANCE-VUL-26861.

Description of the vulnerability 

An attacker can bypass restrictions via KVM GDT.LIMIT of the Linux kernel, in order to escalate his privileges.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This security weakness impacts software or systems such as BIG-IP Hardware, TMOS, Junos Space, Linux, Oracle Communications, RHEL.

Our Vigil@nce team determined that the severity of this threat bulletin is medium.

The trust level is of type confirmed by the editor, with an origin of user shell.

An attacker with a expert ability can exploit this threat.

Solutions for this threat 

Linux kernel: patch for KVM GDT.LIMIT.
A patch is indicated in information sources.

F5 BIG-IP: solution for Linux.
The solution is indicated in information sources.

Junos Space: version 18.4R1.
The version 18.4R1 is fixed.

Oracle Communications: CPU of April 2019.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2518758.1
  https://support.oracle.com/rs?type=doc&id=2518763.1
  https://support.oracle.com/rs?type=doc&id=2522151.1
  https://support.oracle.com/rs?type=doc&id=2519787.1
  https://support.oracle.com/rs?type=doc&id=2522126.1
  https://support.oracle.com/rs?type=doc&id=2522123.1
  https://support.oracle.com/rs?type=doc&id=2518753.1
  https://support.oracle.com/rs?type=doc&id=2522121.1
  https://support.oracle.com/rs?type=doc&id=2528862.1
  https://support.oracle.com/rs?type=doc&id=2518754.1

Oracle Communications: CPU of July 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2681987.1
  https://support.oracle.com/rs?type=doc&id=2682459.1
  https://support.oracle.com/rs?type=doc&id=2682014.1
  https://support.oracle.com/rs?type=doc&id=2683787.1
  https://support.oracle.com/rs?type=doc&id=2683788.1
  https://support.oracle.com/rs?type=doc&id=2683789.1
  https://support.oracle.com/rs?type=doc&id=2682045.1
  https://support.oracle.com/rs?type=doc&id=2683831.1
  https://support.oracle.com/rs?type=doc&id=2682010.1
  https://support.oracle.com/rs?type=doc&id=2683832.1
  https://support.oracle.com/rs?type=doc&id=2682500.1
  https://support.oracle.com/rs?type=doc&id=2683241.1
  https://support.oracle.com/rs?type=doc&id=2682011.1
  https://support.oracle.com/rs?type=doc&id=2683840.1
  https://support.oracle.com/rs?type=doc&id=2682018.1
  https://support.oracle.com/rs?type=doc&id=2683841.1
  https://support.oracle.com/rs?type=doc&id=2683842.1
  https://support.oracle.com/rs?type=doc&id=2683843.1
  https://support.oracle.com/rs?type=doc&id=2683845.1

RHEL 6.4: new kernel packages (16/08/2018).
New packages are available:
  RHEL 6: kernel 2.6.32-358.91.4.el6

RHEL 6.5: new kernel packages.
New packages are available:
  RHEL 6: kernel 2.6.32-431.91.3.el6

RHEL 6.6: new kernel packages.
New packages are available:
  RHEL 6: kernel 2.6.32-504.72.4.el6

RHEL 6.7: new kernel packages.
New packages are available:
  RHEL 6: kernel 2.6.32-573.60.4.el6

RHEL 6: new kernel packages (16/08/2018).
New packages are available:
  RHEL 6: kernel 2.6.32-754.3.5.el6
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a software vulnerability announce. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.