Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.1090 Important: kernel-rt security, bug fix, and enhancement update 11 April 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: kernel-rt Publisher: Red Hat Operating System: Red Hat Enterprise Linux Server 7 Red Hat Enterprise Linux WS/Desktop 7 Impact/Access: Root Compromise -- Existing Account Denial of Service -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Reduced Security -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2018-1000004 CVE-2018-6927 CVE-2018-5750 CVE-2017-1000410 CVE-2017-1000407 CVE-2017-1000252 CVE-2017-18203 CVE-2017-18017 CVE-2017-17558 CVE-2017-17449 CVE-2017-17448 CVE-2017-17053 CVE-2017-15265 CVE-2017-15129 CVE-2017-15127 CVE-2017-15126 CVE-2017-15121 CVE-2017-15116 CVE-2017-14140 CVE-2017-13166 CVE-2017-12190 CVE-2017-12154 CVE-2017-9725 CVE-2017-8824 CVE-2017-7294 CVE-2016-8633 CVE-2016-7913 CVE-2016-3672 Reference: ASB-2017.0141 ASB-2016.0103 ASB-2016.0079 Original Bulletin: https://access.redhat.com/errata/RHSA-2018:0676 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security, bug fix, and enhancement update Advisory ID: RHSA-2018:0676-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:0676 Issue date: 2018-04-10 CVE Names: CVE-2016-3672 CVE-2016-7913 CVE-2016-8633 CVE-2017-7294 CVE-2017-8824 CVE-2017-9725 CVE-2017-12154 CVE-2017-12190 CVE-2017-13166 CVE-2017-14140 CVE-2017-15116 CVE-2017-15121 CVE-2017-15126 CVE-2017-15127 CVE-2017-15129 CVE-2017-15265 CVE-2017-17053 CVE-2017-17448 CVE-2017-17449 CVE-2017-17558 CVE-2017-18017 CVE-2017-18203 CVE-2017-1000252 CVE-2017-1000407 CVE-2017-1000410 CVE-2018-5750 CVE-2018-6927 CVE-2018-1000004 ===================================================================== 1. Summary: An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux for Real Time (v. 7) - noarch, x86_64 Red Hat Enterprise Linux for Real Time for NFV (v. 7) - noarch, x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: Buffer overflow in firewire driver via crafted incoming packets (CVE-2016-8633, Important) * kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824, Important) * Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register (CVE-2017-12154, Important) * kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166, Important) * kernel: media: use-after-free in [tuner-xc2028] media driver (CVE-2016-7913, Moderate) * kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl() (CVE-2017-7294, Moderate) * kernel: Incorrect type conversion for size during dma allocation (CVE-2017-9725, Moderate) * kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190, Moderate) * kernel: vfs: BUG in truncate_inode_pages_range() and fuse client (CVE-2017-15121, Moderate) * kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c (CVE-2017-15126, Moderate) * kernel: net: double-free and memory corruption in get_net_ns_by_id() (CVE-2017-15129, Moderate) * kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265, Moderate) * kernel: Incorrect handling in arch/x86/include/asm/mmu_context.h:init_new_context function allowing use-after-free (CVE-2017-17053, Moderate) * kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure (CVE-2017-17448, Moderate) * kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity (CVE-2017-17449, Moderate) * kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow (CVE-2017-17558, Moderate) * kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c (CVE-2017-18017, Moderate) * kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service (CVE-2017-18203, Moderate) * kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ (CVE-2017-1000252, Moderate) * Kernel: KVM: DoS via write flood to I/O port 0x80 (CVE-2017-1000407, Moderate) * kernel: Stack information leak in the EFS element (CVE-2017-1000410, Moderate) * kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass (CVE-2018-5750, Moderate) * kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004, Moderate) * kernel: unlimiting the stack disables ASLR (CVE-2016-3672, Low) * kernel: Missing permission check in move_pages system call (CVE-2017-14140, Low) * kernel: Null pointer dereference in rngapi_reset function (CVE-2017-15116, Low) * kernel: Improper error handling of VM_SHARED hugetlbfs