-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: kernel-alt security and bug fix update Advisory ID: RHSA-2019:0831-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:0831 Issue date: 2019-04-23 CVE Names: CVE-2018-13053 CVE-2018-13094 CVE-2018-14734 CVE-2018-17972 CVE-2018-18281 CVE-2018-18386 CVE-2018-18397 CVE-2019-9213 ==================================================================== 1. Summary: An update for kernel-alt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, noarch, ppc64le, s390x Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, noarch, ppc64le 3. Description: The kernel-alt packages provide the Linux kernel version 4.x. Security Fix(es): * kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms (CVE-2019-9213) * kernel: use-after-free in ucma_leave_multicast in drivers/infiniband/core/ucma.c (CVE-2018-14734) * kernel: Unprivileged users able to inspect kernel stacks of arbitrary tasks (CVE-2018-17972) * kernel: TLB flush happens too late on mremap (CVE-2018-18281) * kernel: Type confusion in drivers/tty/n_tty.c allows for a denial of service (CVE-2018-18386) * kernel: userfaultfd bypasses tmpfs file permissions (CVE-2018-18397) * kernel: Integer overflow in the alarm_timer_nsleep function (CVE-2018-13053) * kernel: NULL pointer dereference in xfs_da_shrink_inode function (CVE-2018-13094) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Failed to boot with ftrace=function in kvm with 2vcpu (BZ#1501024) * [ALT-7.5][x86_64] perf test 63 - inet_pton fails on x86_64 (BZ#1518836) * BUG: potential out-of-bounds string access when forcing a SELinux label on a file (BZ#1595706) * stack out-of-bounds in smb{2,3}_create_lease_buf() on SMB2/SMB3 mounts (BZ#1598757) * [ALT-7.6][KVM][PANIC] ltp/lite proc01 - Unable to handle kernel paging request at virtual address ffff7fe000200018 (BZ#1623193) * Kernel lock up due to read/write lock (BZ#1636261) * [RHEL-ALT] Fix potential Spectre v1 in tty code (BZ#1639679) * [Huawei AArch64 7.6 Bug] HNS3: Vlan on HNS3 NIC cannot communicate (BZ#1639713) * [RHEL7.6-ALT][AWS] backport "nvme: update timeout module parameter type" (BZ#1654958) * ignore STABLE_FLAG of rmap_item->address in rmap_walk_ksm (BZ#1663565) * RHEL-Alt-7.6 - kernel: zcrypt: fix specification exception on z196 at ap probe (BZ#1670018) * [Huawei AArch64 7.6 Bug] Flock over NFSv3 failed (BZ#1670650) * [Huawei AArch64 7.6/7.6-z Bug] HNS3: if a single transmit packet(skb) has more than 8 frags, will cause the NIC to be unavailable (BZ#1677643) * krb5{,i,p} doesn't work with older enctypes on aarch64 (BZ#1678922) Users of kernel are advised to upgrade to these updated packages, which fix these bugs. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1597747 - CVE-2018-13053 kernel: Integer overflow in the alarm_timer_nsleep function 1597771 - CVE-2018-13094 kernel: NULL pointer dereference in xfs_da_shrink_inode function 1611005 - CVE-2018-14734 kernel: use-after-free in ucma_leave_multicast in drivers/infiniband/core/ucma.c 1636349 - CVE-2018-17972 kernel: Unprivileged users able to inspect kernel stacks of arbitrary tasks 1640598 - CVE-2018-18386 kernel: Type confusion in drivers/tty/n_tty.c allows for a denial of service 1641548 - CVE-2018-18397 kernel: userfaultfd bypasses tmpfs file permissions 1645121 - CVE-2018-18281 kernel: TLB flush happens too late on mremap 1686136 - CVE-2019-9213 kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms 6. Package List: Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7): Source: kernel-alt-4.14.0-115.7.1.el7a.src.rpm aarch64: kernel-4.14.0-115.7.1.el7a.aarch64.rpm kernel-debug-4.14.0-115.7.1.el7a.aarch64.rpm kernel-debug-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm kernel-debug-devel-4.14.0-115.7.1.el7a.aarch64.rpm kernel-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm kernel-debuginfo-common-aarch64-4.14.0-115.7.1.el7a.aarch64.rpm kernel-devel-4.14.0-115.7.1.el7a.aarch64.rpm kernel-headers-4.14.0-115.7.1.el7a.aarch64.rpm kernel-tools-4.14.0-115.7.1.el7a.aarch64.rpm kernel-tools-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm