Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.0228 kernel security and bug fix update 22 January 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: kernel Publisher: Red Hat Operating System: Red Hat Enterprise Linux Server 7 Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Denial of Service -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2019-11599 CVE-2018-18281 CVE-2018-10853 Reference: ESB-2020.0151 ESB-2020.0148 ESB-2020.0068 Original Bulletin: https://access.redhat.com/errata/RHSA-2020:0179 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: kernel security and bug fix update Advisory ID: RHSA-2020:0179-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:0179 Issue date: 2020-01-21 CVE Names: CVE-2018-10853 CVE-2018-18281 CVE-2019-11599 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux ComputeNode EUS (v. 7.6) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.6) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.6) - ppc64, ppc64le, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: kvm: guest userspace to guest kernel write (CVE-2018-10853) * kernel: TLB flush happens too late on mremap (CVE-2018-18281) * kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping (CVE-2019-11599) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * RHEL 7.7 RC1 - Host crashes about 4.5 hours into switch port bounce test (BZ#1763623) * [Azure][7.8] Include patch "PCI: hv: Avoid use of hv_pci_dev->pci_slot after freeing it" (BZ#1766088) * [Hyper-V][RHEL7.8] When accelerated networking is enabled on RedHat, network interface(eth0) moved to new network namespace does not obtain IP address. (BZ#1766092) * [Azure][RHEL 7.6] hv_vmbus probe pass-through GPU card failed (BZ#1766096) * Since RHEL commit 5330f5d09820 high load can cause dm-multipath path failures (BZ#1770112) * Hard lockup in free_one_page()->_raw_spin_lock() because sosreport command is reading from /proc/pagetypeinfo (BZ#1770731) * [ESXi][RHEL7]use-after-free of scsi_cmnd on VMWare virtual guest with vmw_pvscsi and ata_piix (BZ#1770737) * fix compat statfs64() returning EOVERFLOW for when _FILE_OFFSET_BITS=64 (BZ#1775677) * Kernel experiences panic in update_group_power() due to division error (BZ#1775681) * Guest crash after load cpuidle-haltpoll driver (BZ#1776288) * Issues with nova/cinder and attaching disks, /dev/disk/by-id missing some times (BZ#1776291) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1589890 - CVE-2018-10853 kernel: kvm: guest userspace to guest kernel write 1645121 - CVE-2018-18281 kernel: TLB flush happens too late on mremap 1705937 - CVE-2019-11599 kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping 6. Package List: Red Hat Enterprise Linux ComputeNode EUS (v. 7.6): Source: kernel-3.10.0-957.43.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-957.43.1.el7.noarch.rpm kernel-doc-3.10.0-957.43.1.el7.noarch.rpm x86_64: bpftool-3.10.0-957.43.1.el7.x86_64.rpm kernel-3.10.0-957.43.1.el7.x86_64.rpm kernel-debug-3.10.0-957.43.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.43.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.43.1.el7.x86_64.rpm kernel-devel-3.10.0-957.43.1.el7.x86_64.rpm kernel-headers-3.10.0-957.43.1.el7.x86_64.rpm kernel-tools-3.10.0-957.43.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.43.1.el7.x86_64.rpm perf-3.10.0-957.43.1.el7.x86_64.rpm perf-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm python-perf-3.10.0-957.43.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6): x86_64: kernel-debug-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.43.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.43.1.el7.x86_64.rpm perf-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 7.6): Source: kernel-3.10.0-957.43.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-957.43.1.el7.noarch.rpm kernel-doc-3.10.0-957.43.1.el7.noarch.rpm ppc64: kernel-3.10.0-957.43.1.el7.ppc64.rpm kernel-bootwrapper-3.10.0-957.43.1.el7.ppc64.rpm kernel-debug-3.10.0-957.43.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-957.43.1.el7.ppc64.rpm kernel-debug-devel-3.10.0-957.43.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-957.43.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-957.43.1.el7.ppc64.rpm kernel-devel-3.10.0-957.43.1.el7.ppc64.rpm kernel-headers-3.10.0-957.43.1.el7.ppc64.rpm kernel-tools-3.10.0-957.43.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-957.43.1.el7.ppc64.rpm kernel-tools-libs-3.10.0-957.43.1.el7.ppc64.rpm perf-3.10.0-957.43.1.el7.ppc64.rpm perf-debuginfo-3.10.0-957.43.1.el7.ppc64.rpm python-perf-3.10.0-957.43.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-957.43.1.el7.ppc64.rpm ppc64le: kernel-3.10.0-957.43.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-957.43.1.el7.ppc64le.rpm kernel-debug-3.10.0-957.43.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-957.43.