ESB-2017.1968 - [RedHat] Linux Kernel: Multiple vulnerabilities 2017-08-09

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.1968
               Important: kernel security and bug fix update
                               9 August 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Linux Kernel
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 7
Impact/Access:     Root Compromise   -- Existing Account      
                   Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-8797 CVE-2017-2647 CVE-2016-10200
                   CVE-2015-8970  

Reference:         ESB-2017.1890
                   ESB-2017.1872
                   ESB-2017.1223
                   ESB-2017.0468

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2017:2437

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: kernel security and bug fix update
Advisory ID:       RHSA-2017:2437-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2017:2437
Issue date:        2017-08-08
CVE Names:         CVE-2015-8970 CVE-2016-10200 CVE-2017-2647 
                   CVE-2017-8797 
=====================================================================

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 7.3
Extended Update Support.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux ComputeNode EUS (v. 7.3) - noarch, x86_64
Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3) - x86_64
Red Hat Enterprise Linux Server EUS (v. 7.3) - noarch, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional EUS (v. 7.3) - ppc64, ppc64le, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* A use-after-free flaw was found in the Linux kernel which enables a race
condition in the L2TPv3 IP Encapsulation feature. A local user could use
this flaw to escalate their privileges or crash the system.
(CVE-2016-10200, Important)

* A flaw was found that can be triggered in keyring_search_iterator in
keyring.c if type->match is NULL. A local user could use this flaw to crash
the system or, potentially, escalate their privileges. (CVE-2017-2647,
Important)

* It was found that the NFSv4 server in the Linux kernel did not properly
validate layout type when processing NFSv4 pNFS LAYOUTGET and GETDEVICEINFO
operands. A remote attacker could use this flaw to soft-lockup the system
and thus cause denial of service. (CVE-2017-8797, Important)

* The lrw_crypt() function in 'crypto/lrw.c' in the Linux kernel before 4.5
allows local users to cause a system crash and a denial of service by the
NULL pointer dereference via accept(2) system call for AF_ALG socket
without calling setkey() first to set a cipher key. (CVE-2015-8970,
Moderate)

Red Hat would like to thank Igor Redko (Virtuozzo) and Andrey Ryabinin
(Virtuozzo) for reporting CVE-2017-2647 and Igor Redko (Virtuozzo) and
Vasily Averin (Virtuozzo) for reporting CVE-2015-8970.

Bug Fix(es):

* When running the LPAR with IBM Power 8 SMT8 mode, system performance
degradation occurred due to the load getting spread across threads from the
same core. The provided patches fix scheduler performance issues and assure
the load is spread across cores, thus improving the system performance
significantly. (BZ#1434853)

* Upon reboot, the bond slave with some network adapter ports became
unresponsive in the backup state and never proceeded to the active state.
As a consequence, the bond slave never transmitted any LACP PDU and the
bond interface was never produced properly. With this update, the i40e
network driver has been fixed for long link-down notification time and the
bond slave now transmits LACP PDUs as expected. (BZ#1446783)

* When attempting to configure two or more Ethernet adapter cards using
Virtual Function I/O (VFIO) in the KVM guest, subsequent KVM guests
previously failed to boot returning an error message. The provided patch
adds the ability of VFIO to support more than one card in the KVM guest
environment. (BZ#1447718)

* It is possible to define the CPUs in which unbound kworkers can run by
setting a "mask" in a specific file in the sysfs file system, helping on
CPU isolation. However, this setup did not work properly, and unbounded
kworkers were being activated on CPUs in which they were set to _NOT_ run.
The provided patchset prevents unbound kworkers from being run on CPUs that
are masked, thus fixing this bug. (BZ#1458203)

* Due to a regression, the kernel previously failed to create the
/sys/block/<sd device>/devices/enclosure_device symlinks. The provided
patch corrects the call to the scsi_is_sas_rphy() function, which is now
made on the SAS end device, instead of the SCSI device. (BZ#1460204)

* Previously, the system panic occurred when running mkfs.ext4 on newly
created software RAID1 partitions on SATA SDD drives. The provided patch
ensures the ext4 file system is created on the /dev/md0 partition and is
mounted there successfully. (BZ#1463359)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1330056 - Kernel: ppc64 sbrk returns executable heap in 32-bit emulation mode
1386286 - CVE-2015-8970 kernel: crypto: GPF in lrw_crypt caused by null-deref
1428353 - CVE-2017-2647 kernel: Null pointer dereference in search_keyring
1430347 - CVE-2016-10200 kernel: l2tp: Race condition in the L2TPv3 IP encapsulation feature
1466329 - CVE-2017-8797 kernel: NFSv4 server does not properly validate layout type when processing NFSv4 pNFS LAYOUTGET operand

6. Package List:

Red Hat Enterprise Linux ComputeNode EUS (v. 7.3):

Source:
kernel-3.10.0-514.28.1.el7.src.rpm

noarch:
kernel-abi-whitelists-3.10.0-514.28.1.el7.noarch.rpm
kernel-doc-3.10.0-514.28.1.el7.noarch.rpm

x86_64:
kernel-3.10.0-514.28.1.el7.x86_64.rpm
kernel-debug-3.10.0-514.28.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-514.28.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-514.28.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-514.28.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-514.28.1.el7.x86_64.rpm
kernel-devel-3.10.0-514.28.1.el7.x86_64.rpm
kernel-headers-3.10.0-514.28.1.el7.x86_64.rpm
kernel-tools-3.10.0-514.28.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-514.28.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-514.28.1.el7.x86_64.rpm
perf-3.10.0-514.28.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-514.28.1.el7.x86_64.rpm
python-perf-3.10.0-514.28.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-514.28.1.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3):

x86_64:
kernel-debug-debuginfo-3.10.0-514.28.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-514.28.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-514.28.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-514.28.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-514.28.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-514.28.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-514.28.1.el7.x86_64.rpm

Red Hat Enterprise Linux Server EUS (v. 7.3):

Source:
kernel-3.10.0-514.28.1.el7.src.rpm

noarch:
kernel-abi-whitelists-3.10.0-514.28.1.el7.noarch.rpm
kernel-doc-3.10.0-514.28.1.el7.noarch.rpm

ppc64:
kernel-3.10.0-514.28.1.el7.ppc64.rpm
kernel-bootwrapper-3.10.0-514.28.1.el7.ppc64.rpm
kernel-debug-3.10.0-514.28.1.el7.ppc64.rpm
kernel-debug-debuginfo-3.10.0-514.28.1.el7.ppc64.rpm
kernel-debug-devel-3.10.0-514.28.1.el7.ppc64.rpm
kernel-debuginfo-3.10.0-514.28.1.el7.ppc64.rpm
kernel-debuginfo-common-ppc64-3.10.0-514.28.1.el7.ppc64.rpm
kernel-devel-3.10.0-514.28.1.el7.ppc64.rpm
kernel-headers-3.10.0-514.28.1.el7.ppc64.rpm
kernel-tools-3.10.0-514.28.1.el7.ppc64.rpm
kernel-tools-debuginfo-3.10.0-514.28.1.el7.ppc64.rpm
kernel-tools-libs-3.10.0-514.28.1.el7.ppc64.rpm
perf-3.10.0-514.28.1.el7.ppc64.rpm
perf-debuginfo-3.10.0-514.28.1.el7.ppc64.rpm
python-perf-3.10.0-514.28.1.el7.ppc64.rpm
python-perf-debuginfo-3.10.0-514.28.1.el7.ppc64.rpm

ppc64le:
kernel-3.10.0-514.28.1.el7.ppc64le.rpm
kernel-bootwrapper-3.10.0-514.28.1.el7.ppc64le.rpm
kernel-debug-3.10.0-514.28.1.el7.ppc64le.rpm
kernel-debug-debuginfo-3.10.0-514.28.1.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-514.28.1.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-514.28.1.el7.ppc64le.rpm
kernel-devel-3.10.0-514.28.1.el7.ppc64le.rpm
kernel-headers-3.10.0-514.28.1.el7.ppc64le.rpm
kernel-tools-3.10.0-514.28.1.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-514.28.1.el7.ppc64le.rpm
kernel-tools-libs-3.10.0-514.28.1.el7.ppc64le.rpm
perf-3.10.0-514.28.1.el7.ppc64le.rpm
perf-debuginfo-3.10.0-514.28.1.el7.ppc64le.rpm
python-perf-3.10.0-514.28.1.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-514.28.1.el7.ppc64le.rpm