kernel-tools-libs-4.14.0-115.7.1.el7a.aarch64.rpm perf-4.14.0-115.7.1.el7a.aarch64.rpm perf-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm python-perf-4.14.0-115.7.1.el7a.aarch64.rpm python-perf-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm noarch: kernel-abi-whitelists-4.14.0-115.7.1.el7a.noarch.rpm kernel-doc-4.14.0-115.7.1.el7a.noarch.rpm ppc64le: kernel-4.14.0-115.7.1.el7a.ppc64le.rpm kernel-bootwrapper-4.14.0-115.7.1.el7a.ppc64le.rpm kernel-debug-4.14.0-115.7.1.el7a.ppc64le.rpm kernel-debug-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm kernel-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.14.0-115.7.1.el7a.ppc64le.rpm kernel-devel-4.14.0-115.7.1.el7a.ppc64le.rpm kernel-headers-4.14.0-115.7.1.el7a.ppc64le.rpm kernel-tools-4.14.0-115.7.1.el7a.ppc64le.rpm kernel-tools-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm kernel-tools-libs-4.14.0-115.7.1.el7a.ppc64le.rpm perf-4.14.0-115.7.1.el7a.ppc64le.rpm perf-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm python-perf-4.14.0-115.7.1.el7a.ppc64le.rpm python-perf-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm s390x: kernel-4.14.0-115.7.1.el7a.s390x.rpm kernel-debug-4.14.0-115.7.1.el7a.s390x.rpm kernel-debug-debuginfo-4.14.0-115.7.1.el7a.s390x.rpm kernel-debug-devel-4.14.0-115.7.1.el7a.s390x.rpm kernel-debuginfo-4.14.0-115.7.1.el7a.s390x.rpm kernel-debuginfo-common-s390x-4.14.0-115.7.1.el7a.s390x.rpm kernel-devel-4.14.0-115.7.1.el7a.s390x.rpm kernel-headers-4.14.0-115.7.1.el7a.s390x.rpm kernel-kdump-4.14.0-115.7.1.el7a.s390x.rpm kernel-kdump-debuginfo-4.14.0-115.7.1.el7a.s390x.rpm kernel-kdump-devel-4.14.0-115.7.1.el7a.s390x.rpm perf-4.14.0-115.7.1.el7a.s390x.rpm perf-debuginfo-4.14.0-115.7.1.el7a.s390x.rpm python-perf-4.14.0-115.7.1.el7a.s390x.rpm python-perf-debuginfo-4.14.0-115.7.1.el7a.s390x.rpm Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7): aarch64: kernel-debug-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm kernel-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm kernel-debuginfo-common-aarch64-4.14.0-115.7.1.el7a.aarch64.rpm kernel-tools-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm kernel-tools-libs-devel-4.14.0-115.7.1.el7a.aarch64.rpm perf-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm python-perf-debuginfo-4.14.0-115.7.1.el7a.aarch64.rpm noarch: kernel-doc-4.14.0-115.7.1.el7a.noarch.rpm ppc64le: kernel-debug-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm kernel-debug-devel-4.14.0-115.7.1.el7a.ppc64le.rpm kernel-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.14.0-115.7.1.el7a.ppc64le.rpm kernel-tools-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm kernel-tools-libs-devel-4.14.0-115.7.1.el7a.ppc64le.rpm perf-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm python-perf-debuginfo-4.14.0-115.7.1.el7a.ppc64le.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-13053 https://access.redhat.com/security/cve/CVE-2018-13094 https://access.redhat.com/security/cve/CVE-2018-14734 https://access.redhat.com/security/cve/CVE-2018-17972 https://access.redhat.com/security/cve/CVE-2018-18281 https://access.redhat.com/security/cve/CVE-2018-18386 https://access.redhat.com/security/cve/CVE-2018-18397 https://access.redhat.com/security/cve/CVE-2019-9213 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXL8hu9zjgjWX9erEAQjtKxAAnCp/1p+VtOf8XPuseKCuXRLPp9F5BWK5 3bVvuRy7QxihAFX1AWZ1Vcza4ZUoDEdk7qnjEl+C95Nyx5OA3U05dT26nKW8FF5c eQIuc9YzujsC8ttK90z0maZ+nQ0DwfZ6t7uAFEHqsJ1N7WU6/Hs1s7eW21Abz7XZ eGxbcAa/4FxaTR+k47/wjw2yFVAOBw6HKhm2ifRHRwdeHlORAuE9cP7q8DQH7VuQ hdNdcl3rOqeUa0QEXwWlfGaCYNJgMCLJryY8V33ZfZQhSBa16lGFZai7WxH1cNrl Xh6ZZoAy6pUGiCweTzjpAn+XWKglHrPJfFBJ4/PSjh9SMMgALcxYCkCaBCo8qslP ua8v0KFS1ppJhjqni/x9HEVFbKUg9cOz+HllxrYqJ1wJ+AUHTBCwJaHoVGbjkIyR 5jxUchpDbjLbfHl6R1Fn0/7eCZTuwCEFADRv4TX39KcNa0s6uA+fqIcfpLPGFmWJ k+2eQNvInYMulW+uUJiKO8awwXcHfxwZThQh/euRuKQDw8dKgl7b5RpEdHmrFYF8 NdqJ4fMddkWl2qf/sx4P2+xzjhMimp+isosu1YTSvIj4KnsUUSBx/CZPvr07NRoy YuzTZyOSejEz1ldjVa1uAzQktFo2fUUDVOYvNj5WIVBKHVl6/2mBZ/iernk3jIRD ZqrjglEZmE4=phWZ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce