RedHat: RHSA-2020-4609:01 Moderate: kernel-rt security and bug fix update
Summary
The kernel-rt packages provide the Real Time Linux Kernel, which enables
fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: use after free due to race condition in the video driver leads to
local privilege escalation (CVE-2019-9458)
* kernel: use-after-free in drivers/bluetooth/hci_ldisc.c (CVE-2019-15917)
* kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg
(CVE-2019-15925)
* kernel: memory leak in ccp_run_sha_cmd() (CVE-2019-18808)
* kernel: Denial Of Service in the __ipmi_bmc_register() (CVE-2019-19046)
* kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c
(CVE-2019-19319)
* Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid
(CVE-2019-19332)
* kernel: use-after-free in ext4_put_super (CVE-2019-19447)
* kernel: a malicious USB device in the drivers/input/ff-memless.c leads to
use-after-free (CVE-2019-19524)
* kernel: race condition caused by a malicious USB device in the USB
character device driver layer (CVE-2019-19537)
* kernel: use-after-free in serial_ir_init_module() (CVE-2019-19543)
* kernel: use-after-free in __ext4_expand_extra_isize and
ext4_xattr_set_entry (CVE-2019-19767)
* kernel: use-after-free in debugfs_remove (CVE-2019-19770)
* kernel: out-of-bounds write via crafted keycode table (CVE-2019-20636)
* kernel: possible use-after-free due to a race condition in cdev_get of
char_dev.c (CVE-2020-0305)
* kernel: out-of-bounds read in in vc_do_resize (CVE-2020-8647)
* kernel: use-after-free in n_tty_receive_buf_common (CVE-2020-8648)
* kernel: invalid read location in vgacon_invert_region (CVE-2020-8649)
* kernel: uninitialized kernel data leak in userspace coredumps
(CVE-2020-10732)
* kernel: SELinux netlink permission check bypass (CVE-2020-10751)
* kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c
(CVE-2020-11565)
* kernel: mishandles invalid descriptors in
drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)
* kernel: out-of-bounds write in xdp_umem_reg (CVE-2020-12659)
* kernel: sg_write function lacks an sg_remove_request call in a certain
failure case (CVE-2020-12770)
* kernel: possible to send arbitrary signals to a privileged (suidroot)
parent process (CVE-2020-12826)
* kernel: referencing inode of removed superblock in get_futex_key() causes
UAF (CVE-2020-14381)
* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in
DoS (CVE-2020-25641)
* kernel: kernel pointer leak due to WARN_ON statement in video driver
leads to local information disclosure (CVE-2019-9455)
* kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c
(CVE-2019-16231)
* kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c
(CVE-2019-16233)
* kernel: memory leak in af9005_identify_state() function in
drivers/media/usb/dvb-usb/af9005.c (CVE-2019-18809)
* kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf()
(CVE-2019-19056)
* kernel: memory leak in the crypto_report() function in
crypto/crypto_user_base.c allows for DoS (CVE-2019-19062)
* kernel: Two memory leaks in the rtl_usb_probe() (CVE-2019-19063)
* kernel: A memory leak in the rtl8xxxu_submit_int_urb() (CVE-2019-19068)
* kernel: A memory leak in the predicate_parse() function in
kernel/trace/trace_events_filter.c allows for a DoS (CVE-2019-19072)
* kernel: information leak bug caused by a malicious USB device in the
drivers/media/usb/ttusb-dec/ttusb_dec.c (CVE-2019-19533)
* kernel: Null pointer dereference in drop_sysctl_table() in
fs/proc/proc_sysctl.c (CVE-2019-20054)
* kernel: possibility of memory disclosure when reading the file
/proc/sys/kernel/rh_features (CVE-2020-10774)
* kernel: vhost-net: stack overflow in get_raw_socket while checking
sk_family field (CVE-2020-10942)
* kernel: sync of excessive duration via an XFS v5 image with crafted
metadata (CVE-2020-12655)
Summary
Solution
For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.3 Release Notes linked from the References section.
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
References
https://access.redhat.com/security/cve/CVE-2019-9455 https://access.redhat.com/security/cve/CVE-2019-9458 https://access.redhat.com/security/cve/CVE-2019-15917 https://access.redhat.com/security/cve/CVE-2019-15925 https://access.redhat.com/security/cve/CVE-2019-16231 https://access.redhat.com/security/cve/CVE-2019-16233 https://access.redhat.com/security/cve/CVE-2019-18808 https://access.redhat.com/security/cve/CVE-2019-18809 https://access.redhat.com/security/cve/CVE-2019-19046 https://access.redhat.com/security/cve/CVE-2019-19056 https://access.redhat.com/security/cve/CVE-2019-19062 https://access.redhat.com/security/cve/CVE-2019-19063 https://access.redhat.com/security/cve/CVE-2019-19068 https://access.redhat.com/security/cve/CVE-2019-19072 https://access.redhat.com/security/cve/CVE-2019-19319 https://access.redhat.com/security/cve/CVE-2019-19332 https://access.redhat.com/security/cve/CVE-2019-19447 https://access.redhat.com/security/cve/CVE-2019-19524 https://access.redhat.com/security/cve/CVE-2019-19533 https://access.redhat.com/security/cve/CVE-2019-19537 https://access.redhat.com/security/cve/CVE-2019-19543 https://access.redhat.com/security/cve/CVE-2019-19767 https://access.redhat.com/security/cve/CVE-2019-19770 https://access.redhat.com/security/cve/CVE-2019-20054 https://access.redhat.com/security/cve/CVE-2019-20636 https://access.redhat.com/security/cve/CVE-2020-0305 https://access.redhat.com/security/cve/CVE-2020-8647 https://access.redhat.com/security/cve/CVE-2020-8648 https://access.redhat.com/security/cve/CVE-2020-8649 https://access.redhat.com/security/cve/CVE-2020-10732 https://access.redhat.com/security/cve/CVE-2020-10751 https://access.redhat.com/security/cve/CVE-2020-10774 https://access.redhat.com/security/cve/CVE-2020-10942 https://access.redhat.com/security/cve/CVE-2020-11565 https://access.redhat.com/security/cve/CVE-2020-11668 https://access.redhat.com/security/cve/CVE-2020-12655 https://access.redhat.com/security/cve/CVE-2020-12659 https://access.redhat.com/security/cve/CVE-2020-12770 https://access.redhat.com/security/cve/CVE-2020-12826 https://access.redhat.com/security/cve/CVE-2020-14381 https://access.redhat.com/security/cve/CVE-2020-25641 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index
Package List
Red Hat Enterprise Linux Real Time for NFV (v. 8):
Source:
kernel-rt-4.18.0-240.rt7.54.el8.src.rpm
x86_64:
kernel-rt-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-core-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-core-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-devel-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-kvm-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-modules-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debuginfo-common-x86_64-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-devel-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-kvm-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-modules-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm
Red Hat Enterprise Linux Real Time (v. 8):
Source:
kernel-rt-4.18.0-240.rt7.54.el8.src.rpm
x86_64:
kernel-rt-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-core-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-core-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-devel-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-modules-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debuginfo-common-x86_64-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-devel-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-modules-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Red Hat Enterprise Linux Real Time (v. 8) - x86_64
Red Hat Enterprise Linux Real Time for NFV (v. 8) - x86_64
Bugs Fixed
1733495 - BUG: sleeping function called from invalid context at kernel/locking/rtmutex.c:974
1759052 - CVE-2019-15925 kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg
1760100 - CVE-2019-15917 kernel: use-after-free in drivers/bluetooth/hci_ldisc.c
1760310 - CVE-2019-16231 kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c
1760420 - CVE-2019-16233 kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c
1774946 - CVE-2019-19072 kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS
1774963 - CVE-2019-19068 kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS
1774988 - CVE-2019-19046 kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c
1775015 - CVE-2019-19063 kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS
1775021 - CVE-2019-19062 kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS
1775097 - CVE-2019-19056 kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS
1777418 - CVE-2019-18808 kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c
1777449 - CVE-2019-18809 kernel: memory leak in af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c
1779046 - RT host hang with Call Trace "WARNING: CPU: 16 PID: 153 at kernel/smp.c:333 smp_call_function_single_async+0x7a/"
1779594 - CVE-2019-19332 Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid
1781679 - CVE-2019-19447 kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c
1781810 - CVE-2019-19543 kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c
1783459 - CVE-2019-19524 kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free
1783534 - CVE-2019-19533 kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c
1783561 - CVE-2019-19537 kernel: race condition caused by a malicious USB device in the USB character device driver layer
1784130 - CVE-2019-19319 kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c
1786160 - CVE-2019-19767 kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c
1786179 - CVE-2019-19770 kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c
1790063 - CVE-2019-20054 kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c
1802555 - CVE-2020-8649 kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c
1802559 - CVE-2020-8648 kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c
1802563 - CVE-2020-8647 kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c
1817718 - CVE-2020-10942 kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field
1819377 - CVE-2019-9458 kernel: use after free due to race condition in the video driver leads to local privilege escalation
1819399 - CVE-2019-9455 kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure
1822077 - CVE-2020-12826 kernel: possible to send arbitrary signals to a privileged (suidroot) parent process
1824059 - CVE-2019-20636 kernel: out-of-bounds write via crafted keycode table
1824792 - CVE-2020-11668 kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c
1824918 - CVE-2020-11565 kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c
1831399 - CVE-2020-10732 kernel: uninitialized kernel data leak in userspace coredumps
1832543 - CVE-2020-12655 kernel: sync of excessive duration via an XFS v5 image with crafted metadata
1832876 - CVE-2020-12659 kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption
1833196 - adaptive-tick appears to not be functioning as expected on RHEL 8.2 RT
1834845 - CVE-2020-12770 kernel: sg_write function lacks an sg_remove_request call in a certain failure case
1839634 - CVE-2020-10751 kernel: SELinux netlink permission check bypass
1843410 - RT guest get Call Trace "INFO: task ld:274531 blocked for more than 600 seconds."
1846964 - CVE-2020-10774 kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features
1852298 - Install VM fails and RT host get Call Trace "WARNING: CPU: 18 PID: 2947 at fs/eventfd.c:68 eventfd_signal+0x7e/0x90"
1859590 - [efi]RT kernel crash with "rcu: INFO: rcu_preempt detected stalls on CPUs/tasks"
1860065 - CVE-2020-0305 kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c
1874311 - CVE-2020-14381 kernel: referencing inode of removed superblock in get_futex_key() causes UAF
1881424 - CVE-2020-25641 kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS