-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.0228
                    kernel security and bug fix update
                              22 January 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           kernel
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 7
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
                   Denial of Service               -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-11599 CVE-2018-18281 CVE-2018-10853

Reference:         ESB-2020.0151
                   ESB-2020.0148
                   ESB-2020.0068

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2020:0179

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: kernel security and bug fix update
Advisory ID:       RHSA-2020:0179-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:0179
Issue date:        2020-01-21
CVE Names:         CVE-2018-10853 CVE-2018-18281 CVE-2019-11599 
=====================================================================

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 7.6
Extended Update Support.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux ComputeNode EUS (v. 7.6) - noarch, x86_64
Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6) - x86_64
Red Hat Enterprise Linux Server EUS (v. 7.6) - noarch, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional EUS (v. 7.6) - ppc64, ppc64le, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* kernel: kvm: guest userspace to guest kernel write (CVE-2018-10853)

* kernel: TLB flush happens too late on mremap (CVE-2018-18281)

* kernel: fix race condition between mmget_not_zero()/get_task_mm() and
core dumping (CVE-2019-11599)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* RHEL 7.7 RC1 - Host crashes about 4.5 hours into switch port bounce test
(BZ#1763623)

* [Azure][7.8] Include patch "PCI: hv: Avoid use of hv_pci_dev->pci_slot
after freeing it" (BZ#1766088)

* [Hyper-V][RHEL7.8] When accelerated networking is enabled on RedHat,
network interface(eth0) moved to new network namespace does not obtain IP
address. (BZ#1766092)

* [Azure][RHEL 7.6] hv_vmbus probe pass-through GPU card failed
(BZ#1766096)

* Since RHEL commit 5330f5d09820 high load can cause dm-multipath path
failures (BZ#1770112)

* Hard lockup in free_one_page()->_raw_spin_lock() because sosreport
command is reading from /proc/pagetypeinfo (BZ#1770731)

* [ESXi][RHEL7]use-after-free of scsi_cmnd on VMWare virtual guest with
vmw_pvscsi and ata_piix (BZ#1770737)

* fix compat statfs64() returning EOVERFLOW for when _FILE_OFFSET_BITS=64
(BZ#1775677)

* Kernel experiences panic in update_group_power() due to division error
(BZ#1775681)

* Guest crash after load cpuidle-haltpoll driver (BZ#1776288)

* Issues with nova/cinder and attaching disks, /dev/disk/by-id missing some
times (BZ#1776291)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1589890 - CVE-2018-10853 kernel: kvm: guest userspace to guest kernel write
1645121 - CVE-2018-18281 kernel: TLB flush happens too late on mremap
1705937 - CVE-2019-11599 kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping

6. Package List:

Red Hat Enterprise Linux ComputeNode EUS (v. 7.6):

Source:
kernel-3.10.0-957.43.1.el7.src.rpm

noarch:
kernel-abi-whitelists-3.10.0-957.43.1.el7.noarch.rpm
kernel-doc-3.10.0-957.43.1.el7.noarch.rpm

x86_64:
bpftool-3.10.0-957.43.1.el7.x86_64.rpm
kernel-3.10.0-957.43.1.el7.x86_64.rpm
kernel-debug-3.10.0-957.43.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-957.43.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-957.43.1.el7.x86_64.rpm
kernel-devel-3.10.0-957.43.1.el7.x86_64.rpm
kernel-headers-3.10.0-957.43.1.el7.x86_64.rpm
kernel-tools-3.10.0-957.43.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-957.43.1.el7.x86_64.rpm
perf-3.10.0-957.43.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm
python-perf-3.10.0-957.43.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6):

x86_64:
kernel-debug-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-957.43.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-957.43.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm

Red Hat Enterprise Linux Server EUS (v. 7.6):

Source:
kernel-3.10.0-957.43.1.el7.src.rpm

noarch:
kernel-abi-whitelists-3.10.0-957.43.1.el7.noarch.rpm
kernel-doc-3.10.0-957.43.1.el7.noarch.rpm

ppc64:
kernel-3.10.0-957.43.1.el7.ppc64.rpm
kernel-bootwrapper-3.10.0-957.43.1.el7.ppc64.rpm
kernel-debug-3.10.0-957.43.1.el7.ppc64.rpm
kernel-debug-debuginfo-3.10.0-957.43.1.el7.ppc64.rpm
kernel-debug-devel-3.10.0-957.43.1.el7.ppc64.rpm
kernel-debuginfo-3.10.0-957.43.1.el7.ppc64.rpm
kernel-debuginfo-common-ppc64-3.10.0-957.43.1.el7.ppc64.rpm
kernel-devel-3.10.0-957.43.1.el7.ppc64.rpm
kernel-headers-3.10.0-957.43.1.el7.ppc64.rpm
kernel-tools-3.10.0-957.43.1.el7.ppc64.rpm
kernel-tools-debuginfo-3.10.0-957.43.1.el7.ppc64.rpm
kernel-tools-libs-3.10.0-957.43.1.el7.ppc64.rpm
perf-3.10.0-957.43.1.el7.ppc64.rpm
perf-debuginfo-3.10.0-957.43.1.el7.ppc64.rpm
python-perf-3.10.0-957.43.1.el7.ppc64.rpm
python-perf-debuginfo-3.10.0-957.43.1.el7.ppc64.rpm