mapping in mm/hugetlb.c (CVE-2017-15127, Low) * kernel: Integer overflow in futex.c:futux_requeue can lead to denial of service or unspecified impact (CVE-2018-6927, Low) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Eyal Itkin for reporting CVE-2016-8633; Mohamed Ghannam for reporting CVE-2017-8824; Jim Mattson (Google.com) for reporting CVE-2017-12154; Vitaly Mayatskih for reporting CVE-2017-12190; Andrea Arcangeli (Engineering) for reporting CVE-2017-15126; Kirill Tkhai for reporting CVE-2017-15129; Jan H. Schönherr (Amazon) for reporting CVE-2017-1000252; and Armis Labs for reporting CVE-2017-1000410. The CVE-2017-15121 issue was discovered by Miklos Szeredi (Red Hat) and the CVE-2017-15116 issue was discovered by ChunYu Wang (Red Hat). Additional Changes: See the Red Hat Enterprise Linux 7.5 Release Notes linked from References. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1292927 - rcuc starvation leads to rcu stall 1324749 - CVE-2016-3672 kernel: unlimiting the stack disables ASLR 1391490 - CVE-2016-8633 kernel: Buffer overflow in firewire driver via crafted incoming packets 1401061 - RFE: Improve RT throttling mechanism 1402885 - CVE-2016-7913 kernel: media: use-after-free in [tuner-xc2028] media driver 1430418 - Backport "net/Qdisc: use a seqlock instead seqcount" upstream RT patch 1436798 - CVE-2017-7294 kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl() 1448770 - INFO: task xfsaild/dm-2:1175 blocked for more than 600 seconds 1452589 - Review our frequency scaling setup/tuning 1462329 - RT: update source tree to match RHEL 7.5 tree 1488329 - CVE-2017-14140 kernel: Missing permission check in move_pages system call 1489088 - CVE-2017-9725 kernel: Incorrect type conversion for size during dma allocation 1490781 - CVE-2017-1000252 kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ 1491224 - CVE-2017-12154 Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register 1495089 - CVE-2017-12190 kernel: memory leak when merging buffers in SCSI IO vectors 1500894 - sched/rt: Simplify the IPI rt balancing logic 1501878 - CVE-2017-15265 kernel: Use-after-free in snd_seq_ioctl_create_port() 1503749 - RT + Omnipath panic 1506255 - mm: print warning when ksmd thread runs with CONFIG_PREEMPT_RT enabled 1507270 - BUG: scheduling while atomic: irq/41-megasas/562/0x00000002 1509264 - [RHEL-RT] Possible regression with NOHZ_FULL & rt_mutexes in IRQ (BZ1250649) 1514609 - CVE-2017-15116 kernel: Null pointer dereference in rngapi_reset function 1518274 - backport: c4ccd6b1ce locking/rtmutex: Prevent dequeue vs. unlock race 1518638 - CVE-2017-17053 kernel: Incorrect handling in arch/x86/include/asm/mmu_context.h:init_new_context function allowing use-after-free 1519160 - CVE-2017-1000410 kernel: Stack information leak in the EFS element 1519591 - CVE-2017-8824 kernel: Use-after-free vulnerability in DCCP socket 1520328 - CVE-2017-1000407 Kernel: KVM: DoS via write flood to I/O port 0x80 1520893 - CVE-2017-15121 kernel: vfs: BUG in truncate_inode_pages_range() and fuse client 1523481 - CVE-2017-15126 kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c 1525218 - CVE-2017-15127 kernel: Improper error handling of VM_SHARED hugetlbfs mapping in mm/hugetlb.c 1525474 - CVE-2017-17558 kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow 1525762 - CVE-2017-17449 kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity 1525768 - CVE-2017-17448 kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure 1531135 - CVE-2017-18017 kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c 1531174 - CVE-2017-15129 kernel: net: double-free and memory corruption in get_net_ns_by_id() 1535315 - CVE-2018-1000004 kernel: Race condition in sound system can lead to denial of service 1539706 - CVE-2018-5750 kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass 1544612 - CVE-2018-6927 kernel: Integer overflow in futex.c:futux_requeue can lead to denial of service or unspecified impact 1548412 - CVE-2017-13166 kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation 1550811 - CVE-2017-18203 kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service 6. Package List: Red Hat Enterprise Linux for Real Time for NFV (v. 7): Source: kernel-rt-3.10.0-862.rt56.804.el7.src.rpm noarch: kernel-rt-doc-3.10.0-862.rt56.804.el7.noarch.rpm x86_64: kernel-rt-3.10.0-862.rt56.804.el7.x86_64.rpm kernel-rt-debug-3.10.0-862.rt56.804.el7.