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-957.43.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-957.43.1.el7.ppc64le.rpm kernel-devel-3.10.0-957.43.1.el7.ppc64le.rpm kernel-headers-3.10.0-957.43.1.el7.ppc64le.rpm kernel-tools-3.10.0-957.43.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-957.43.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-957.43.1.el7.ppc64le.rpm perf-3.10.0-957.43.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-957.43.1.el7.ppc64le.rpm python-perf-3.10.0-957.43.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-957.43.1.el7.ppc64le.rpm s390x: kernel-3.10.0-957.43.1.el7.s390x.rpm kernel-debug-3.10.0-957.43.1.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-957.43.1.el7.s390x.rpm kernel-debug-devel-3.10.0-957.43.1.el7.s390x.rpm kernel-debuginfo-3.10.0-957.43.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-957.43.1.el7.s390x.rpm kernel-devel-3.10.0-957.43.1.el7.s390x.rpm kernel-headers-3.10.0-957.43.1.el7.s390x.rpm kernel-kdump-3.10.0-957.43.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-957.43.1.el7.s390x.rpm kernel-kdump-devel-3.10.0-957.43.1.el7.s390x.rpm perf-3.10.0-957.43.1.el7.s390x.rpm perf-debuginfo-3.10.0-957.43.1.el7.s390x.rpm python-perf-3.10.0-957.43.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-957.43.1.el7.s390x.rpm x86_64: bpftool-3.10.0-957.43.1.el7.x86_64.rpm kernel-3.10.0-957.43.1.el7.x86_64.rpm kernel-debug-3.10.0-957.43.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.43.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.43.1.el7.x86_64.rpm kernel-devel-3.10.0-957.43.1.el7.x86_64.rpm kernel-headers-3.10.0-957.43.1.el7.x86_64.rpm kernel-tools-3.10.0-957.43.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.43.1.el7.x86_64.rpm perf-3.10.0-957.43.1.el7.x86_64.rpm perf-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm python-perf-3.10.0-957.43.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 7.6): ppc64: kernel-debug-debuginfo-3.10.0-957.43.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-957.43.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-957.43.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-957.43.1.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-957.43.1.el7.ppc64.rpm perf-debuginfo-3.10.0-957.43.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-957.43.1.el7.ppc64.rpm ppc64le: kernel-debug-debuginfo-3.10.0-957.43.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-957.43.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-957.43.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-957.43.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-957.43.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-957.43.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-957.43.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-957.43.1.el7.ppc64le.rpm x86_64: kernel-debug-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.43.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.43.1.el7.x86_64.rpm perf-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.43.1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-10853 https://access.redhat.com/security/cve/CVE-2018-18281 https://access.redhat.com/security/cve/CVE-2019-11599 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXicuy9zjgjWX9erEAQhuUg/9GuAaAJETGmooW5i/JXssSobEQuEsdMIh fHfXzZHrLEu4txH1KZsZG23mQEtWEVLImJcB1OQEnYEY9Av/nxMONMFr06Yj7Hdh 8uKuNpGL1+E7k5Ep8Rj7//f3lHRM/hT28nsp24JomdyVMF/e9Bv+nBJnk/emmJBN 2S3YtCRNehs5LFNA+aVTX4xwyvTo86DDndL4n82vQBse+ul6m7cfKv1PzNxOdzqb 74chlejz+gSprpaQI3yuFypqxlC9OHhx2ebJBwwYNCaC76tlG+o6jzEs1V1oiM2r UdhAr+ET6WQVu5mC61FlCkcSh7zFzKOiO9ePa6T12xZwfWk7MpAB4s1dsj8wtTOs PvLzXS6IdPCnz/cmORp2tngx54DS5Uiukc/9d48O9NLLygm9dTiMyYJ51Xyqn7yr v3qniZZmZOMa6muJU0hWzU0sKzSDBFl25+2+1MUonFAyYnweJT3GMU3OBoqw0tna TOJ0PbIz5AJuavuyiBPl4xFZeNiSLeMr6967fnCNfnHZ1EySuMIinDHHNwXEx85O TMPaUvkBEygM1vlpKLGyCgmHGB58oPjvnB7kHVQbRnz6So66WZ9iWwpnZ08KWmjM 1oDMnBzOXNdfBzDAe9k9XrlECWreumpIukRKZNDIZcZGhgPl7R5WYjjXbzxdOoSr Xvk51R1bLKY= =FFK/ - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXifbuWaOgq3Tt24GAQiFmhAAoPCRWtW2Ax5cfCaPUqXtIK74L255xA1E FfCS97UBJQbBFfyEwn5pXC6Yvtn5/hFqNBsO5lGJLDL9DJlWFhnruvf+3qK/lvxk XWdvbs4low9ybM9wFnL7C/YgnlCXPbUzt3gqZw8kT4SuTz2SWqbjMMWVKEY/wcgb yIxasyyvTpfqU5Jmj3UkZ7p9AYS7pwYclEzePG16l2LGs5NW6cdyL/9L/tEmJ097 K50tuMUW+7+8iD103Hi230WaoRa3uvdzkKLQqHelk6P9tBNUWQfcG76Mi+ZL26yS qsdqmChSbZQtZqg/GXXuRhL2P/iYBUtdZlKphm0dex/ncWS0fU1jUnEw0OVyvrrr 9LRoBKNgifsjlWKBnyqT3vqhAwIuggjejZJkBFIQebaaB3trWzu5UUqn0HNicgDY b8DchKxwoxw1ny++JRMr1FZzWQze8U+HhA4gaVeEWWyVUJpBiPXAOIE2rSITNkDE N4xJ1W7wExVQgIscKKtoyownqkahN3PbSTSnUgdotmvs3DQaUqhA9/b76h0NRnMU 9WGjgyhwzPrn2W/SJmwwO61/Sr6lzdrh1ottrhUM2xg2TR3hXKC7JLOzBqUz+V0Q S+Z6QeA6IOCiZEk2oAj59zMOmaadIl25KpjBdy0Z7Im0T5FjPXGmtWyrhsQfrhpH bsbxIzgDziI= =lNtd -----END PGP SIGNATURE-----