Important: kernel security, bug fix, and enhancement update

Related Vulnerabilities: CVE-2018-5391   CVE-2017-18344   CVE-2018-8781   CVE-2018-10902   CVE-2018-13405   CVE-2015-8830   CVE-2017-0861   CVE-2017-10661   CVE-2017-17805   CVE-2017-18208   CVE-2018-1120   CVE-2018-1130   CVE-2018-5344   CVE-2018-5803   CVE-2018-5848   CVE-2018-10878   CVE-2018-1000026   CVE-2016-4913   CVE-2017-18232   CVE-2018-1092   CVE-2018-1094   CVE-2018-1118   CVE-2018-7740   CVE-2018-7757   CVE-2018-10322   CVE-2018-10879   CVE-2018-10881   CVE-2018-10883   CVE-2018-10940   CVE-2015-8830   CVE-2016-4913   CVE-2017-10661   CVE-2017-17805   CVE-2018-5344   CVE-2018-1000026   CVE-2018-5803   CVE-2017-18208   CVE-2018-7740   CVE-2018-7757   CVE-2017-18232   CVE-2018-1092   CVE-2018-1094   CVE-2017-0861   CVE-2018-8781   CVE-2018-10322   CVE-2018-1118   CVE-2018-1120   CVE-2018-1130   CVE-2018-10940   CVE-2018-10902   CVE-2018-5848   CVE-2018-10878   CVE-2018-10879   CVE-2018-10881   CVE-2018-10883   CVE-2018-13405   CVE-2018-5391   CVE-2017-18344   CVE-2015-8830   CVE-2016-4913   CVE-2017-0861   CVE-2017-10661   CVE-2017-17805   CVE-2017-18208   CVE-2017-18232   CVE-2017-18344   CVE-2018-1092   CVE-2018-1094   CVE-2018-1118   CVE-2018-1120   CVE-2018-1130   CVE-2018-5344   CVE-2018-5391   CVE-2018-5803   CVE-2018-5848   CVE-2018-7740   CVE-2018-7757   CVE-2018-8781   CVE-2018-10322   CVE-2018-10878   CVE-2018-10879   CVE-2018-10881   CVE-2018-10883   CVE-2018-10902   CVE-2018-10940   CVE-2018-13405   CVE-2018-18690   CVE-2018-1000026  

Synopsis

Important: kernel security, bug fix, and enhancement update

Type/Severity

Security Advisory: Important

Topic

An update for kernel is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)
  • kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c (CVE-2017-18344)
  • kernel: Integer overflow in udl_fb_mmap() can allow attackers to execute code in kernel space (CVE-2018-8781)
  • kernel: MIDI driver race condition leads to a double-free (CVE-2018-10902)
  • kernel: Missing check in inode_init_owner() does not clear SGID bit on non-directories for non-members (CVE-2018-13405)
  • kernel: AIO write triggers integer overflow in some protocols (CVE-2015-8830)
  • kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation (CVE-2017-0861)
  • kernel: Handling of might_cancel queueing is not properly pretected against race (CVE-2017-10661)
  • kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial of service (CVE-2017-17805)
  • kernel: Inifinite loop vulnerability in madvise_willneed() function allows local denial of service (CVE-2017-18208)
  • kernel: fuse-backed file mmap-ed onto process cmdline arguments causes denial of service (CVE-2018-1120)
  • kernel: a null pointer dereference in dccp_write_xmit() leads to a system crash (CVE-2018-1130)
  • kernel: drivers/block/loop.c mishandles lo_release serialization allowing denial of service (CVE-2018-5344)
  • kernel: Missing length check of payload in _sctp_make_chunk() function allows denial of service (CVE-2018-5803)
  • kernel: buffer overflow in drivers/net/wireless/ath/wil6210/wmi.c:wmi_set_ie() may lead to memory corruption (CVE-2018-5848)
  • kernel: out-of-bound write in ext4_init_block_bitmap function with a crafted ext4 image (CVE-2018-10878)
  • kernel: Improper validation in bnx2x network card driver can allow for denial of service attacks via crafted packet (CVE-2018-1000026)
  • kernel: Information leak when handling NM entries containing NUL (CVE-2016-4913)
  • kernel: Mishandling mutex within libsas allowing local Denial of Service (CVE-2017-18232)
  • kernel: NULL pointer dereference in ext4_process_freed_data() when mounting crafted ext4 image (CVE-2018-1092)
  • kernel: NULL pointer dereference in ext4_xattr_inode_hash() causes crash with crafted ext4 image (CVE-2018-1094)
  • kernel: vhost: Information disclosure in vhost/vhost.c:vhost_new_msg() (CVE-2018-1118)
  • kernel: Denial of service in resv_map_release function in mm/hugetlb.c (CVE-2018-7740)
  • kernel: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c (CVE-2018-7757)
  • kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service (CVE-2018-10322)
  • kernel: use-after-free detected in ext4_xattr_set_entry with a crafted file (CVE-2018-10879)
  • kernel: out-of-bound access in ext4_get_group_info() when mounting and operating a crafted ext4 image (CVE-2018-10881)
  • kernel: stack-out-of-bounds write in jbd2_journal_dirty_metadata function (CVE-2018-10883)
  • kernel: incorrect memory bounds check in drivers/cdrom/cdrom.c (CVE-2018-10940)

Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5391; Trend Micro Zero Day Initiative for reporting CVE-2018-10902; Qualys Research Labs for reporting CVE-2018-1120; Evgenii Shatokhin (Virtuozzo Team) for reporting CVE-2018-1130; and Wen Xu for reporting CVE-2018-1092 and CVE-2018-1094.

Solution

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server 7 x86_64
  • Red Hat Enterprise Linux Workstation 7 x86_64
  • Red Hat Enterprise Linux Desktop 7 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 7 s390x
  • Red Hat Enterprise Linux for Power, big endian 7 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 7 x86_64
  • Red Hat Enterprise Linux for Power, little endian 7 ppc64le
  • Red Hat Virtualization Host 4 x86_64
  • Red Hat Enterprise Linux for ARM 64 7 aarch64
  • Red Hat Enterprise Linux for Power 9 7 ppc64le
  • Red Hat Enterprise Linux for IBM System z (Structure A) 7 s390x

Fixes

  • BZ - 1314275 - CVE-2015-8830 kernel: AIO write triggers integer overflow in some protocols
  • BZ - 1322930 - [RFE] Allow xfs to modify labels on mounted filesystem
  • BZ - 1337528 - CVE-2016-4913 kernel: Information leak when handling NM entries containing NUL
  • BZ - 1481136 - CVE-2017-10661 kernel: Handling of might_cancel queueing is not properly pretected against race
  • BZ - 1488484 - GRE: IFLA_MTU ignored on NEWLINK
  • BZ - 1504058 - kernel panic with nfsd while removing locks on file close
  • BZ - 1507027 - [ESXi][RHEL7.6]x86/vmware: Add paravirt sched clock
  • BZ - 1528312 - CVE-2017-17805 kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service
  • BZ - 1533909 - CVE-2018-5344 kernel: drivers/block/loop.c mishandles lo_release serialization allowing denial-of-service
  • BZ - 1541846 - CVE-2018-1000026 kernel: Improper validation in bnx2x network card driver can allow for denial of service attacks via crafted packet
  • BZ - 1542494 - VMs with NVMe devices passed through sometimes fail to be launched
  • BZ - 1551051 - CVE-2018-5803 kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service
  • BZ - 1551565 - CVE-2017-18208 kernel: Inifinite loop vulnerability in mm/madvise.c:madvise_willneed() function allows local denial of service
  • BZ - 1552867 - CVE-2018-7740 kernel: Denial of service in resv_map_release function in mm/hugetlb.c
  • BZ - 1553361 - CVE-2018-7757 kernel: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c
  • BZ - 1557434 - bio too big device md0 (1024 > 256)
  • BZ - 1557599 - [RFE] Rebase ipset (kernel) to latest upstream
  • BZ - 1558066 - CVE-2017-18232 kernel: Mishandling mutex within libsas allowing local Denial of Service
  • BZ - 1558328 - Kernel data path test with OVS 2.9 + DPDK 17.11 fails with low throughput
  • BZ - 1560777 - CVE-2018-1092 kernel: NULL pointer dereference in ext4/mballoc.c:ext4_process_freed_data() when mounting crafted ext4 image
  • BZ - 1560788 - CVE-2018-1094 kernel: NULL pointer dereference in ext4/xattr.c:ext4_xattr_inode_hash() causes crash with crafted ext4 image
  • BZ - 1561162 - [RHEL7.5] Extreme performance impact caused by raid resync
  • BZ - 1563697 - Triming on full pool can trigger 'dm_pool_alloc_data_block' failed: error = -28
  • BZ - 1563994 - CVE-2017-0861 kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation
  • BZ - 1564186 - XFS may block endlessly in xlog_wait() on IO error
  • BZ - 1568167 - crypto aesni-intel aes(gcm) is broken for IPsec
  • BZ - 1571062 - CVE-2018-8781 kernel: Integer overflow in drivers/gpu/drm/udl/udl_fb.c:udl_fb_mmap() can allow attackers to execute code in kernel space
  • BZ - 1571623 - CVE-2018-10322 kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service
  • BZ - 1572983 - conntrack doesn't track packets in specific network namespace if those packets were processed by CT --notrack target in other network namespace
  • BZ - 1573699 - CVE-2018-1118 kernel: vhost: Information disclosure in vhost/vhost.c:vhost_new_msg()
  • BZ - 1575472 - CVE-2018-1120 kernel: fuse-backed file mmap-ed onto process cmdline arguments causes denial of service
  • BZ - 1576419 - CVE-2018-1130 kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash
  • BZ - 1577408 - CVE-2018-10940 kernel: incorrect memory bounds check in drivers/cdrom/cdrom.c
  • BZ - 1584775 - VMs hung after migration
  • BZ - 1590720 - CVE-2018-10902 kernel: MIDI driver race condition leads to a double-free
  • BZ - 1590799 - CVE-2018-5848 kernel: buffer overflow in drivers/net/wireless/ath/wil6210/wmi.c:wmi_set_ie() may lead to memory corruption
  • BZ - 1592654 - [NVMe Device Assignment] Guest reboot failed from the NVMe assigned which os installed on
  • BZ - 1596802 - CVE-2018-10878 kernel: out-of-bound write in ext4_init_block_bitmap function with a crafted ext4 image
  • BZ - 1596806 - CVE-2018-10879 kernel: use-after-free detected in ext4_xattr_set_entry with a crafted file
  • BZ - 1596828 - CVE-2018-10881 kernel: out-of-bound access in ext4_get_group_info() when mounting and operating a crafted ext4 image
  • BZ - 1596846 - CVE-2018-10883 kernel: stack-out-of-bounds write in jbd2_journal_dirty_metadata function
  • BZ - 1599161 - CVE-2018-13405 kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members
  • BZ - 1609664 - CVE-2018-5391 kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)
  • BZ - 1609717 - [unwinder] CPU spins indefinitely in __save_stack_trace() call chain
  • BZ - 1610958 - CVE-2017-18344 kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c

CVEs

References