Important: kernel security, bug fix, and enhancement update

Related Vulnerabilities: CVE-2017-5754   CVE-2016-8633   CVE-2017-8824   CVE-2017-12154   CVE-2017-13166   CVE-2016-7913   CVE-2017-7294   CVE-2017-9725   CVE-2017-12190   CVE-2017-15121   CVE-2017-15126   CVE-2017-15129   CVE-2017-15265   CVE-2017-17448   CVE-2017-17449   CVE-2017-17558   CVE-2017-18017   CVE-2017-18203   CVE-2017-1000252   CVE-2017-1000407   CVE-2017-1000410   CVE-2018-5750   CVE-2018-1000004   CVE-2016-3672   CVE-2017-14140   CVE-2017-15116   CVE-2017-15127   CVE-2018-6927   CVE-2016-3672   CVE-2016-8633   CVE-2016-7913   CVE-2017-7294   CVE-2017-14140   CVE-2017-9725   CVE-2017-1000252   CVE-2017-12154   CVE-2017-12190   CVE-2017-15265   CVE-2017-15116   CVE-2017-1000410   CVE-2017-8824   CVE-2017-5754   CVE-2017-1000407   CVE-2017-15121   CVE-2017-15126   CVE-2017-15127   CVE-2017-17558   CVE-2017-17449   CVE-2017-17448   CVE-2017-18017   CVE-2017-15129   CVE-2018-1000004   CVE-2018-5750   CVE-2018-6927   CVE-2017-13166   CVE-2017-18203   CVE-2016-3672   CVE-2016-7913   CVE-2016-8633   CVE-2017-7294   CVE-2017-8824   CVE-2017-9725   CVE-2017-12154   CVE-2017-12190   CVE-2017-13166   CVE-2017-13305   CVE-2017-14140   CVE-2017-15116   CVE-2017-15121   CVE-2017-15126   CVE-2017-15127   CVE-2017-15129   CVE-2017-15265   CVE-2017-15274   CVE-2017-17448   CVE-2017-17449   CVE-2017-17558   CVE-2017-18017   CVE-2017-18203   CVE-2017-18270   CVE-2017-1000252   CVE-2017-1000407   CVE-2017-1000410   CVE-2018-5750   CVE-2018-6927   CVE-2018-1000004  

Synopsis

Important: kernel security, bug fix, and enhancement update

Type/Severity

Security Advisory: Important

Topic

An update for kernel is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • hw: cpu: speculative execution permission faults handling (CVE-2017-5754, Important, KVM for Power)
  • kernel: Buffer overflow in firewire driver via crafted incoming packets (CVE-2016-8633, Important)
  • kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824, Important)
  • Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register (CVE-2017-12154, Important)
  • kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166, Important)
  • kernel: media: use-after-free in [tuner-xc2028] media driver (CVE-2016-7913, Moderate)
  • kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl() (CVE-2017-7294, Moderate)
  • kernel: Incorrect type conversion for size during dma allocation (CVE-2017-9725, Moderate)
  • kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190, Moderate)
  • kernel: vfs: BUG in truncate_inode_pages_range() and fuse client (CVE-2017-15121, Moderate)
  • kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c (CVE-2017-15126, Moderate)
  • kernel: net: double-free and memory corruption in get_net_ns_by_id() (CVE-2017-15129, Moderate)
  • kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265, Moderate)
  • kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure (CVE-2017-17448, Moderate)
  • kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity (CVE-2017-17449, Moderate)
  • kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow (CVE-2017-17558, Moderate)
  • kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c (CVE-2017-18017, Moderate)
  • kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service (CVE-2017-18203, Moderate)
  • kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ (CVE-2017-1000252, Moderate)
  • Kernel: KVM: DoS via write flood to I/O port 0x80 (CVE-2017-1000407, Moderate)
  • kernel: Stack information leak in the EFS element (CVE-2017-1000410, Moderate)
  • kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass (CVE-2018-5750, Moderate)
  • kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004, Moderate)
  • kernel: multiple Low security impact security issues (CVE-2016-3672, CVE-2017-14140, CVE-2017-15116, CVE-2017-15127, CVE-2018-6927, Low)

Red Hat would like to thank Eyal Itkin for reporting CVE-2016-8633; Google Project Zero for reporting CVE-2017-5754; Mohamed Ghannam for reporting CVE-2017-8824; Jim Mattson (Google.com) for reporting CVE-2017-12154; Vitaly Mayatskih for reporting CVE-2017-12190; Andrea Arcangeli (Engineering) for reporting CVE-2017-15126; Kirill Tkhai for reporting CVE-2017-15129; Jan H. Schönherr (Amazon) for reporting CVE-2017-1000252; and Armis Labs for reporting CVE-2017-1000410. The CVE-2017-15121 issue was discovered by Miklos Szeredi (Red Hat) and the CVE-2017-15116 issue was discovered by ChunYu Wang (Red Hat).

