-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.2341
  IBM QRadar Network Security is affected by Linux kernel vulnerabilities
                               28 June 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM QRadar Network Security
Publisher:         IBM
Operating System:  Network Appliance
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Root Compromise                 -- Existing Account      
                   Access Privileged Data          -- Existing Account      
                   Denial of Service               -- Existing Account      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-7221 CVE-2019-6974 CVE-2018-17972
                   CVE-2018-14646 CVE-2018-14634 CVE-2018-13405
                   CVE-2018-10883 CVE-2018-10881 CVE-2018-10879
                   CVE-2018-10878 CVE-2018-9568 CVE-2018-7740
                   CVE-2018-5344 CVE-2018-1094 CVE-2018-1092
                   CVE-2017-18344 CVE-2017-18208 CVE-2017-10661
                   CVE-2016-4913 CVE-2015-8830 

Reference:         ASB-2019.0084
                   ASB-2019.0065
                   ASB-2019.0046
                   ASB-2019.0002
                   ASB-2018.0295
                   ASB-2017.0127

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=ibm10881053
   http://www.ibm.com/support/docview.wss?uid=ibm10883258

Comment: This bulletin contains two (2) IBM security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

IBM QRadar Network Security is affected by Linux kernel vulnerabilities

Product:             IBM QRadar Network Security
Software version:    5.4.0, 5.5.0
Operating system(s): Firmware
Reference #:         0881053

Security Bulletin

Summary

IBM QRadar Network Security is affected by Linux kernel vulnerabilities

Vulnerability Details

CVEID: CVE-2018-14646
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by a
NULL pointer dereference in the __netlink_ns_capable() function in the net/
netlink/af_netlink.c. By assigning a net namespace with a netnsid, a local
attacker could exploit this vulnerability to cause a kernel panic.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
153296 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2018-14634
DESCRIPTION: Linux Kernel could allow a local authenticated attacker to gain
elevated privileges on the system, caused by an integer overflow in the
create_elf_tables function. By using a specially-crafted binary file, an
attacker could exploit this vulnerability to obtain full root privileges.
CVSS Base Score: 7.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
150310 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)

CVEID: CVE-2018-13405
DESCRIPTION: Linux Kernel could allow a local attacker to gain elevated
privileges on the system, caused by a flaw in the fs/inode.c:inode_init_owner()
function. An attacker could exploit this vulnerability to create files with an
unintended group ownership.
CVSS Base Score: 4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
146434 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVEID: CVE-2018-10883
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by an
out-of-bounds write in the jbd2_journal_dirty_metadata() function. By mounting
and operating on a specially crafted ext4 filesystem image, a local attacker
could exploit this vulnerability to cause the system to crash.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
147830 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2018-10881
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by an
out-of-bound access in the ext4_get_group_info function. By mounting and
operating on a specially crafted ext4 filesystem image, a local attacker could
exploit this vulnerability to cause the system to crash.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
147820 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2018-10879
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by a
use-after-free in the ext4_xattr_set_entry function. By renaming a file a
specially crafted ext4 filesystem image, a local attacker could exploit this
vulnerability to cause the system to crash.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
147832 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2018-10878
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by an
out-of-bounds write in the ext4 filesystem. By mounting and operating on a
specially crafted ext4 filesystem image, a local attacker could exploit this
vulnerability to cause the system to crash.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
147833 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2018-7740
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by a
flaw in the resv_map_release function in mm/hugetlb.c. By using a
specially-crafted application, a local attacker could exploit this
vulnerability to cause the system to cause a denial of service.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
139974 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2018-5344
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by a
use-after-free in the drivers/block/loop.c. A local attacker could exploit this
vulnerability to cause the system to crash.
CVSS Base Score: 4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
137649 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2018-1094
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by a
NULL pointer dereference flaw in the ext4_fill_super function in fs/ext4/
super.c. By persuading a victim to open a specially-crafted file, a remote
attacker could exploit this vulnerability to cause the system to crash.
CVSS Base Score: 5.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
141198 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)

CVEID: CVE-2018-1092
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by a
NULL pointer dereference flaw in the ext4_iget function in fs/ext4/inode.c. By
persuading a victim to open a specially-crafted file, a remote attacker could
exploit this vulnerability to cause the system to crash.
CVSS Base Score: 5.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
141196 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)

CVEID: CVE-2017-18344
DESCRIPTION: Linux Kernel could allow a local attacker to obtain sensitive
information, caused by an out-of-bounds memory read error in the sigevent->
sigev_notify' field of show_timer() function. An attacker could exploit this
vulnerability to obtain kernel memory.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
147880 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID: CVE-2017-18208
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by a
flaw in the madvise_willneed function in mm/madvise.c. By triggering use of
MADVISE_WILLNEED for a DAX mapping, a local attacker could exploit this
vulnerability to cause a denial of service.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
139764 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2017-10661
DESCRIPTION: Linux Kernel could allow a local attacker to gain elevated
privileges on the system, caused by a race condition in fs/timerfd.c. An
attacker could exploit this vulnerability to gain privileges or cause a denial
of service.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
130802 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

