Red Hat Security Advisory 2019-0831-01 - The kernel-alt packages provide the Linux kernel version 4.x. Issues addressed include bypass, denial of service, null pointer, and use-after-free vulnerabilities.
56ec339fc2da9ed44f9d103367a73097824980f319bfbd006adc8ae2256618d5
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel-alt security and bug fix update
Advisory ID: RHSA-2019:0831-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2019:0831
Issue date: 2019-04-23
CVE Names: CVE-2018-13053 CVE-2018-13094 CVE-2018-14734
CVE-2018-17972 CVE-2018-18281 CVE-2018-18386
CVE-2018-18397 CVE-2019-9213
====================================================================
1. Summary:
An update for kernel-alt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, noarch, ppc64le, s390x
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, noarch, ppc64le
3. Description:
The kernel-alt packages provide the Linux kernel version 4.x.
Security Fix(es):
* kernel: lack of check for mmap minimum address in expand_downwards in
mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms
(CVE-2019-9213)
* kernel: use-after-free in ucma_leave_multicast in
drivers/infiniband/core/ucma.c (CVE-2018-14734)
* kernel: Unprivileged users able to inspect kernel stacks of arbitrary
tasks (CVE-2018-17972)
* kernel: TLB flush happens too late on mremap (CVE-2018-18281)
* kernel: Type confusion in drivers/tty/n_tty.c allows for a denial of
service (CVE-2018-18386)
* kernel: userfaultfd bypasses tmpfs file permissions (CVE-2018-18397)
* kernel: Integer overflow in the alarm_timer_nsleep function
(CVE-2018-13053)
* kernel: NULL pointer dereference in xfs_da_shrink_inode function
(CVE-2018-13094)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Bug Fix(es):
* Failed to boot with ftrace=function in kvm with 2vcpu (BZ#1501024)
* [ALT-7.5][x86_64] perf test 63 - inet_pton fails on x86_64 (BZ#1518836)
* BUG: potential out-of-bounds string access when forcing a SELinux label
on a file (BZ#1595706)
* stack out-of-bounds in smb{2,3}_create_lease_buf() on SMB2/SMB3 mounts
(BZ#1598757)
* [ALT-7.6][KVM][PANIC] ltp/lite proc01 - Unable to handle kernel paging
request at virtual address ffff7fe000200018 (BZ#1623193)
* Kernel lock up due to read/write lock (BZ#1636261)
* [RHEL-ALT] Fix potential Spectre v1 in tty code (BZ#1639679)
* [Huawei AArch64 7.6 Bug] HNS3: Vlan on HNS3 NIC cannot communicate
(BZ#1639713)
* [RHEL7.6-ALT][AWS] backport "nvme: update timeout module parameter type"
(BZ#1654958)
* ignore STABLE_FLAG of rmap_item->address in rmap_walk_ksm (BZ#1663565)
* RHEL-Alt-7.6 - kernel: zcrypt: fix specification exception on z196 at ap
probe (BZ#1670018)
* [Huawei AArch64 7.6 Bug] Flock over NFSv3 failed (BZ#1670650)
* [Huawei AArch64 7.6/7.6-z Bug] HNS3: if a single transmit packet(skb) has
more than 8 frags, will cause the NIC to be unavailable (BZ#1677643)
* krb5{,i,p} doesn't work with older enctypes on aarch64 (BZ#1678922)
Users of kernel are advised to upgrade to these updated packages, which fix
these bugs.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1597747 - CVE-2018-13053 kernel: Integer overflow in the alarm_timer_nsleep function
1597771 - CVE-2018-13094 kernel: NULL pointer dereference in xfs_da_shrink_inode function
1611005 - CVE-2018-14734 kernel: use-after-free in ucma_leave_multicast in drivers/infiniband/core/ucma.c
1636349 - CVE-2018-17972 kernel: Unprivileged users able to inspect kernel stacks of arbitrary tasks
1640598 - CVE-2018-18386 kernel: Type confusion in drivers/tty/n_tty.c allows for a denial of service
1641548 - CVE-2018-18397 kernel: userfaultfd bypasses tmpfs file permissions
1645121 - CVE-2018-18281 kernel: TLB flush happens too late on mremap
1686136 - CVE-2019-9213 kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms
6. Package List:
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):
Source:
kernel-alt-4.14.0-115.7.1.el7a.src.rpm
aarch64:
kernel-4.14.0-115.7.1.el7a.aarch64.rpm
kernel-debug-4.14.0-115.7.1.el7a.aarch64.rpm
kernel-debug-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm
kernel-debug-devel-4.14.0-115.7.1.el7a.aarch64.rpm
kernel-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm
kernel-debuginfo-common-aarch64-4.14.0-115.7.1.el7a.aarch64.rpm
kernel-devel-4.14.0-115.7.1.el7a.aarch64.rpm
kernel-headers-4.14.0-115.7.1.el7a.aarch64.rpm
kernel-tools-4.14.0-115.7.1.el7a.aarch64.rpm
kernel-tools-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm
kernel-tools-libs-4.14.0-115.7.1.el7a.aarch64.rpm
perf-4.14.0-115.7.1.el7a.aarch64.rpm
perf-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm
python-perf-4.14.0-115.7.1.el7a.aarch64.rpm
python-perf-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm
noarch:
kernel-abi-whitelists-4.14.0-115.7.1.el7a.noarch.rpm
kernel-doc-4.14.0-115.7.1.el7a.noarch.rpm
ppc64le:
kernel-4.14.0-115.7.1.el7a.ppc64le.rpm
kernel-bootwrapper-4.14.0-115.7.1.el7a.ppc64le.rpm
kernel-debug-4.14.0-115.7.1.el7a.ppc64le.rpm
kernel-debug-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm
kernel-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.14.0-115.7.1.el7a.ppc64le.rpm
kernel-devel-4.14.0-115.7.1.el7a.ppc64le.rpm
kernel-headers-4.14.0-115.7.1.el7a.ppc64le.rpm
kernel-tools-4.14.0-115.7.1.el7a.ppc64le.rpm
kernel-tools-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm
kernel-tools-libs-4.14.0-115.7.1.el7a.ppc64le.rpm
perf-4.14.0-115.7.1.el7a.ppc64le.rpm
perf-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm
python-perf-4.14.0-115.7.1.el7a.ppc64le.rpm
python-perf-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm
s390x:
kernel-4.14.0-115.7.1.el7a.s390x.rpm
kernel-debug-4.14.0-115.7.1.el7a.s390x.rpm
kernel-debug-debuginfo-4.14.0-115.7.1.el7a.s390x.rpm
kernel-debug-devel-4.14.0-115.7.1.el7a.s390x.rpm
kernel-debuginfo-4.14.0-115.7.1.el7a.s390x.rpm
kernel-debuginfo-common-s390x-4.14.0-115.7.1.el7a.s390x.rpm
kernel-devel-4.14.0-115.7.1.el7a.s390x.rpm
kernel-headers-4.14.0-115.7.1.el7a.s390x.rpm
kernel-kdump-4.14.0-115.7.1.el7a.s390x.rpm
kernel-kdump-debuginfo-4.14.0-115.7.1.el7a.s390x.rpm
kernel-kdump-devel-4.14.0-115.7.1.el7a.s390x.rpm
perf-4.14.0-115.7.1.el7a.s390x.rpm
perf-debuginfo-4.14.0-115.7.1.el7a.s390x.rpm
python-perf-4.14.0-115.7.1.el7a.s390x.rpm
python-perf-debuginfo-4.14.0-115.7.1.el7a.s390x.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):
aarch64:
kernel-debug-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm
kernel-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm
kernel-debuginfo-common-aarch64-4.14.0-115.7.1.el7a.aarch64.rpm
kernel-tools-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm
kernel-tools-libs-devel-4.14.0-115.7.1.el7a.aarch64.rpm
perf-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm
python-perf-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm
noarch:
kernel-doc-4.14.0-115.7.1.el7a.noarch.rpm
ppc64le:
kernel-debug-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm
kernel-debug-devel-4.14.0-115.7.1.el7a.ppc64le.rpm
kernel-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.14.0-115.7.1.el7a.ppc64le.rpm
kernel-tools-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm
kernel-tools-libs-devel-4.14.0-115.7.1.el7a.ppc64le.rpm
perf-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm
python-perf-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2018-13053
https://access.redhat.com/security/cve/CVE-2018-13094
https://access.redhat.com/security/cve/CVE-2018-14734
https://access.redhat.com/security/cve/CVE-2018-17972
https://access.redhat.com/security/cve/CVE-2018-18281
https://access.redhat.com/security/cve/CVE-2018-18386
https://access.redhat.com/security/cve/CVE-2018-18397
https://access.redhat.com/security/cve/CVE-2019-9213
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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phWZ
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce