-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2019:3967-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:3967 Issue date: 2019-11-26 CVE Names: CVE-2017-18208 CVE-2018-9568 CVE-2018-10902 CVE-2018-18559 CVE-2019-3900 CVE-2019-5489 CVE-2019-6974 CVE-2019-7221 ==================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7.5 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux ComputeNode EUS (v. 7.5) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.5) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.5) - ppc64, ppc64le, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Memory corruption due to incorrect socket cloning (CVE-2018-9568) * kernel: MIDI driver race condition leads to a double-free (CVE-2018-10902) * kernel: Use-after-free due to race condition in AF_PACKET implementation (CVE-2018-18559) * Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900) * Kernel: page cache side channel attacks (CVE-2019-5489) * Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() (CVE-2019-6974) * Kernel: KVM: nVMX: use-after-free of the hrtimer for emulation of the preemption timer (CVE-2019-7221) * kernel: Inifinite loop vulnerability in mm/madvise.c:madvise_willneed() function allows local denial of service (CVE-2017-18208) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * A cluster node has multiple hung "mv" processes that are accessing a gfs2 filesystem. (BZ#1716321) * Growing unreclaimable slab memory (BZ#1741918) * [LLNL 7.5 Bug] slab leak causing a crash when using kmem control group (BZ#1748236) * kernel build: parallelize redhat/mod-sign.sh (BZ#1755328) * kernel build: speed up module compression step (BZ#1755337) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1551565 - CVE-2017-18208 kernel: Inifinite loop vulnerability in mm/madvise.c:madvise_willneed() function allows local denial of service 1590720 - CVE-2018-10902 kernel: MIDI driver race condition leads to a double-free 1641878 - CVE-2018-18559 kernel: Use-after-free due to race condition in AF_PACKET implementation 1655904 - CVE-2018-9568 kernel: Memory corruption due to incorrect socket cloning 1664110 - CVE-2019-5489 Kernel: page cache side channel attacks 1671904 - CVE-2019-7221 Kernel: KVM: nVMX: use-after-free of the hrtimer for emulation of the preemption timer 1671913 - CVE-2019-6974 Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() 1698757 - CVE-2019-3900 Kernel: vhost_net: infinite loop while receiving packets leads to DoS 6. Package List: Red Hat Enterprise Linux ComputeNode EUS (v. 7.5): Source: kernel-3.10.0-862.44.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-862.44.2.el7.noarch.rpm kernel-doc-3.10.0-862.44.2.el7.noarch.rpm x86_64: kernel-3.10.0-862.44.2.el7.x86_64.rpm kernel-debug-3.10.0-862.44.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-862.44.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-862.44.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.44.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.44.2.el7.x86_64.rpm kernel-devel-3.10.0-862.44.2.el7.x86_64.rpm kernel-headers-3.10.0-862.44.2.el7.x86_64.rpm kernel-tools-3.10.0-862.44.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.44.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-862.44.2.el7.x86_64.rpm perf-3.10.0-862.44.2.el7.x86_64.rpm perf-debuginfo-3.10.0-862.44.2.el7.x86_64.rpm python-perf-3.10.0-862.44.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.44.2.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5): x86_64: kernel-debug-debuginfo-3.10.0-862.44.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.44.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.44.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.44.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-862.44.2.el7.x86_64.rpm perf-debuginfo-3.10.0-862.44.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.44.2.el7.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 7.5): Source: kernel-3.10.0-862.44.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-862.44.2.el7.noarch.rpm kernel-doc-3.10.0-862.44.2.el7.noarch.rpm ppc64: kernel-3.10.0-862.44.2.el7.ppc64.rpm kernel-bootwrapper-3.10.0-862.44.2.el7.ppc64.rpm kernel-debug-3.10.0-862.44.2.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-862.44.2.el7.ppc64.rpm kernel-debug-devel-3.10.0-862.44.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-862.44.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-862.44.2.el7.ppc64.rpm kernel-devel-3.10.0-862.44.2.el7.ppc64.rpm kernel-headers-3.10.0-862.44.2.el7.ppc64.rpm kernel-tools-3.10.0-862.44.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-862.44.2.el7.ppc64.rpm kernel-tools-libs-3.10.0-862.44.2.el7.ppc64.rpm perf-3.10.0-862.44.2.el7.ppc64.rpm perf-debuginfo-3.10.0-862.44.2.el7.ppc64.rpm python-perf-3.10.0-862.44.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-862.44.2.el7.ppc64.rpm ppc64le: kernel-3.10.0-862.44.2.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-862.44.2.el7.ppc64le.rpm kernel-debug-3.10.0-862.44.2.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-862.44.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-862.44.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-862.44.2.el7.ppc64le.rpm kernel-devel-3.10.0-862.44.2.el7.ppc64le.rpm kernel-headers-3.10.0-862.44.2.el7.ppc64le.rpm kernel-tools-3.10.0-862.44.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-862.44.2.el7.ppc64le.rpm kernel-tools-libs-3.10.0-862.44.2.el7.ppc64le.rpm perf-3.10.0-862.44.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-862.44.2.el7.ppc64le.rpm python-perf-3.10.0-862.44.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-862.44.2.el7.ppc64le.rpm s390x: kernel-3.10.0-862.44.2.el7.s390x.rpm kernel-debug-3.10.0-862.44.2.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-862.44.2.el7.s390x.rpm kernel-debug-devel-3.10.0-862.44.2.el7.s390x.rpm kernel-debuginfo-3.10.0-862.44.2.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-862.44.2.el7.s390x.rpm kernel-devel-3.10.0-862.44.2.el7.s390x.rpm kernel-headers-3.10.0-862.44.2.el7.s390x.rpm kernel-kdump-3.10.0-862.44.2.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-862.44.2.el7.s390x.rpm kernel-kdump-devel-3.10.0-862.44.2.el7.s390x.rpm perf-3.10.0-862.44.2.el7.s390x.rpm perf-debuginfo-3.10.0-862.44.2.el7.s390x.rpm python-perf-3.10.0-862.44.2.el7.s390x.rpm python-perf-debuginfo-3.10.0-862.44.2.el7.s390x.rpm x86_64: kernel-3.10.0-862.44.2.el7.x86_64.rpm kernel-debug-3.10.0-862.44.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-862.44.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-862.44.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.44.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.44.2.el7.x86_64.rpm kernel-devel-3.10.0-862.44.2.el7.x86_64.rpm kernel-headers-3.10.0-862.44.2.el7.x86_64.rpm kernel-tools-3.10.0-862.44.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.44.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-862.44.2.el7.x86_64.rpm perf-3.10.0-862.44.2.el7.x86_64.rpm perf-debuginfo-3.10.0-862.44.2.el7.x86_64.rpm python-perf-3.10.0-862.44.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.44.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 7.5): ppc64: kernel-debug-debuginfo-3.10.0-862.44.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-862.44.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-862.44.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-862.44.2.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-862.44.2.el7.ppc64.rpm perf-debuginfo-3.10.0-862.44.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-862.44.2.el7.ppc64.rpm ppc64le: kernel-debug-debuginfo-3.10.0-862.44.2.el7.ppc64le.rpm kernel-debug-devel-3.10.0-862.44.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-862.44.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-862.44.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-862.44.2.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-862.44.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-862.44.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-862.44.2.el7.ppc64le.rpm x86_64: kernel-debug-debuginfo-3.10.0-862.44.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.44.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.44.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.44.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-862.44.2.el7.x86_64.rpm perf-debuginfo-3.10.0-862.44.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.44.2.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-18208 https://access.redhat.com/security/cve/CVE-2018-9568 https://access.redhat.com/security/cve/CVE-2018-10902 https://access.redhat.com/security/cve/CVE-2018-18559 https://access.redhat.com/security/cve/CVE-2019-3900 https://access.redhat.com/security/cve/CVE-2019-5489 https://access.redhat.com/security/cve/CVE-2019-6974 https://access.redhat.com/security/cve/CVE-2019-7221 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXd0SLdzjgjWX9erEAQizmBAAnYmgeloppBNbqKKX/6kgbHiVi+JaGenp 8iLuLNShMoqmcVKe6JxVn179q7nh6EoI32nKP22XCd+rUquEKP0ne91ieKsw1W0b UIG9zgNJQbncTN92M6BmbuOgbshpVrcCG05mTLaxcwKao451y+qQ3l8t7I4YiM/T kjRFUPFHOS47gFO3k4zbLAhV0h9S+16GPxUv7q5BqsjNSeExQ4LOOT6KkUHZQmIo fDiYRmv6az5OTjiF5Zd9tjFiTHyvyK3YF4bGn0dg9Z9kWM5mQ9ghVppjs0xCYfAk OVZswNAucJY0kDQiG1BRlO8qMz6xLVmNiJdtyHpk9xYrNSqM9dAX8dZJim33i5kg cr21fq9GX3aXZft8VEh8piqXlfp5wkaWk+nj54AK04JFGyrXOs09c8Os0ykRPBQv wr430NyI8UuXYCNlvAcHSuNGTgXjoNntA9beNuVuycGPdEptqMjbZI4z/XO+OEOG QvY3qsMXCzJhEBzwe882epwZ4tKr53XRGcau1wPfXBT8L3vYXLaonI9bGWGtGonu XYeydBL4TiFg7THA5FXcBATa446m/8i0ITdQWD/TWU5fEQGCVnnOajdLjPbyhQp5 b4HmExJHmlEb/RntXuCB2Hx85xowewmuHmJdF6UdYKXh7/o8bTJGrzecN+UIYJNk 3uOOf3HUz1Y=9sj1 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce