-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.1800
            Vulnerabilities in the Linux Kernel affect PowerKVM
                                20 May 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           PowerKVM
Publisher:         IBM
Operating System:  KVM
Impact/Access:     Denial of Service -- Remote/Unauthenticated
                   Root Compromise   -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-6974 CVE-2018-1000026 CVE-2018-18559
                   CVE-2018-17972 CVE-2018-14634 CVE-2018-14633
                   CVE-2018-13405 CVE-2018-10940 CVE-2018-10883
                   CVE-2018-10881 CVE-2018-10879 CVE-2018-10878
                   CVE-2018-9568 CVE-2018-8781 CVE-2018-7757
                   CVE-2018-7740 CVE-2018-5803 CVE-2018-5344
                   CVE-2018-1130 CVE-2018-1094 CVE-2018-1092
                   CVE-2017-18344 CVE-2017-18232 CVE-2017-18208
                   CVE-2017-17805 CVE-2017-10661 CVE-2017-0861
                   CVE-2016-4913 CVE-2015-8830 

Reference:         ASB-2019.0109
                   ASB-2019.0084
                   ESB-2019.1793
                   ESB-2019.1723

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=ibm10881424

- --------------------------BEGIN INCLUDED TEXT--------------------

Vulnerabilities in the Linux Kernel affect PowerKVM

Product:             PowerKVM
Software version:    3.1
Operating system(s): Linux
Reference #:         0881424

Security Bulletin

Summary

PowerKVM is affected by vulnerabilities in the Linux Kernel. IBM has now
addressed these vulnerabilities.

Vulnerability Details

CVEID: CVE-2018-1000026
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by the
improper validation of user-supplied input by the bnx2x network card driver. By
sending specially crafted GSO packets, a remote attacker could exploit this
vulnerability to cause an assertion and take the card off-line.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
138955 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2018-18559
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by a
use-after-free when there is an incomplete fix for a race condition between
fanout_add from setsockopt and bind on an AF_PACKET socket. By sending a
specially crafted packet, a remote attacker could exploit this vulnerability to
achieve Program Counter control and cause the kernel to crash.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
151816 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2018-14634
DESCRIPTION: Linux Kernel could allow a local authenticated attacker to gain
elevated privileges on the system, caused by an integer overflow in the
create_elf_tables function. By using a specially-crafted binary file, an
attacker could exploit this vulnerability to obtain full root privileges.
CVSS Base Score: 7.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
150310 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)

CVEID: CVE-2018-14633
DESCRIPTION: Linux Kernel is vulnerable to a stack-based buffer overflow,
caused by improper bounds checking by the chap_server_compute_md5() function.
If the iSCSI target to be enabled on the victim host, an attacker could
overflow a buffer and execute arbitrary code on the system or cause the system
to crash.
CVSS Base Score: 7
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
150238 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H)

CVEID: CVE-2018-13405
DESCRIPTION: Linux Kernel could allow a local attacker to gain elevated
privileges on the system, caused by a flaw in the fs/inode.c:inode_init_owner()
function. An attacker could exploit this vulnerability to create files with an
unintended group ownership.
CVSS Base Score: 4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
146434 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVEID: CVE-2018-10940
DESCRIPTION: Linux Kernel could allow a local attacker to obtain sensitive
information, caused by a flaw in the cdrom_ioctl_media_changed function in
drivers/cdrom/cdrom.c. By using a specially-crafted ioctl, an attacker could
exploit this vulnerability to read out kernel memory.
CVSS Base Score: 4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
143080 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2018-10883
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by an
out-of-bounds write in the jbd2_journal_dirty_metadata() function. By mounting
and operating on a specially crafted ext4 filesystem image, a local attacker
could exploit this vulnerability to cause the system to crash.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
147830 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2018-10881
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by an
out-of-bound access in the ext4_get_group_info function. By mounting and
operating on a specially crafted ext4 filesystem image, a local attacker could
exploit this vulnerability to cause the system to crash.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
147820 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2018-10879
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by a
use-after-free in the ext4_xattr_set_entry function. By renaming a file a
specially crafted ext4 filesystem image, a local attacker could exploit this
vulnerability to cause the system to crash.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
147832 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2018-10878
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by an
out-of-bounds write in the ext4 filesystem. By mounting and operating on a
specially crafted ext4 filesystem image, a local attacker could exploit this
vulnerability to cause the system to crash.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
147833 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2018-8781
DESCRIPTION: Linux Kernel could allow a local attacker to execute arbitrary
code on the system, caused by an integer overflow in the udl_fb_mmap function
in drivers/gpu/drm/udl/udl_fb.c. An attacker could exploit this vulnerability
to execute arbitrary code on the system.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
142300 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID: CVE-2018-7757
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by a
memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/
sas_expander.c. By performing many read accesses to files in the /sys/class/
sas_phy directory, a local attacker could exploit this vulnerability to cause
the system to crash.
CVSS Base Score: 4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
140138 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2018-7740
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by a
flaw in the resv_map_release function in mm/hugetlb.c. By using a
specially-crafted application, a local attacker could exploit this
vulnerability to cause the system to cause a denial of service.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
139974 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2018-5803
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by a in
the _sctp_make_chunk() function in net/sctp/sm_make_chunk.c. By sending
specially-crafted SCTP packets, a local attacker could exploit this
vulnerability to cause the kernel to crash.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
139740 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2018-5344
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by a
use-after-free in the drivers/block/loop.c. A local attacker could exploit this
vulnerability to cause the system to crash.
CVSS Base Score: 4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
137649 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2018-1130
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by a
NULL pointer dereference in dccp_write_xmit() function in net/dccp/output.c. By
using specially-crafted system calls, a local attacker could exploit this
vulnerability to cause the system to crash.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
143153 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2018-1094
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by a
NULL pointer dereference flaw in the ext4_fill_super function in fs/ext4/
super.c. By persuading a victim to open a specially-crafted file, a remote
attacker could exploit this vulnerability to cause the system to crash.
CVSS Base Score: 5.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
141198 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)

CVEID: CVE-2018-1092
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by a
NULL pointer dereference flaw in the ext4_iget function in fs/ext4/inode.c. By
persuading a victim to open a specially-crafted file, a remote attacker could
exploit this vulnerability to cause the system to crash.
CVSS Base Score: 5.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
141196 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)

CVEID: CVE-2017-18344
DESCRIPTION: Linux Kernel could allow a local attacker to obtain sensitive
information, caused by an out-of-bounds memory read error in the sigevent->
sigev_notify'' field of show_timer() function. An attacker could exploit this
vulnerability to obtain kernel memory.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
147880 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID: CVE-2017-18232
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by a
deadlock in the Serial Attached SCSI (SAS) implementation. By triggering
certain error-handling code, a local attacker could exploit this vulnerability
to cause the system to crash.
CVSS Base Score: 4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
140428 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2017-18208
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by a
flaw in the madvise_willneed function in mm/madvise.c. By triggering use of
MADVISE_WILLNEED for a DAX mapping, a local attacker could exploit this
vulnerability to cause a denial of service.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
139764 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2017-17805
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by
improper handling of zero-length inputs in the Salsa20 encryption algorithm. By
using the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER), a
local authenticated attacker could exploit this vulnerability to cause the
system crash.
CVSS Base Score: 5.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
136626 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2017-10661
DESCRIPTION: Linux Kernel could allow a local attacker to gain elevated
privileges on the system, caused by a race condition in fs/timerfd.c. An
attacker could exploit this vulnerability to gain privileges or cause a denial
of service.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
130802 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

CVEID: CVE-2017-0861
DESCRIPTION: Google Android could allow a remote attacker to gain elevated
privileges on the system, caused by a flaw in the Upstream kernel audio driver.
By persuading a victim to open a specially-crafted application, an attacker
could exploit this vulnerability to gain elevated privileges on the system.
CVSS Base Score: 7.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
135049 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)

CVEID: CVE-2016-4913
DESCRIPTION: Linux Kernel could allow a local attacker to obtain sensitive
information, caused by the improper handling of NM entries containing NUL
characters by the get_rock_ridge_filename function in fs/isofs/rock.c. An
attacker could exploit this vulnerability using a specially crafted isofs
filesystem to read from kernel memory locations.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
113397 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID: CVE-2015-8830
DESCRIPTION: Linux Kernel could allow a remote attacker to execute arbitrary
code on the system, caused by an integer overflow in the AIO interface. By
applying to certain filesystems, socket or device types, an attacker could
exploit this vulnerability to execute arbitrary code on the system.
CVSS Base Score: 7.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
111186 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

CVEID: CVE-2019-6974
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by the
improper handling of reference counting by kvm_ioctl_create_device in virt/kvm/
kvm_main.c. A local authenticated attacker could exploit this vulnerability to
trigger a use-after-free to crash the guest VM and possibly gain privileged
access to a system.
CVSS Base Score: 7.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
157074 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H)

CVEID: CVE-2018-17972
DESCRIPTION: Linux Kernel could allow a local attacker to obtain sensitive
information, caused by a flaw in the proc_pid_stack function in fs/proc/base.c.
By sending a specially-crafted request, a local attacker could exploit this
vulnerability to obtain kernel task stack contents.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
150826 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID: CVE-2018-9568
DESCRIPTION: Google Android could allow a local attacker to gain elevated
privileges on the system, caused by a type confusion flaw in the sk_clone_lock
function in sock.c. By sending a specially-crafted request, an attacker could
exploit this vulnerability to gain elevated privileges.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
153889 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

PowerKVM 3.1

Remediation/Fixes

Customers can update PowerKVM systems by using "yum update".

Fix images are made available via Fix Central. For version 3.1, see https://
ibm.biz/BdHggw. This issue is addressed starting with v3.1.0.2 update 18.

Workarounds and Mitigations

none

Change History

18 April 2019 - Initial Version

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=FUSw
-----END PGP SIGNATURE-----