ppc64le:
kernel-3.10.0-957.43.1.el7.ppc64le.rpm
kernel-bootwrapper-3.10.0-957.43.1.el7.ppc64le.rpm
kernel-debug-3.10.0-957.43.1.el7.ppc64le.rpm
kernel-debug-debuginfo-3.10.0-957.43.1.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-957.43.1.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-957.43.1.el7.ppc64le.rpm
kernel-devel-3.10.0-957.43.1.el7.ppc64le.rpm
kernel-headers-3.10.0-957.43.1.el7.ppc64le.rpm
kernel-tools-3.10.0-957.43.1.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-957.43.1.el7.ppc64le.rpm
kernel-tools-libs-3.10.0-957.43.1.el7.ppc64le.rpm
perf-3.10.0-957.43.1.el7.ppc64le.rpm
perf-debuginfo-3.10.0-957.43.1.el7.ppc64le.rpm
python-perf-3.10.0-957.43.1.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-957.43.1.el7.ppc64le.rpm

s390x:
kernel-3.10.0-957.43.1.el7.s390x.rpm
kernel-debug-3.10.0-957.43.1.el7.s390x.rpm
kernel-debug-debuginfo-3.10.0-957.43.1.el7.s390x.rpm
kernel-debug-devel-3.10.0-957.43.1.el7.s390x.rpm
kernel-debuginfo-3.10.0-957.43.1.el7.s390x.rpm
kernel-debuginfo-common-s390x-3.10.0-957.43.1.el7.s390x.rpm
kernel-devel-3.10.0-957.43.1.el7.s390x.rpm
kernel-headers-3.10.0-957.43.1.el7.s390x.rpm
kernel-kdump-3.10.0-957.43.1.el7.s390x.rpm
kernel-kdump-debuginfo-3.10.0-957.43.1.el7.s390x.rpm
kernel-kdump-devel-3.10.0-957.43.1.el7.s390x.rpm
perf-3.10.0-957.43.1.el7.s390x.rpm
perf-debuginfo-3.10.0-957.43.1.el7.s390x.rpm
python-perf-3.10.0-957.43.1.el7.s390x.rpm
python-perf-debuginfo-3.10.0-957.43.1.el7.s390x.rpm

x86_64:
bpftool-3.10.0-957.43.1.el7.x86_64.rpm
kernel-3.10.0-957.43.1.el7.x86_64.rpm
kernel-debug-3.10.0-957.43.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-957.43.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-957.43.1.el7.x86_64.rpm
kernel-devel-3.10.0-957.43.1.el7.x86_64.rpm
kernel-headers-3.10.0-957.43.1.el7.x86_64.rpm
kernel-tools-3.10.0-957.43.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-957.43.1.el7.x86_64.rpm
perf-3.10.0-957.43.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm
python-perf-3.10.0-957.43.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm

Red Hat Enterprise Linux Server Optional EUS (v. 7.6):

ppc64:
kernel-debug-debuginfo-3.10.0-957.43.1.el7.ppc64.rpm
kernel-debuginfo-3.10.0-957.43.1.el7.ppc64.rpm
kernel-debuginfo-common-ppc64-3.10.0-957.43.1.el7.ppc64.rpm
kernel-tools-debuginfo-3.10.0-957.43.1.el7.ppc64.rpm
kernel-tools-libs-devel-3.10.0-957.43.1.el7.ppc64.rpm
perf-debuginfo-3.10.0-957.43.1.el7.ppc64.rpm
python-perf-debuginfo-3.10.0-957.43.1.el7.ppc64.rpm

ppc64le:
kernel-debug-debuginfo-3.10.0-957.43.1.el7.ppc64le.rpm
kernel-debug-devel-3.10.0-957.43.1.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-957.43.1.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-957.43.1.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-957.43.1.el7.ppc64le.rpm
kernel-tools-libs-devel-3.10.0-957.43.1.el7.ppc64le.rpm
perf-debuginfo-3.10.0-957.43.1.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-957.43.1.el7.ppc64le.rpm

x86_64:
kernel-debug-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-957.43.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-957.43.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-10853
https://access.redhat.com/security/cve/CVE-2018-18281
https://access.redhat.com/security/cve/CVE-2019-11599
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=FFK/
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=lNtd
-----END PGP SIGNATURE-----