Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.0738 kernel-alt security and bug fix update (PowerPC) 14 March 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: kernel-alt Publisher: Red Hat Operating System: Red Hat Enterprise Linux Server 7 Platform: PowerPC Impact/Access: Root Compromise -- Existing Account Access Privileged Data -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2017-17712 CVE-2017-16994 CVE-2017-5754 Reference: ASB-2018.0002.4 ESB-2018.0672 ESB-2018.0044 Original Bulletin: https://access.redhat.com/errata/RHSA-2018:0502 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel-alt security and bug fix update Advisory ID: RHSA-2018:0502-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:0502 Issue date: 2018-03-13 CVE Names: CVE-2017-16994 CVE-2017-17712 ===================================================================== 1. Summary: An update for kernel-alt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, noarch, ppc64le Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, noarch, ppc64le 3. Description: The kernel-alt packages provide the Linux kernel version 4.x. Security Fix(es): * hw: cpu: speculative execution permission faults handling (CVE-2017-5754, Important)(ppc only) * kernel: Race condition in raw_sendmsg function allows denial-of-service or kernel addresses leak (CVE-2017-17712, Important) * kernel: mm/pagewalk.c:walk_hugetlb_range function mishandles holes in hugetlb ranges causing information leak (CVE-2017-16994, Moderate) Bug Fix(es): * When changing the Maximum Transmission Unit (MTU) size on Broadcom BCM5717, BCM5718 and BCM5719 chipsets, the tg3 driver sometimes lost synchronization with the device. Consequently, the device became unresponsive. With this update, tg3 has been fixed, and devices no longer hang due to this behavior. (BZ#1533478) * Previously, the perf tool used strict string matching to provide related events to a particular CPUID instruction. Consequently, the events were not available on certain IBM PowerPC systems. This update fixes perf to use regular expressions instead of string matching of the entire CPUID string. As a result, the perf tool now supports events on IBM PowerPC architectures as expected. (BZ#1536567) * Previously, the kernel debugfs file system implemented removal protection based on sleepable read-copy-update (SRCU), which slowed down the drivers relying on the debugfs_remove_recursive() function. Consequently, a decrease in performance or a deadlock sometimes occurred. This update implements per-file removal protection in debugfs. As a result, the performance of the system has improved significantly. (BZ#1538030) * When running the 'perf test' command on a PowerKVM guest multiple times, the branch instructions recorded in Branch History Rolling Buffer (BHRB) entries were sometimes unmapped before the kernel processed the entries. Consequently, the operating system terminated unexpectedly. This update fixes the bug, and the operating system no longer crashes in the described situation. (BZ#1538031) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1518155 - CVE-2017-16994 kernel: mm/pagewalk.c:walk_hugetlb_range function mishandles holes in hugetlb ranges causing information leak 1519781 - CVE-2017-5754 hw: cpu: speculative execution permission faults handling 1526427 - CVE-2017-17712 kernel: Race condition in raw_sendmsg function allows denial-of-service or kernel addresses leak 6. Package List: Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7): Source: kernel-alt-4.11.0-44.6.1.el7a.src.rpm aarch64: kernel-4.11.0-44.6.1.el7a.aarch64.rpm kernel-debug-4.11.0-44.6.1.el7a.aarch64.rpm kernel-debug-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm kernel-debug-devel-4.11.0-44.6.1.el7a.aarch64.rpm kernel-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm kernel-debuginfo-common-aarch64-4.11.0-44.6.1.el7a.aarch64.rpm kernel-devel-4.11.0-44.6.1.el7a.aarch64.rpm kernel-headers-4.11.0-44.6.1.el7a.aarch64.rpm kernel-tools-4.11.0-44.6.1.el7a.aarch64.rpm kernel-tools-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm kernel-tools-libs-4.11.0-44.6.1.el7a.aarch64.rpm perf-4.11.0-44.6.1.el7a.aarch64.rpm perf-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm python-perf-4.11.0-44.6.1.el7a.aarch64.rpm python-perf-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm noarch: kernel-abi-whitelists-4.11.0-44.6.1.el7a.noarch.rpm kernel-doc-4.11.0-44.6.1.el7a.noarch.rpm ppc64le: kernel-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-bootwrapper-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-debug-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-debug-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-debug-devel-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-devel-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-headers-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-tools-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-tools-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-tools-libs-4.11.0-44.6.1.el7a.ppc64le.rpm perf-4.11.0-44.6.1.el7a.ppc64le.rpm perf-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm python-perf-4.11.0-44.6.1.el7a.ppc64le.rpm python-perf-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7): aarch64: kernel-4.11.0-44.6.1.el7a.aarch64.rpm kernel-debug-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm kernel-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm kernel-debuginfo-common-aarch64-4.11.0-44.6.1.el7a.aarch64.rpm kernel-tools-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm kernel-tools-libs-devel-4.11.0-44.6.1.el7a.aarch64.rpm perf-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm python-perf-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm noarch: kernel-abi-whitelists-4.11.0-44.6.1.el7a.noarch.rpm kernel-doc-4.11.0-44.6.1.el7a.noarch.rpm ppc64le: kernel-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-debug-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-tools-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-tools-libs-devel-4.11.0-44.6.1.el7a.ppc64le.rpm perf-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm python-perf-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-16994 https://access.redhat.com/security/cve/CVE-2017-17712 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFap/AjXlSAg2UNWIIRAtupAKCqwo00AJUwxOzgb3f/atWK3uEX7gCeMoBF XY1wJEowxhbwRlF6Me3RLAM= =uXPz - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWqhs14x+lLeg9Ub1AQi22RAAjMQWJmVo5p47EGC3IYFjbVz33qQTwxI0 EjdcUEXTYRQ3aqi83KKfRx5bOOlO/Y+lRXAk+olDtuA8tav4KCuE+I67qXDLbRGB ya9kqzSgSkuqgXARRbnPEcEgsVUZDcPnDUjAOr/OOO0mGeyd5G/e+heu049YjJUx qVj8ArvUu9lc3bxwuT8PyHaA83oHrCVVIRcBKZEG0qM4xeL5pEFuP2Uzs06VDTXR ZMDDcY3xIPIpMftKeBoX1ie1czSjqk8wuQHruAVbwMBJhIT22PoZADz1I82z+17w nSOxUSQt225PY4OJF7RvkceBmayvtEkAOMRI8WXUlgRYhsteondSYzObhBT8FBNM 7ms1dVRH64EV7Lzw1JhxWZBFwPsmRI5y27NB+Ti5DhqgCfpV0WMIAffZuMLxmZ16 p7mREAUCLMVz7tHSAimfSag+24PzR++pFZfADOU8gSiW8OnYMjBmBPLIbTvpsM6H eEkjHezVpUCLSXtjKt17i/2clvHXKTudBqSF6c8zYgsqh53gbAqYN5sPTJgYALnh vRofG7QFOws5C8t1Mjr4tOaMrXBtImdb48OsTSf+Vn5xEbySXwX02UNyJz93V11o tYad38Qnpe8RF0SIizK1EjhxWLn6By0GqiUcSWJDZ6ph62n3D3qZ8xwOlYGGKQkR nyAZ0GqNmrc= =7DNX -----END PGP SIGNATURE-----