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.5 Release Notes linked from the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server 7 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support 7.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 7.6 x86_64
  • Red Hat Enterprise Linux Workstation 7 x86_64
  • Red Hat Enterprise Linux Desktop 7 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 7 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.6 s390x
  • Red Hat Enterprise Linux for Power, big endian 7 ppc64
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 7 x86_64
  • Red Hat Enterprise Linux EUS Compute Node 7.6 x86_64
  • Red Hat Enterprise Linux for Power, little endian 7 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.6 ppc64le
  • Red Hat Virtualization Host 4 x86_64
  • Red Hat Enterprise Linux Server - TUS 7.6 x86_64
  • Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le
  • Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64

Fixes

  • BZ - 1132610 - nfsd does not release free space of a file created with dd oflag=direct where there was no space left on device even after manual deletion
  • BZ - 1324749 - CVE-2016-3672 kernel: unlimiting the stack disables ASLR
  • BZ - 1334439 - Unable to disable IPv6 DAD or Optimistic DAD for all interfaces
  • BZ - 1372079 - ixgbe nic is falsely advertising MII support
  • BZ - 1391490 - CVE-2016-8633 kernel: Buffer overflow in firewire driver via crafted incoming packets
  • BZ - 1402885 - CVE-2016-7913 kernel: media: use-after-free in [tuner-xc2028] media driver
  • BZ - 1436798 - CVE-2017-7294 kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()
  • BZ - 1450205 - Gratuitous ARP updates received in span of 2-3 seconds time frame are all ignored
  • BZ - 1458032 - [Intel 7.5 Bug] KVMGT: Bogus PCI BAR emulation
  • BZ - 1460213 - cls_matchall: kernel panic when used with classful qdiscs
  • BZ - 1461282 - kernel: ICMP rate limiting is too aggressive on loopback
  • BZ - 1471875 - soft lockups during unmount when dentry cache is very large
  • BZ - 1488329 - CVE-2017-14140 kernel: Missing permission check in move_pages system call
  • BZ - 1489088 - CVE-2017-9725 kernel: Incorrect type conversion for size during dma allocation
  • BZ - 1489542 - Behavior change in autofs expiry timer when a path walk is done following commit from BZ 1413523
  • BZ - 1490673 - Kernel Panic always happen immediately whenever make "debug.panic_on_rcu_stall=1" set on RHEL7.4
  • BZ - 1490781 - CVE-2017-1000252 kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ
  • BZ - 1491224 - CVE-2017-12154 Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register
  • BZ - 1493125 - [RFE] Kernel address space layout randomization [KASLR] qemu support (kernel)
  • BZ - 1495089 - CVE-2017-12190 kernel: memory leak when merging buffers in SCSI IO vectors
  • BZ - 1496836 - [RH 7.5 bug] Request for upstream commit 3664847d95e6 to be merged into RHEL 7.5/7.4
  • BZ - 1501878 - CVE-2017-15265 kernel: Use-after-free in snd_seq_ioctl_create_port()
  • BZ - 1502601 - [Hyper-V][RHEL7.4] hang when thaw on microsoft hyper-v
  • BZ - 1506382 - deadlock in nfs v4 client init
  • BZ - 1507025 - [ESXi][RHEL7.5]x86/vmware: Skip timer_irq_works() check on VMware
  • BZ - 1507026 - [ESXi][RHEL7.5]x86/vmware: Skip lapic calibration on VMware.
  • BZ - 1514609 - CVE-2017-15116 kernel: Null pointer dereference in rngapi_reset function
  • BZ - 1519160 - CVE-2017-1000410 kernel: Stack information leak in the EFS element
  • BZ - 1519591 - CVE-2017-8824 kernel: Use-after-free vulnerability in DCCP socket
  • BZ - 1519781 - CVE-2017-5754 hw: cpu: speculative execution permission faults handling
  • BZ - 1520328 - CVE-2017-1000407 Kernel: KVM: DoS via write flood to I/O port 0x80
  • BZ - 1520893 - CVE-2017-15121 kernel: vfs: BUG in truncate_inode_pages_range() and fuse client
  • BZ - 1523481 - CVE-2017-15126 kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c
  • BZ - 1525218 - CVE-2017-15127 kernel: Improper error handling of VM_SHARED hugetlbfs mapping in mm/hugetlb.c
  • BZ - 1525474 - CVE-2017-17558 kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow
  • BZ - 1525762 - CVE-2017-17449 kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity
  • BZ - 1525768 - CVE-2017-17448 kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure
  • BZ - 1531135 - CVE-2017-18017 kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c
  • BZ - 1531174 - CVE-2017-15129 kernel: net: double-free and memory corruption in get_net_ns_by_id()
  • BZ - 1534272 - md: raid0 device creation prints blank line to journalctl
  • BZ - 1535315 - CVE-2018-1000004 kernel: Race condition in sound system can lead to denial of service
  • BZ - 1539706 - CVE-2018-5750 kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass
  • BZ - 1542013 - RHEL-7.5: Cannot set port mirroring onto two interface
  • BZ - 1544612 - CVE-2018-6927 kernel: Integer overflow in futex.c:futux_requeue can lead to denial of service or unspecified impact
  • BZ - 1548412 - CVE-2017-13166 kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation
  • BZ - 1550811 - CVE-2017-18203 kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service

CVEs

References