-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: kernel-alt security and bug fix update
Advisory ID:       RHSA-2018:0502-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2018:0502
Issue date:        2018-03-13
CVE Names:         CVE-2017-16994 CVE-2017-17712 
====================================================================
1. Summary:

An update for kernel-alt is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, noarch, ppc64le
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, noarch, ppc64le

3. Description:

The kernel-alt packages provide the Linux kernel version 4.x.

Security Fix(es):

* hw: cpu: speculative execution permission faults handling (CVE-2017-5754,
Important)(ppc only)

* kernel: Race condition in raw_sendmsg function allows denial-of-service
or kernel addresses leak (CVE-2017-17712, Important)

* kernel: mm/pagewalk.c:walk_hugetlb_range function mishandles holes in
hugetlb ranges causing information leak (CVE-2017-16994, Moderate)

Bug Fix(es):

* When changing the Maximum Transmission Unit (MTU) size on Broadcom
BCM5717, BCM5718 and BCM5719 chipsets, the tg3 driver sometimes lost
synchronization with the device. Consequently, the device became
unresponsive. With this update, tg3 has been fixed, and devices no longer
hang due to this behavior. (BZ#1533478)

* Previously, the perf tool used strict string matching to provide related
events to a particular CPUID instruction. Consequently, the events were not
available on certain IBM PowerPC systems. This update fixes perf to use
regular expressions instead of string matching of the entire CPUID string.
As a result, the perf tool now supports events on IBM PowerPC architectures
as expected. (BZ#1536567)

* Previously, the kernel debugfs file system implemented removal protection
based on sleepable read-copy-update (SRCU), which slowed down the driversrelying on the debugfs_remove_recursive() function. Consequently, a
decrease in performance or a deadlock sometimes occurred. This update
implements per-file removal protection in debugfs. As a result, the
performance of the system has improved significantly. (BZ#1538030)

* When running the 'perf test' command on a PowerKVM guest multiple times,
the branch instructions recorded in Branch History Rolling Buffer (BHRB)
entries were sometimes unmapped before the kernel processed the entries.
Consequently, the operating system terminated unexpectedly. This update
fixes the bug, and the operating system no longer crashes in the described
situation. (BZ#1538031)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1518155 - CVE-2017-16994 kernel: mm/pagewalk.c:walk_hugetlb_range function mishandles holes in hugetlb ranges causing information leak
1519781 - CVE-2017-5754 hw: cpu: speculative execution permission faults handling
1526427 - CVE-2017-17712 kernel: Race condition in raw_sendmsg function allows denial-of-service or kernel addresses leak

6. Package List:

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):

Source:
kernel-alt-4.11.0-44.6.1.el7a.src.rpm

aarch64:
kernel-4.11.0-44.6.1.el7a.aarch64.rpm
kernel-debug-4.11.0-44.6.1.el7a.aarch64.rpm
kernel-debug-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm
kernel-debug-devel-4.11.0-44.6.1.el7a.aarch64.rpm
kernel-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm
kernel-debuginfo-common-aarch64-4.11.0-44.6.1.el7a.aarch64.rpm
kernel-devel-4.11.0-44.6.1.el7a.aarch64.rpm
kernel-headers-4.11.0-44.6.1.el7a.aarch64.rpm
kernel-tools-4.11.0-44.6.1.el7a.aarch64.rpm
kernel-tools-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm
kernel-tools-libs-4.11.0-44.6.1.el7a.aarch64.rpm
perf-4.11.0-44.6.1.el7a.aarch64.rpm
perf-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm
python-perf-4.11.0-44.6.1.el7a.aarch64.rpm
python-perf-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm

noarch:
kernel-abi-whitelists-4.11.0-44.6.1.el7a.noarch.rpm
kernel-doc-4.11.0-44.6.1.el7a.noarch.rpm

ppc64le:
kernel-4.11.0-44.6.1.el7a.ppc64le.rpm
kernel-bootwrapper-4.11.0-44.6.1.el7a.ppc64le.rpm
kernel-debug-4.11.0-44.6.1.el7a.ppc64le.rpm
kernel-debug-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm
kernel-debug-devel-4.11.0-44.6.1.el7a.ppc64le.rpm
kernel-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.11.0-44.6.1.el7a.ppc64le.rpm
kernel-devel-4.11.0-44.6.1.el7a.ppc64le.rpm
kernel-headers-4.11.0-44.6.1.el7a.ppc64le.rpm
kernel-tools-4.11.0-44.6.1.el7a.ppc64le.rpm
kernel-tools-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm
kernel-tools-libs-4.11.0-44.6.1.el7a.ppc64le.rpm
perf-4.11.0-44.6.1.el7a.ppc64le.rpm
perf-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm
python-perf-4.11.0-44.6.1.el7a.ppc64le.rpm
python-perf-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):

aarch64:
kernel-4.11.0-44.6.1.el7a.aarch64.rpm
kernel-debug-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm
kernel-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm
kernel-debuginfo-common-aarch64-4.11.0-44.6.1.el7a.aarch64.rpm
kernel-tools-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm
kernel-tools-libs-devel-4.11.0-44.6.1.el7a.aarch64.rpm
perf-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm
python-perf-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm

noarch:
kernel-abi-whitelists-4.11.0-44.6.1.el7a.noarch.rpm
kernel-doc-4.11.0-44.6.1.el7a.noarch.rpm

ppc64le:
kernel-4.11.0-44.6.1.el7a.ppc64le.rpm
kernel-debug-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm
kernel-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.11.0-44.6.1.el7a.ppc64le.rpm
kernel-tools-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm
kernel-tools-libs-devel-4.11.0-44.6.1.el7a.ppc64le.rpm
perf-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm
python-perf-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2017-16994
https://access.redhat.com/security/cve/CVE-2017-17712
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFap/AjXlSAg2UNWIIRAtupAKCqwo00AJUwxOzgb3f/atWK3uEX7gCeMoBF
XY1wJEowxhbwRlF6Me3RLAM=uXPz
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2018-0502:01 Important: kernel-alt security and bug fix update

