Bug 1622004 (CVE-2018-14619)

Summary: CVE-2018-14619 kernel: crash (possible privesc) in kernel crypto api.
Product: [Other] Security Response Reporter: Wade Mealing <wmealing>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: airlied, aquini, bhu, blc, bskeggs, dhoward, ewk, fhrbata, hdegoede, hkrzesin, iboverma, ichavero, itamar, jarodwilson, jforbes, jglisse, john.j5live, jonathan, josef, jross, jstancek, jwboyer, kernel-maint, kernel-mgr, labbott, lgoncalv, linville, matt, mchehab, mcressma, mjg59, mlangsdo, nmurray, plougher, rt-maint, rvrbovsk, security-response-team, skozina, steved, williams
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: kernel-4.15-rc4 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the crypto subsystem that allowed an attacker to crash the system or possibly escalate privileges with a specially crafted program.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-10 10:36:52 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1600394, 1622435, 1622436, 1622836, 1623767    
Bug Blocks: 1615186    

Description Wade Mealing 2018-08-24 06:38:31 UTC
A flaw was found in the crypto subsystem of the Linux kernel.

The "null skcipher" was being by dropped in the wrong place -- when each af_alg_ctx was freed instead of when the aead_tfm was freed. This can cause the null skcipher to be freed while it is still in use.

This may grant a local user to be able to crash the machine and possible corrupt memory leading to privilege escalation.

Upstream patch:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b32a7dc8aef1882fbf983eb354837488cc9d54dc

Comment 6 Wade Mealing 2018-08-28 07:31:58 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1622836]

Comment 7 Justin M. Forbes 2018-08-28 12:12:15 UTC
This issue was fixed for Fedora with the 4.14.8 stable kernel update.

Comment 8 Petr Matousek 2018-10-17 14:04:59 UTC
Acknowledgments:

Name: Florian Weimer (Red Hat), Ondrej Mosnacek (Red Hat)

Comment 9 errata-xmlrpc 2018-10-30 09:04:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:2948 https://access.redhat.com/errata/RHSA-2018:2948