Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2020.0693
kernel-rt security and bug fix update
27 February 2020
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: kernel-rt
Publisher: Red Hat
Operating System: Red Hat
Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Root Compromise -- Existing Account
Denial of Service -- Remote/Unauthenticated
Access Confidential Data -- Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2019-17133 CVE-2019-14895 CVE-2019-11085
CVE-2018-20976
Reference: ESB-2020.0689
ESB-2020.0549
ESB-2020.0415
ESB-2020.0411
Original Bulletin:
https://access.redhat.com/errata/RHSA-2020:0609
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel-rt security and bug fix update
Advisory ID: RHSA-2020:0609-01
Product: Red Hat Enterprise MRG for RHEL-6
Advisory URL: https://access.redhat.com/errata/RHSA-2020:0609
Issue date: 2020-02-26
CVE Names: CVE-2018-20976 CVE-2019-11085 CVE-2019-14895
CVE-2019-17133
=====================================================================
1. Summary:
An update for kernel-rt is now available for Red Hat Enterprise MRG 2.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat MRG Realtime for RHEL 6 Server v.2 - noarch, x86_64
3. Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables
fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: use-after-free in fs/xfs/xfs_super.c (CVE-2018-20976)
* kernel: insufficient input validation in kernel mode driver in Intel i915
graphics leads to privilege escalation (CVE-2019-11085)
* kernel: heap-based buffer overflow in mwifiex_process_country_ie()
function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c
(CVE-2019-14895)
* kernel: buffer overflow in cfg80211_mgd_wext_giwessid in
net/wireless/wext-sme.c (CVE-2019-17133)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Bug Fix(es):
* update the MRG 2.5.z 3.10 realtime-kernel sources (BZ#1794133)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1710405 - CVE-2019-11085 kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation
1743547 - CVE-2018-20976 kernel: use-after-free in fs/xfs/xfs_super.c
1771909 - CVE-2019-17133 kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c
1774870 - CVE-2019-14895 kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c
6. Package List:
Red Hat MRG Realtime for RHEL 6 Server v.2:
Source:
kernel-rt-3.10.0-693.64.1.rt56.662.el6rt.src.rpm
noarch:
kernel-rt-doc-3.10.0-693.64.1.rt56.662.el6rt.noarch.rpm
kernel-rt-firmware-3.10.0-693.64.1.rt56.662.el6rt.noarch.rpm
x86_64:
kernel-rt-3.10.0-693.64.1.rt56.662.el6rt.x86_64.rpm
kernel-rt-debug-3.10.0-693.64.1.rt56.662.el6rt.x86_64.rpm
kernel-rt-debug-debuginfo-3.10.0-693.64.1.rt56.662.el6rt.x86_64.rpm
kernel-rt-debug-devel-3.10.0-693.64.1.rt56.662.el6rt.x86_64.rpm
kernel-rt-debuginfo-3.10.0-693.64.1.rt56.662.el6rt.x86_64.rpm
kernel-rt-debuginfo-common-x86_64-3.10.0-693.64.1.rt56.662.el6rt.x86_64.rpm
kernel-rt-devel-3.10.0-693.64.1.rt56.662.el6rt.x86_64.rpm
kernel-rt-trace-3.10.0-693.64.1.rt56.662.el6rt.x86_64.rpm
kernel-rt-trace-debuginfo-3.10.0-693.64.1.rt56.662.el6rt.x86_64.rpm
kernel-rt-trace-devel-3.10.0-693.64.1.rt56.662.el6rt.x86_64.rpm
kernel-rt-vanilla-3.10.0-693.64.1.rt56.662.el6rt.x86_64.rpm
kernel-rt-vanilla-debuginfo-3.10.0-693.64.1.rt56.662.el6rt.x86_64.rpm
kernel-rt-vanilla-devel-3.10.0-693.64.1.rt56.662.el6rt.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2018-20976
https://access.redhat.com/security/cve/CVE-2019-11085
https://access.redhat.com/security/cve/CVE-2019-14895
https://access.redhat.com/security/cve/CVE-2019-17133
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=/gTk
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=lhHc
-----END PGP SIGNATURE-----