Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.3460 Important: kernel-rt security and bug fix update 12 September 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: kernel-rt Publisher: Red Hat Operating System: Red Hat Enterprise Linux Server 8 Red Hat Enterprise Linux WS/Desktop 8 Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-11487 CVE-2019-9503 CVE-2019-9500 CVE-2019-3887 CVE-2019-3846 Reference: ESB-2019.3436 ESB-2019.3341 ESB-2019.3338 ESB-2019.3335 ESB-2019.3334 Original Bulletin: https://access.redhat.com/errata/RHSA-2019:2741 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security and bug fix update Advisory ID: RHSA-2019:2741-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:2741 Issue date: 2019-09-11 CVE Names: CVE-2019-3846 CVE-2019-3887 CVE-2019-9500 CVE-2019-9503 CVE-2019-11487 ===================================================================== 1. Summary: An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Real Time (v. 8) - x86_64 Red Hat Enterprise Linux Real Time for NFV (v. 8) - x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c (CVE-2019-3846) * Kernel: KVM: nVMX: guest accesses L0 MSR causes potential DoS (CVE-2019-3887) * kernel: brcmfmac heap buffer overflow in brcmf_wowl_nd_results (CVE-2019-9500) * kernel: Count overflow in FUSE request leading to use-after-free issues. (CVE-2019-11487) * kernel: brcmfmac frame validation bypass (CVE-2019-9503) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * BUG: scheduling while atomic in zswap (BZ#1726362) * kernel-rt: update to the RHEL8.0.z batch#3 source tree (BZ#1734475) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1695044 - CVE-2019-3887 Kernel: KVM: nVMX: guest accesses L0 MSR causes potential DoS 1701224 - CVE-2019-9500 kernel: brcmfmac heap buffer overflow in brcmf_wowl_nd_results 1701842 - CVE-2019-9503 kernel: brcmfmac frame validation bypass 1703063 - CVE-2019-11487 kernel: Count overflow in FUSE request leading to use-after-free issues. 1713059 - CVE-2019-3846 kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c 1726362 - BUG: scheduling while atomic in zswap [rhel-8.0.0.z] 1734475 - kernel-rt: update to the RHEL8.0.z batch#3 source tree 6. Package List: Red Hat Enterprise Linux Real Time for NFV (v. 8): Source: kernel-rt-4.18.0-80.11.1.rt9.156.el8_0.src.rpm x86_64: kernel-rt-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-core-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-debug-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-debug-core-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-debug-debuginfo-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-debug-devel-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-debug-kvm-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-debug-kvm-debuginfo-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-debug-modules-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-debug-modules-extra-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-debuginfo-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-debuginfo-common-x86_64-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-devel-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-kvm-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-kvm-debuginfo-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-modules-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-modules-extra-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm Red Hat Enterprise Linux Real Time (v. 8): Source: kernel-rt-4.18.0-80.11.1.rt9.156.el8_0.src.rpm x86_64: kernel-rt-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-core-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-debug-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-debug-core-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-debug-debuginfo-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-debug-devel-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-debug-kvm-debuginfo-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-debug-modules-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-debug-modules-extra-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-debuginfo-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-debuginfo-common-x86_64-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-devel-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-kvm-debuginfo-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-modules-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm kernel-rt-modules-extra-4.18.0-80.11.1.rt9.156.el8_0.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-3846 https://access.redhat.com/security/cve/CVE-2019-3887 https://access.redhat.com/security/cve/CVE-2019-9500 https://access.redhat.com/security/cve/CVE-2019-9503 https://access.redhat.com/security/cve/CVE-2019-11487 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXXkkG9zjgjWX9erEAQhHbw/8DU3/Uk9KnOf3bQbZhxHScGUsvgc7h7y9 p/ymILC7J//JGdKlbq7PjjZoIzSJ2jXcqINiKTfXRETLwgW5FAQcTIoedcNF+VF/ DCM/GhnEf+rV7hGG9GA5uSBVpbcsm/3Hvm5YAdh+guImbpdRVsX0XTii3zLY3IFM LWFlGSO9Xd6hWFVBjgCXDqUqqOkUleSj/rdq0ABpK9IONHcmYnTwRFUUU0lKlzip G3q5Pu1Z4vOXTSnxFrx/60rpvT6VVzy+Oe9OBProHfFWtAdjQbw/fpaB1gKTqHG6 Mjbf+FKMfheSJ9glTTDy3W+Y0lO77Kdf+Mjm9PAI+5laUlCO9bBQfvPHXbrTfrRx 8XcClaEZDR5zJFW2L7XfNTOdd1PblR9OKESfMXMN+A/hHzgIWfB77UECZKTKJjKN m8wZIbThjdUl38iVYLlJd5T1HT3QEObQF+mnVgM0X0Hd/pgkmssRUCbR+xXILziS UcmGZk9tZ3nk40HsCPD2kP1h+OBVDRWVYN3btSOBm9pFd97sEIqhx/Fcqo9T+irJ M4UyOH0u5ruf6iYry8SnWMmFFkBK1GJiddMVfEiJxEEZfBoii2WF4yMZVplBAyYH eRrk5nTw/Cx4XgLeee8gxhDAg4Z5wR1bu4o1ixQp8f3jAi2uj47/u/NTxKzyNgIo McrYYkLl7Es= =NPIT - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXXmOEGaOgq3Tt24GAQhk0xAAz1yNUbqZJQohNhlf5EEO/EA6ElV2SWpC o806+NCodGydjX5WcVG0ihiWfAP9JkpsstIaeGsS/SEN6FlosjEK+GnTOAfxZCqK fVB9mQb9P5u02nBWhuTpeV3WElm00ZFFbVI8IOn0niNAtdY+PE2Q/aMaxrth/8OZ wTfrOmxEEFSM8zw5isgSymky8TeMvjPI5St4MmHxRZFrCU8bjtcCu5GfRfd9vY8L TEK4jaslsyQPw9PfgUUyaUH3Odjr+gR/DvbsTV9mWT7FPquK7GK5u6VDR7hjqG9A p54QmARMw/2YYeRMJXZpWtKG29FKIaYgblnQxN3ee1S6jpEHKHkRKEUCXXSuiXkG mKd/N7Z1ChyEfnqN+nLNyK7Jgh77/7f0KpmumgfKpZvGvC7YCq28krl9AAFQQJH6 pJ6nnZHpkk3y4EgmzSH9I3Duj9TutNicsrbpwIe1X5z4N6a3WWjrMNpEAiNZfO7N WzlPTZUVYOEriLz2SeoXNQgQAxeyAUJceXCTUxynxqgdxOi4gN4Z96E2G/jYRGJU fXh1nY+1xE4PGHEmLhv0dxdYTohgCuhIy2hIWkgrrq6kSWBE//vL84nmX0Ie2Hna EpD2g1v9z/v196UZuYrdEcvAQ0pBp/0W0bNEnjIbUjRe9jJgcpdd6gLj0k/IE/WB gjtE7FROI8U= =8BSA -----END PGP SIGNATURE-----