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-862.rt56.804.el7.x86_64.rpm kernel-rt-debug-devel-3.10.0-862.rt56.804.el7.x86_64.rpm kernel-rt-debug-kvm-3.10.0-862.rt56.804.el7.x86_64.rpm kernel-rt-debug-kvm-debuginfo-3.10.0-862.rt56.804.el7.x86_64.rpm kernel-rt-debuginfo-3.10.0-862.rt56.804.el7.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-862.rt56.804.el7.x86_64.rpm kernel-rt-devel-3.10.0-862.rt56.804.el7.x86_64.rpm kernel-rt-kvm-3.10.0-862.rt56.804.el7.x86_64.rpm kernel-rt-kvm-debuginfo-3.10.0-862.rt56.804.el7.x86_64.rpm kernel-rt-trace-3.10.0-862.rt56.804.el7.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-862.rt56.804.el7.x86_64.rpm kernel-rt-trace-devel-3.10.0-862.rt56.804.el7.x86_64.rpm kernel-rt-trace-kvm-3.10.0-862.rt56.804.el7.x86_64.rpm kernel-rt-trace-kvm-debuginfo-3.10.0-862.rt56.804.el7.x86_64.rpm Red Hat Enterprise Linux for Real Time (v. 7): Source: kernel-rt-3.10.0-862.rt56.804.el7.src.rpm noarch: kernel-rt-doc-3.10.0-862.rt56.804.el7.noarch.rpm x86_64: kernel-rt-3.10.0-862.rt56.804.el7.x86_64.rpm kernel-rt-debug-3.10.0-862.rt56.804.el7.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-862.rt56.804.el7.x86_64.rpm kernel-rt-debug-devel-3.10.0-862.rt56.804.el7.x86_64.rpm kernel-rt-debuginfo-3.10.0-862.rt56.804.el7.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-862.rt56.804.el7.x86_64.rpm kernel-rt-devel-3.10.0-862.rt56.804.el7.x86_64.rpm kernel-rt-trace-3.10.0-862.rt56.804.el7.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-862.rt56.804.el7.x86_64.rpm kernel-rt-trace-devel-3.10.0-862.rt56.804.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-3672 https://access.redhat.com/security/cve/CVE-2016-7913 https://access.redhat.com/security/cve/CVE-2016-8633 https://access.redhat.com/security/cve/CVE-2017-7294 https://access.redhat.com/security/cve/CVE-2017-8824 https://access.redhat.com/security/cve/CVE-2017-9725 https://access.redhat.com/security/cve/CVE-2017-12154 https://access.redhat.com/security/cve/CVE-2017-12190 https://access.redhat.com/security/cve/CVE-2017-13166 https://access.redhat.com/security/cve/CVE-2017-14140 https://access.redhat.com/security/cve/CVE-2017-15116 https://access.redhat.com/security/cve/CVE-2017-15121 https://access.redhat.com/security/cve/CVE-2017-15126 https://access.redhat.com/security/cve/CVE-2017-15127 https://access.redhat.com/security/cve/CVE-2017-15129 https://access.redhat.com/security/cve/CVE-2017-15265 https://access.redhat.com/security/cve/CVE-2017-17053 https://access.redhat.com/security/cve/CVE-2017-17448 https://access.redhat.com/security/cve/CVE-2017-17449 https://access.redhat.com/security/cve/CVE-2017-17558 https://access.redhat.com/security/cve/CVE-2017-18017 https://access.redhat.com/security/cve/CVE-2017-18203 https://access.redhat.com/security/cve/CVE-2017-1000252 https://access.redhat.com/security/cve/CVE-2017-1000407 https://access.redhat.com/security/cve/CVE-2017-1000410 https://access.redhat.com/security/cve/CVE-2018-5750 https://access.redhat.com/security/cve/CVE-2018-6927 https://access.redhat.com/security/cve/CVE-2018-1000004 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.5_Release_Notes/index.html 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFazHmCXlSAg2UNWIIRAm3TAJ9SkjJqz3GMYnYsOipeN3jlNXkzeACglMfb UkloMCb6cVFY25mBfv76sd0= =fGkQ - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWs1tSIx+lLeg9Ub1AQiQihAAl37m+1XzmZSx4auViULPeMLfTSQYtSpi dCoWWjg1XihIJQQe2txqy+m/8APf1w8ejwtCjRxbRevFZNOSjYEnCBZz9OdSNj8N bKIZR+wAhpmqhNH6nDkJ4PGDp1EnM5hrb0gcHjtK4BxXRGpgf8acz0TgoVy3Wk8B u5pTiRFnCNVMcUJ3jiimY+ZIBzmqUJywzKlA/JbmhKsSztDeigqNvZ8Et23VTlTY 7+3R0D0frKzx/3z9uegl3NcUpUC9egF9qMxFvA/6cwGaevkth2xG2tiP1+gePf26 9XjHfmqvav+fabGODbtrHSP0hoXNsDcO8mGs+b3ii9Kt4BTg7JnHvbQX8JYOToHr 2CJAAM1PNWtmd6f3nvkbTEvBMEhCocsd9+9swMYMRK5ZyFOX+TaUoixeWmKDGMyp UegY4m181lUG9sG0aXXFM2v86kZI3fLVNda3kpBSM+Xx8y+3H488aOlPTRFfjgz2 Scam6hEGZXFpxWaNJluYlkAHn72aFmju+aWbwaGUpEu0t1xyXS4gW3Z+/kA7niII q6UOBMLSxwuOXS3Uuw5N/abvbazgymWkZUrFS9DcIFFORDLEt4m+HO+GBVII4xCv 54xTJF6sau6YhCjOEE2CHaHlrui7Jox9XMyHV+QYYaQ1Qi37YS1Yf2gOzPNWEhSM hElxzaWguUc= =Zr9e -----END PGP SIGNATURE-----