RedHat: RHSA-2019-0831:01 Important: kernel-alt security and bug fix update

    Date23 Apr 2019
    CategoryRed Hat
    2904
    Posted ByLinuxSecurity Advisories
    An update for kernel-alt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA256
    
    =====================================================================
                       Red Hat Security Advisory
    
    Synopsis:          Important: kernel-alt security and bug fix update
    Advisory ID:       RHSA-2019:0831-01
    Product:           Red Hat Enterprise Linux
    Advisory URL:      https://access.redhat.com/errata/RHSA-2019:0831
    Issue date:        2019-04-23
    CVE Names:         CVE-2018-13053 CVE-2018-13094 CVE-2018-14734 
                       CVE-2018-17972 CVE-2018-18281 CVE-2018-18386 
                       CVE-2018-18397 CVE-2019-9213 
    =====================================================================
    
    1. Summary:
    
    An update for kernel-alt is now available for Red Hat Enterprise Linux 7.
    
    Red Hat Product Security has rated this update as having a security impact
    of Important. A Common Vulnerability Scoring System (CVSS) base score,
    which gives a detailed severity rating, is available for each vulnerability
    from the CVE link(s) in the References section.
    
    2. Relevant releases/architectures:
    
    Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, noarch, ppc64le, s390x
    Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, noarch, ppc64le
    
    3. Description:
    
    The kernel-alt packages provide the Linux kernel version 4.x.
    
    Security Fix(es):
    
    * kernel: lack of check for mmap minimum address in expand_downwards in
    mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms
    (CVE-2019-9213)
    
    * kernel: use-after-free in ucma_leave_multicast in
    drivers/infiniband/core/ucma.c (CVE-2018-14734)
    
    * kernel: Unprivileged users able to inspect kernel stacks of arbitrary
    tasks (CVE-2018-17972)
    
    * kernel: TLB flush happens too late on mremap (CVE-2018-18281)
    
    * kernel: Type confusion in drivers/tty/n_tty.c allows for a denial of
    service (CVE-2018-18386)
    
    * kernel: userfaultfd bypasses tmpfs file permissions (CVE-2018-18397)
    
    * kernel: Integer overflow in the alarm_timer_nsleep function
    (CVE-2018-13053)
    
    * kernel: NULL pointer dereference in xfs_da_shrink_inode function
    (CVE-2018-13094)
    
    For more details about the security issue(s), including the impact, a CVSS
    score, acknowledgments, and other related information, refer to the CVE
    page(s) listed in the References section.
    
    Bug Fix(es):
    
    * Failed to boot with ftrace=function in kvm with 2vcpu (BZ#1501024)
    
    * [ALT-7.5][x86_64] perf test 63 - inet_pton fails on x86_64 (BZ#1518836)
    
    * BUG: potential out-of-bounds string access when forcing a SELinux label
    on a file (BZ#1595706)
    
    * stack out-of-bounds in smb{2,3}_create_lease_buf() on SMB2/SMB3 mounts
    (BZ#1598757)
    
    * [ALT-7.6][KVM][PANIC] ltp/lite proc01 - Unable to handle kernel paging
    request at virtual address ffff7fe000200018 (BZ#1623193)
    
    * Kernel lock up due to read/write lock (BZ#1636261)
    
    * [RHEL-ALT] Fix potential Spectre v1 in tty code (BZ#1639679)
    
    * [Huawei AArch64 7.6 Bug] HNS3: Vlan on HNS3 NIC cannot communicate
    (BZ#1639713)
    
    * [RHEL7.6-ALT][AWS] backport "nvme: update timeout module parameter type"
    (BZ#1654958)
    
    * ignore STABLE_FLAG of rmap_item->address in rmap_walk_ksm (BZ#1663565)
    
    * RHEL-Alt-7.6 - kernel: zcrypt: fix specification exception on z196 at ap
    probe (BZ#1670018)
    
    * [Huawei AArch64 7.6 Bug] Flock over NFSv3 failed (BZ#1670650)
    
    * [Huawei AArch64 7.6/7.6-z Bug] HNS3: if a single transmit packet(skb) has
    more than 8 frags, will cause the NIC to be unavailable (BZ#1677643)
    
    * krb5{,i,p} doesn't work with older enctypes on aarch64 (BZ#1678922)
    
    Users of kernel are advised to upgrade to these updated packages, which fix
    these bugs.
    
    4. Solution:
    
    For details on how to apply this update, which includes the changes
    described in this advisory, refer to:
    
    https://access.redhat.com/articles/11258
    
    The system must be rebooted for this update to take effect.
    
    5. Bugs fixed (https://bugzilla.redhat.com/):
    
    1597747 - CVE-2018-13053 kernel: Integer overflow in the alarm_timer_nsleep function
    1597771 - CVE-2018-13094 kernel: NULL pointer dereference in xfs_da_shrink_inode function
    1611005 - CVE-2018-14734 kernel: use-after-free in ucma_leave_multicast in drivers/infiniband/core/ucma.c
    1636349 - CVE-2018-17972 kernel: Unprivileged users able to inspect kernel stacks of arbitrary tasks
    1640598 - CVE-2018-18386 kernel: Type confusion in drivers/tty/n_tty.c allows for a denial of service
    1641548 - CVE-2018-18397 kernel: userfaultfd bypasses tmpfs file permissions
    1645121 - CVE-2018-18281 kernel: TLB flush happens too late on mremap
    1686136 - CVE-2019-9213 kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms
    
    6. Package List:
    
    Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):
    
    Source:
    kernel-alt-4.14.0-115.7.1.el7a.src.rpm
    
    aarch64:
    kernel-4.14.0-115.7.1.el7a.aarch64.rpm
    kernel-debug-4.14.0-115.7.1.el7a.aarch64.rpm
    kernel-debug-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm
    kernel-debug-devel-4.14.0-115.7.1.el7a.aarch64.rpm
    kernel-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm
    kernel-debuginfo-common-aarch64-4.14.0-115.7.1.el7a.aarch64.rpm
    kernel-devel-4.14.0-115.7.1.el7a.aarch64.rpm
    kernel-headers-4.14.0-115.7.1.el7a.aarch64.rpm
    kernel-tools-4.14.0-115.7.1.el7a.aarch64.rpm
    kernel-tools-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm
    kernel-tools-libs-4.14.0-115.7.1.el7a.aarch64.rpm
    perf-4.14.0-115.7.1.el7a.aarch64.rpm
    perf-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm
    python-perf-4.14.0-115.7.1.el7a.aarch64.rpm
    python-perf-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm
    
    noarch:
    kernel-abi-whitelists-4.14.0-115.7.1.el7a.noarch.rpm
    kernel-doc-4.14.0-115.7.1.el7a.noarch.rpm
    
    ppc64le:
    kernel-4.14.0-115.7.1.el7a.ppc64le.rpm
    kernel-bootwrapper-4.14.0-115.7.1.el7a.ppc64le.rpm
    kernel-debug-4.14.0-115.7.1.el7a.ppc64le.rpm
    kernel-debug-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm
    kernel-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm
    kernel-debuginfo-common-ppc64le-4.14.0-115.7.1.el7a.ppc64le.rpm
    kernel-devel-4.14.0-115.7.1.el7a.ppc64le.rpm
    kernel-headers-4.14.0-115.7.1.el7a.ppc64le.rpm
    kernel-tools-4.14.0-115.7.1.el7a.ppc64le.rpm
    kernel-tools-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm
    kernel-tools-libs-4.14.0-115.7.1.el7a.ppc64le.rpm
    perf-4.14.0-115.7.1.el7a.ppc64le.rpm
    perf-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm
    python-perf-4.14.0-115.7.1.el7a.ppc64le.rpm
    python-perf-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm
    
    s390x:
    kernel-4.14.0-115.7.1.el7a.s390x.rpm
    kernel-debug-4.14.0-115.7.1.el7a.s390x.rpm
    kernel-debug-debuginfo-4.14.0-115.7.1.el7a.s390x.rpm
    kernel-debug-devel-4.14.0-115.7.1.el7a.s390x.rpm
    kernel-debuginfo-4.14.0-115.7.1.el7a.s390x.rpm
    kernel-debuginfo-common-s390x-4.14.0-115.7.1.el7a.s390x.rpm
    kernel-devel-4.14.0-115.7.1.el7a.s390x.rpm
    kernel-headers-4.14.0-115.7.1.el7a.s390x.rpm
    kernel-kdump-4.14.0-115.7.1.el7a.s390x.rpm
    kernel-kdump-debuginfo-4.14.0-115.7.1.el7a.s390x.rpm
    kernel-kdump-devel-4.14.0-115.7.1.el7a.s390x.rpm
    perf-4.14.0-115.7.1.el7a.s390x.rpm
    perf-debuginfo-4.14.0-115.7.1.el7a.s390x.rpm
    python-perf-4.14.0-115.7.1.el7a.s390x.rpm
    python-perf-debuginfo-4.14.0-115.7.1.el7a.s390x.rpm
    
    Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):
    
    aarch64:
    kernel-debug-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm
    kernel-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm
    kernel-debuginfo-common-aarch64-4.14.0-115.7.1.el7a.aarch64.rpm
    kernel-tools-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm
    kernel-tools-libs-devel-4.14.0-115.7.1.el7a.aarch64.rpm
    perf-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm
    python-perf-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm
    
    noarch:
    kernel-doc-4.14.0-115.7.1.el7a.noarch.rpm
    
    ppc64le:
    kernel-debug-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm
    kernel-debug-devel-4.14.0-115.7.1.el7a.ppc64le.rpm
    kernel-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm
    kernel-debuginfo-common-ppc64le-4.14.0-115.7.1.el7a.ppc64le.rpm
    kernel-tools-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm
    kernel-tools-libs-devel-4.14.0-115.7.1.el7a.ppc64le.rpm
    perf-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm
    python-perf-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm
    
    These packages are GPG signed by Red Hat for security.  Our key and
    details on how to verify the signature are available from
    https://access.redhat.com/security/team/key/
    
    7. References:
    
    https://access.redhat.com/security/cve/CVE-2018-13053
    https://access.redhat.com/security/cve/CVE-2018-13094
    https://access.redhat.com/security/cve/CVE-2018-14734
    https://access.redhat.com/security/cve/CVE-2018-17972
    https://access.redhat.com/security/cve/CVE-2018-18281
    https://access.redhat.com/security/cve/CVE-2018-18386
    https://access.redhat.com/security/cve/CVE-2018-18397
    https://access.redhat.com/security/cve/CVE-2019-9213
    https://access.redhat.com/security/updates/classification/#important
    
    8. Contact:
    
    The Red Hat security contact is . More contact
    details at https://access.redhat.com/security/team/contact/
    
    Copyright 2019 Red Hat, Inc.
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1
    
    iQIVAwUBXL8hu9zjgjWX9erEAQjtKxAAnCp/1p+VtOf8XPuseKCuXRLPp9F5BWK5
    3bVvuRy7QxihAFX1AWZ1Vcza4ZUoDEdk7qnjEl+C95Nyx5OA3U05dT26nKW8FF5c
    eQIuc9YzujsC8ttK90z0maZ+nQ0DwfZ6t7uAFEHqsJ1N7WU6/Hs1s7eW21Abz7XZ
    eGxbcAa/4FxaTR+k47/wjw2yFVAOBw6HKhm2ifRHRwdeHlORAuE9cP7q8DQH7VuQ
    hdNdcl3rOqeUa0QEXwWlfGaCYNJgMCLJryY8V33ZfZQhSBa16lGFZai7WxH1cNrl
    Xh6ZZoAy6pUGiCweTzjpAn+XWKglHrPJfFBJ4/PSjh9SMMgALcxYCkCaBCo8qslP
    ua8v0KFS1ppJhjqni/x9HEVFbKUg9cOz+HllxrYqJ1wJ+AUHTBCwJaHoVGbjkIyR
    5jxUchpDbjLbfHl6R1Fn0/7eCZTuwCEFADRv4TX39KcNa0s6uA+fqIcfpLPGFmWJ
    k+2eQNvInYMulW+uUJiKO8awwXcHfxwZThQh/euRuKQDw8dKgl7b5RpEdHmrFYF8
    NdqJ4fMddkWl2qf/sx4P2+xzjhMimp+isosu1YTSvIj4KnsUUSBx/CZPvr07NRoy
    YuzTZyOSejEz1ldjVa1uAzQktFo2fUUDVOYvNj5WIVBKHVl6/2mBZ/iernk3jIRD
    ZqrjglEZmE4=
    =phWZ
    -----END PGP SIGNATURE-----
    
    --
    RHSA-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.redhat.com/mailman/listinfo/rhsa-announce
    
    You are not authorised to post comments.

    LinuxSecurity Poll

    In your opinion, what is the biggest advantage associated with choosing open-source software/technology?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /component/communitypolls/?task=poll.vote
    16
    radio
    [{"id":"61","title":"High levels of security","votes":"1","type":"x","order":"1","pct":16.67,"resources":[]},{"id":"62","title":"High levels of quality ","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"63","title":"Cost-effectiveness ","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"64","title":"Freedom and flexibility ","votes":"5","type":"x","order":"4","pct":83.33,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.