﻿{"id":467,"date":"2018-11-28T16:06:23","date_gmt":"2018-11-28T22:06:23","guid":{"rendered":"https:\/\/www.uv.mx\/csirt\/?p=467"},"modified":"2018-11-28T16:06:23","modified_gmt":"2018-11-28T22:06:23","slug":"vulnerabilidad-en-kernel-de-linux","status":"publish","type":"post","link":"https:\/\/www.uv.mx\/csirt\/boletines\/vulnerabilidades\/vulnerabilidad-en-kernel-de-linux\/","title":{"rendered":"Vulnerabilidad en kernel de Linux"},"content":{"rendered":"<p>&nbsp;<\/p>\n<div style=\"width: 752px;max-width: 752px;height: auto;border: 1px solid #369;margin: 0px auto;background-color: #fff\">\n<p><img decoding=\"async\" style=\"width: 750px\" src=\"http:\/\/boletines.uv.mx\/images\/images\/boletin-encabezado.jpg\" alt=\"\" \/><\/p>\n<table style=\"width: 100%\" border=\"0\" cellspacing=\"1\" cellpadding=\"1\" align=\"center\">\n<tbody>\n<tr>\n<td><img decoding=\"async\" style=\"width: 190px;height: 25px\" src=\"http:\/\/boletines.uv.mx\/images\/images\/cintillo_importante.jpg\" alt=\"\" \/><\/td>\n<td style=\"text-align: right\"><span style=\"font-size: 18px\"><span style=\"color: #666666\"><span style=\"font-family: tahoma,geneva,sans-serif\">28 de noviembre de 2018<\/span><\/span><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr \/>\n<div style=\"background-color: #e6e6e6;line-height: 1.4\"><strong>Vulnerabilidad en kernel de Linux<\/strong><\/div>\n<div style=\"background-color: #e6e6e6;line-height: 1.4\">ID: 28111814<\/div>\n<div style=\"background-color: #ffffff;line-height: 1.4\">\n<hr \/>\n<\/div>\n<div style=\"background-color: #f5f5f5;line-height: 1.4\">\n<p><span style=\"color: #28519b\"><span style=\"font-size: 16px\"><strong>Descripci\u00f3n<\/strong><\/span><\/span><\/p>\n<p style=\"text-align: justify\">Se ha dado a conocer dos\u00a0vulnerabilidades con los identificadores CVE-2018-19406 que reside en la funci\u00f3n del n\u00facleo de Linux llamada <em>kvm_pv_send_ipi<\/em> en el m\u00f3dulo <em>arch\/x86\/kvm\/lapic.c<\/em> un atacante puede provocar una condici\u00f3n de denegaci\u00f3n de servicio a trav\u00e9s de llamadas al sistema para provocar desreferencia del\u00a0puntero\u00a0<em>kvm-&gt;arch.apic_map,<\/em> el segundo identificador CVE-2018-19047 reside en la funci\u00f3n <em>vcpu_scan_ioapic<\/em> del m\u00f3dulo <em>arch\/x86\/kvm\/x86.c<\/em> esto podr\u00eda provocar que un atacante cause un DDoS en la que <em>ioapic<\/em> (I\/O APIC Advance Programmable Interrupt Controller) no se inicialice.<\/p>\n<p style=\"text-align: justify\">Estas vulnerabilidades pueden ser aprovechadas por un atacante local que le permitir\u00eda provocar una denegaci\u00f3n de servicio.<\/p>\n<\/div>\n<div style=\"background-color: #ffffff;line-height: 1.4\">\n<p><span style=\"color: #28519b\"><strong><span style=\"font-size: 16px\">Productos afectados<\/span><\/strong><\/span><\/p>\n<\/div>\n<div style=\"background-color: #f7931e;line-height: 1.4\">\n<p>&nbsp;<\/p>\n<\/div>\n<div style=\"background-color: #ffffff;line-height: 1.4\">\n<ul>\n<li>Linux kernel versi\u00f3n 4.19.2<\/li>\n<\/ul>\n<hr size=\"2\" \/>\n<\/div>\n<div style=\"background-color: #f5f5f5;line-height: 1.4\">\n<p><span style=\"color: #28519b\"><span style=\"font-size: 16px\"><strong>Soluci\u00f3n:<\/strong><\/span><\/span><\/p>\n<p>Se han publicado los parches provisionales que solucionan \u00e9stas vulnerabilidades en la Lista de Correo del Kernel de Linux (LKML).<\/p>\n<p>Para m\u00e1s informaci\u00f3n:<\/p>\n<p><a href=\"https:\/\/lkml.org\/lkml\/2018\/11\/20\/411\">https:\/\/lkml.org\/lkml\/2018\/11\/20\/411<\/a><\/p>\n<p><a href=\"https:\/\/lkml.org\/lkml\/2018\/11\/20\/580\">https:\/\/lkml.org\/lkml\/2018\/11\/20\/580<\/a><\/p>\n<\/div>\n<p><img decoding=\"async\" style=\"width: 750px;height: 120px\" src=\"http:\/\/boletines.uv.mx\/images\/images\/cintillo_inferior.jpg\" alt=\"\" \/><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; 28 de noviembre de 2018 Vulnerabilidad en kernel de Linux ID: 28111814 Descripci\u00f3n Se ha dado a conocer dos\u00a0vulnerabilidades con los identificadores CVE-2018-19406 que reside en la funci\u00f3n del n\u00facleo de Linux llamada kvm_pv_send_ipi en el m\u00f3dulo arch\/x86\/kvm\/lapic.c un atacante puede provocar una condici\u00f3n de denegaci\u00f3n de servicio a trav\u00e9s de llamadas al sistema [&hellip;]<\/p>\n","protected":false},"author":2037,"featured_media":465,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ventana_nueva":"","tipo_url":"","url":"","extracto":"","imagen_halign":"","imagen_valign":"","bg_size":"","text_hide":"","media_url":"","tipo_media":"","video_url":"","video_pos":"","video_youtube":"","footnotes":""},"categories":[16,15],"tags":[],"class_list":["post-467","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-importantes","category-vulnerabilidades"],"_links":{"self":[{"href":"https:\/\/www.uv.mx\/csirt\/wp-json\/wp\/v2\/posts\/467","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uv.mx\/csirt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uv.mx\/csirt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uv.mx\/csirt\/wp-json\/wp\/v2\/users\/2037"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uv.mx\/csirt\/wp-json\/wp\/v2\/comments?post=467"}],"version-history":[{"count":0,"href":"https:\/\/www.uv.mx\/csirt\/wp-json\/wp\/v2\/posts\/467\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uv.mx\/csirt\/wp-json\/wp\/v2\/media\/465"}],"wp:attachment":[{"href":"https:\/\/www.uv.mx\/csirt\/wp-json\/wp\/v2\/media?parent=467"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uv.mx\/csirt\/wp-json\/wp\/v2\/categories?post=467"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uv.mx\/csirt\/wp-json\/wp\/v2\/tags?post=467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}