CVEID: CVE-2016-4913
DESCRIPTION: Linux Kernel could allow a local attacker to obtain sensitive
information, caused by the improper handling of NM entries containing NUL
characters by the get_rock_ridge_filename function in fs/isofs/rock.c. An
attacker could exploit this vulnerability using a specially crafted isofs
filesystem to read from kernel memory locations.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
113397 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID: CVE-2015-8830
DESCRIPTION: Linux Kernel could allow a remote attacker to execute arbitrary
code on the system, caused by an integer overflow in the AIO interface. By
applying to certain filesystems, socket or device types, an attacker could
exploit this vulnerability to execute arbitrary code on the system.
CVSS Base Score: 7.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
111186 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

Affected Products and Versions

IBM QRadar Network Security 5.4.0

IBM QRadar Network Security 5.5.0

Remediation/Fixes

+------------------+-----+---------------------------------------------------------------------------------------------+
|Product           |VRMF |Remediation/First Fix                                                                        |
+------------------+-----+---------------------------------------------------------------------------------------------+
|                  |     |Install Firmware 5.4.0.8 from the Available Updates page of the Local                        |
|                  |     |Management Interface, or by performing a One Time Scheduled Installation from                |
|IBM QRadar Network|     |SiteProtector.                                                                               |
|Security          |5.4.0|Or                                                                                           |
|                  |     |Download Firmware 5.4.0.8 from IBM Security License Key and Download Center and              |
|                  |     |upload and install via the Available Updates page of the Local Management                    |
|                  |     |Interface.                                                                                   |
+------------------+-----+---------------------------------------------------------------------------------------------+
|                  |     |Install Firmware 5.5.0.3 from the Available Updates page of the Local                        |
|                  |     |Management Interface, or by performing a One Time Scheduled Installation from                |
|IBM QRadar Network|     |SiteProtector.                                                                               |
|Security          |5.5.0|Or                                                                                           |
|                  |     |Download Firmware 5.5.0.3 from IBM Security License Key and Download Center and              |
|                  |     |upload and install via the Available Updates page of the Local Management                    |
|                  |     |Interface.                                                                                   |
+------------------+-----+---------------------------------------------------------------------------------------------+

Change History

June 27, 2019: Original Version Published

- ----

IBM QRadar Network Security is affected by Linux kernel vulnerabilities
(CVE-2019-7221, CVE-2019-6974, CVE-2018-17972, CVE-2018-9568)

Product:             IBM QRadar Network Security
Software version:    5.4.0, 5.5.0
Operating system(s): Firmware
Reference #:         0883258

Security Bulletin

Summary

IBM QRadar Network Security is affected by Linux kernel vulnerabilities

Vulnerability Details

CVEID: CVE-2019-7221
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by a
use-after-free in the way KVM hypervisor emulates a preemption timer for L2
guests when nested (=1) virtualization is enabled.. A local authenticated
attacker could exploit this vulnerability to crash the host kernel and possibly
gain privileged access to a system.
CVSS Base Score: 7.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
157079 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H)

CVEID: CVE-2019-6974
DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by the
improper handling of reference counting by kvm_ioctl_create_device in virt/kvm/
kvm_main.c. A local authenticated attacker could exploit this vulnerability to
trigger a use-after-free to crash the guest VM and possibly gain privileged
access to a system.
CVSS Base Score: 7.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
157074 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H)

CVEID: CVE-2018-17972
DESCRIPTION: Linux Kernel could allow a local attacker to obtain sensitive
information, caused by a flaw in the proc_pid_stack function in fs/proc/base.c.
By sending a specially-crafted request, a local attacker could exploit this
vulnerability to obtain kernel task stack contents.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
150826 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID: CVE-2018-9568
DESCRIPTION: Google Android could allow a local attacker to gain elevated
privileges on the system, caused by a type confusion flaw in the sk_clone_lock
function in sock.c. By sending a specially-crafted request, an attacker could
exploit this vulnerability to gain elevated privileges.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
153889 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

IBM QRadar Network Security 5.4.0

IBM QRadar Network Security 5.5.0

Remediation/Fixes

+------------------+-----+---------------------------------------------------------------------------------------------+
|Product           |VRMF |Remediation/First Fix                                                                        |
+------------------+-----+---------------------------------------------------------------------------------------------+
|                  |     |Install Firmware 5.4.0.8 from the Available Updates page of the Local                        |
|                  |     |Management Interface, or by performing a One Time Scheduled Installation from                |
|IBM QRadar Network|     |SiteProtector.                                                                               |
|Security          |5.4.0|Or                                                                                           |
|                  |     |Download Firmware 5.4.0.8 from IBM Security License Key and Download Center and              |
|                  |     |upload and install via the Available Updates page of the Local Management                    |
|                  |     |Interface.                                                                                   |
+------------------+-----+---------------------------------------------------------------------------------------------+
|                  |     |Install Firmware 5.5.0.3 from the Available Updates page of the Local                        |
|                  |     |Management Interface, or by performing a One Time Scheduled Installation from                |
|IBM QRadar Network|     |SiteProtector.                                                                               |
|Security          |5.5.0|Or                                                                                           |
|                  |     |Download Firmware 5.5.0.3 from IBM Security License Key and Download Center and              |
|                  |     |upload and install via the Available Updates page of the Local Management                    |
|                  |     |Interface.                                                                                   |
+------------------+-----+---------------------------------------------------------------------------------------------+

Change History

June 27, 2019: Original Version Published

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=4R03
-----END PGP SIGNATURE-----