An update for kernel-alt is now available for Red Hat Enterprise Linux 7

Summary

The kernel-alt packages provide the Linux kernel version 4.x.
Security Fix(es):
* hw: cpu: speculative execution permission faults handling (CVE-2017-5754, Important)(ppc only)
* kernel: Race condition in raw_sendmsg function allows denial-of-service or kernel addresses leak (CVE-2017-17712, Important)
* kernel: mm/pagewalk.c:walk_hugetlb_range function mishandles holes in hugetlb ranges causing information leak (CVE-2017-16994, Moderate)
Bug Fix(es):
* When changing the Maximum Transmission Unit (MTU) size on Broadcom BCM5717, BCM5718 and BCM5719 chipsets, the tg3 driver sometimes lost synchronization with the device. Consequently, the device became unresponsive. With this update, tg3 has been fixed, and devices no longer hang due to this behavior. (BZ#1533478)
* Previously, the perf tool used strict string matching to provide related events to a particular CPUID instruction. Consequently, the events were not available on certain IBM PowerPC systems. This update fixes perf to use regular expressions instead of string matching of the entire CPUID string. As a result, the perf tool now supports events on IBM PowerPC architectures as expected. (BZ#1536567)
* Previously, the kernel debugfs file system implemented removal protection based on sleepable read-copy-update (SRCU), which slowed down the driversrelying on the debugfs_remove_recursive() function. Consequently, a decrease in performance or a deadlock sometimes occurred. This update implements per-file removal protection in debugfs. As a result, the performance of the system has improved significantly. (BZ#1538030)
* When running the 'perf test' command on a PowerKVM guest multiple times, the branch instructions recorded in Branch History Rolling Buffer (BHRB) entries were sometimes unmapped before the kernel processed the entries. Consequently, the operating system terminated unexpectedly. This update fixes the bug, and the operating system no longer crashes in the described situation. (BZ#1538031)



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2017-16994 https://access.redhat.com/security/cve/CVE-2017-17712 https://access.redhat.com/security/updates/classification/#important

Package List

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):
Source: kernel-alt-4.11.0-44.6.1.el7a.src.rpm
aarch64: kernel-4.11.0-44.6.1.el7a.aarch64.rpm kernel-debug-4.11.0-44.6.1.el7a.aarch64.rpm kernel-debug-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm kernel-debug-devel-4.11.0-44.6.1.el7a.aarch64.rpm kernel-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm kernel-debuginfo-common-aarch64-4.11.0-44.6.1.el7a.aarch64.rpm kernel-devel-4.11.0-44.6.1.el7a.aarch64.rpm kernel-headers-4.11.0-44.6.1.el7a.aarch64.rpm kernel-tools-4.11.0-44.6.1.el7a.aarch64.rpm kernel-tools-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm kernel-tools-libs-4.11.0-44.6.1.el7a.aarch64.rpm perf-4.11.0-44.6.1.el7a.aarch64.rpm perf-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm python-perf-4.11.0-44.6.1.el7a.aarch64.rpm python-perf-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm
noarch: kernel-abi-whitelists-4.11.0-44.6.1.el7a.noarch.rpm kernel-doc-4.11.0-44.6.1.el7a.noarch.rpm
ppc64le: kernel-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-bootwrapper-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-debug-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-debug-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-debug-devel-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-devel-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-headers-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-tools-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-tools-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-tools-libs-4.11.0-44.6.1.el7a.ppc64le.rpm perf-4.11.0-44.6.1.el7a.ppc64le.rpm perf-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm python-perf-4.11.0-44.6.1.el7a.ppc64le.rpm python-perf-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):
aarch64: kernel-4.11.0-44.6.1.el7a.aarch64.rpm kernel-debug-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm kernel-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm kernel-debuginfo-common-aarch64-4.11.0-44.6.1.el7a.aarch64.rpm kernel-tools-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm kernel-tools-libs-devel-4.11.0-44.6.1.el7a.aarch64.rpm perf-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm python-perf-debuginfo-4.11.0-44.6.1.el7a.aarch64.rpm
noarch: kernel-abi-whitelists-4.11.0-44.6.1.el7a.noarch.rpm kernel-doc-4.11.0-44.6.1.el7a.noarch.rpm
ppc64le: kernel-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-debug-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-tools-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm kernel-tools-libs-devel-4.11.0-44.6.1.el7a.ppc64le.rpm perf-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm python-perf-debuginfo-4.11.0-44.6.1.el7a.ppc64le.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2018:0502-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2018:0502
Issued Date: : 2018-03-13
CVE Names: CVE-2017-16994 CVE-2017-17712

Topic

An update for kernel-alt is now available for Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, noarch, ppc64le

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, noarch, ppc64le


Bugs Fixed

1518155 - CVE-2017-16994 kernel: mm/pagewalk.c:walk_hugetlb_range function mishandles holes in hugetlb ranges causing information leak

1519781 - CVE-2017-5754 hw: cpu: speculative execution permission faults handling

1526427 - CVE-2017-17712 kernel: Race condition in raw_sendmsg function allows denial-of-service or kernel addresses leak


Related News