Oracle has issued an update for kernel-uek included in Oracle VM Server for x86, fixing privilege escalation and information disclosure vulnerabilities.
PUBLISH DATE: 01-10-2018
Oracle VM Server 3.x was detected to have multiple vulnerabilities which may lead to information disclosure or privilege escalation when exploited by malicious local users. Oracle has issued an update that patches the mentioned vulnerabilities.
Below is a brief summary of the vulnerabilities addressed in this update.
The acpi_ns_evaluate() function in drivers/acpi/acpica/nseval.c in the Linux kernel through 4.12.9 does not flush the operand cache which leads to a kernel stack dump. It allows the local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted ACPI table (which is installed in the kernel through 4.9).
An issue was discovered in the __ns_get_path function in fs/nsfs.c in the Linux kernel before 4.11. A Use After Free condition may occur due to a race condition when accessing files. All Android releases from CAF using the Linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) will be affected, before security patch level 2018-07-05.
Linux kernel before 4.18.6 may allow for an information leakage in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c. The vulnerability could allow local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This vulnerability resembles CVE-2018-10940.
Oracle VM Server 3.x
Apply updated packages or use unaffected versions of the Linux Kernel mentioned above.
Follow the link for help.