s390x:
kernel-3.10.0-514.28.1.el7.s390x.rpm
kernel-debug-3.10.0-514.28.1.el7.s390x.rpm
kernel-debug-debuginfo-3.10.0-514.28.1.el7.s390x.rpm
kernel-debug-devel-3.10.0-514.28.1.el7.s390x.rpm
kernel-debuginfo-3.10.0-514.28.1.el7.s390x.rpm
kernel-debuginfo-common-s390x-3.10.0-514.28.1.el7.s390x.rpm
kernel-devel-3.10.0-514.28.1.el7.s390x.rpm
kernel-headers-3.10.0-514.28.1.el7.s390x.rpm
kernel-kdump-3.10.0-514.28.1.el7.s390x.rpm
kernel-kdump-debuginfo-3.10.0-514.28.1.el7.s390x.rpm
kernel-kdump-devel-3.10.0-514.28.1.el7.s390x.rpm
perf-3.10.0-514.28.1.el7.s390x.rpm
perf-debuginfo-3.10.0-514.28.1.el7.s390x.rpm
python-perf-3.10.0-514.28.1.el7.s390x.rpm
python-perf-debuginfo-3.10.0-514.28.1.el7.s390x.rpm

x86_64:
kernel-3.10.0-514.28.1.el7.x86_64.rpm
kernel-debug-3.10.0-514.28.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-514.28.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-514.28.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-514.28.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-514.28.1.el7.x86_64.rpm
kernel-devel-3.10.0-514.28.1.el7.x86_64.rpm
kernel-headers-3.10.0-514.28.1.el7.x86_64.rpm
kernel-tools-3.10.0-514.28.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-514.28.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-514.28.1.el7.x86_64.rpm
perf-3.10.0-514.28.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-514.28.1.el7.x86_64.rpm
python-perf-3.10.0-514.28.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-514.28.1.el7.x86_64.rpm

Red Hat Enterprise Linux Server Optional EUS (v. 7.3):

ppc64:
kernel-debug-debuginfo-3.10.0-514.28.1.el7.ppc64.rpm
kernel-debuginfo-3.10.0-514.28.1.el7.ppc64.rpm
kernel-debuginfo-common-ppc64-3.10.0-514.28.1.el7.ppc64.rpm
kernel-tools-debuginfo-3.10.0-514.28.1.el7.ppc64.rpm
kernel-tools-libs-devel-3.10.0-514.28.1.el7.ppc64.rpm
perf-debuginfo-3.10.0-514.28.1.el7.ppc64.rpm
python-perf-debuginfo-3.10.0-514.28.1.el7.ppc64.rpm

ppc64le:
kernel-debug-debuginfo-3.10.0-514.28.1.el7.ppc64le.rpm
kernel-debug-devel-3.10.0-514.28.1.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-514.28.1.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-514.28.1.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-514.28.1.el7.ppc64le.rpm
kernel-tools-libs-devel-3.10.0-514.28.1.el7.ppc64le.rpm
perf-debuginfo-3.10.0-514.28.1.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-514.28.1.el7.ppc64le.rpm

x86_64:
kernel-debug-debuginfo-3.10.0-514.28.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-514.28.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-514.28.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-514.28.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-514.28.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-514.28.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-514.28.1.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2015-8970
https://access.redhat.com/security/cve/CVE-2016-10200
https://access.redhat.com/security/cve/CVE-2017-2647
https://access.redhat.com/security/cve/CVE-2017-8797
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2017 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFZieUxXlSAg2UNWIIRAtpLAJ4yWd4F012+ijDqqiY0gTnKLSQDFgCeK/7F
oG1TY74k9/p9A7UZfiPInEU=
=R9FH
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=COgo
-----END PGP SIGNATURE-----

« Back to bulletins