Moderate: kernel security, bug fix, and enhancement update

Related Vulnerabilities: CVE-2019-9458   CVE-2019-15917   CVE-2019-15925   CVE-2019-18808   CVE-2019-19046   CVE-2019-19319   CVE-2019-19332   CVE-2019-19447   CVE-2019-19524   CVE-2019-19537   CVE-2019-19543   CVE-2019-19767   CVE-2019-19770   CVE-2019-20636   CVE-2020-0305   CVE-2020-8647   CVE-2020-8648   CVE-2020-8649   CVE-2020-10732   CVE-2020-10751   CVE-2020-11565   CVE-2020-11668   CVE-2020-12465   CVE-2020-12659   CVE-2020-12770   CVE-2020-12826   CVE-2020-14381   CVE-2020-25641   CVE-2019-9455   CVE-2019-12614   CVE-2019-16231   CVE-2019-16233   CVE-2019-18809   CVE-2019-19056   CVE-2019-19062   CVE-2019-19063   CVE-2019-19068   CVE-2019-19072   CVE-2019-19533   CVE-2019-20054   CVE-2020-10773   CVE-2020-10774   CVE-2020-10942   CVE-2019-12614   CVE-2019-15925   CVE-2019-15917   CVE-2019-16231   CVE-2019-16233   CVE-2019-19072   CVE-2019-19068   CVE-2019-19046   CVE-2019-19063   CVE-2019-19062   CVE-2019-19056   CVE-2019-18808   CVE-2019-18809   CVE-2019-19332   CVE-2019-19447   CVE-2019-19543   CVE-2019-19524   CVE-2019-19533   CVE-2019-19537   CVE-2019-19319   CVE-2019-19767   CVE-2019-19770   CVE-2019-20054   CVE-2020-8649   CVE-2020-8648   CVE-2020-8647   CVE-2020-10942   CVE-2019-9458   CVE-2019-9455   CVE-2020-12826   CVE-2019-20636   CVE-2020-11668   CVE-2020-11565   CVE-2020-10732   CVE-2020-12465   CVE-2020-12655   CVE-2020-12659   CVE-2020-12770   CVE-2020-10751   CVE-2020-10773   CVE-2020-10774   CVE-2020-0305   CVE-2020-14381   CVE-2020-25641   CVE-2019-9455   CVE-2019-9458   CVE-2019-12614   CVE-2019-15917   CVE-2019-15925   CVE-2019-16231   CVE-2019-16233   CVE-2019-18808   CVE-2019-18809   CVE-2019-19046   CVE-2019-19056   CVE-2019-19062   CVE-2019-19063   CVE-2019-19068   CVE-2019-19072   CVE-2019-19319   CVE-2019-19332   CVE-2019-19447   CVE-2019-19524   CVE-2019-19533   CVE-2019-19537   CVE-2019-19543   CVE-2019-19767   CVE-2019-19770   CVE-2019-20054   CVE-2019-20636   CVE-2020-0305   CVE-2020-8647   CVE-2020-8648   CVE-2020-8649   CVE-2020-10732   CVE-2020-10751   CVE-2020-10773   CVE-2020-10774   CVE-2020-10942   CVE-2020-11565   CVE-2020-11668   CVE-2020-12465   CVE-2020-12655   CVE-2020-12659   CVE-2020-12770   CVE-2020-12826   CVE-2020-14381   CVE-2020-25641  

Synopsis

Moderate: kernel security, bug fix, and enhancement update

Type/Severity

Security Advisory: Moderate

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: use after free in the video driver leads to local privilege escalation (CVE-2019-9458)
  • kernel: use-after-free in drivers/bluetooth/hci_ldisc.c (CVE-2019-15917)
  • kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg (CVE-2019-15925)
  • kernel: memory leak in ccp_run_sha_cmd() (CVE-2019-18808)
  • kernel: Denial Of Service in the __ipmi_bmc_register() (CVE-2019-19046)
  • kernel: out-of-bounds write in ext4_xattr_set_entry (CVE-2019-19319)
  • Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid (CVE-2019-19332)
  • kernel: use-after-free in ext4_put_super (CVE-2019-19447)
  • kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free (CVE-2019-19524)
  • kernel: race condition caused by a malicious USB device in the USB character device driver layer (CVE-2019-19537)
  • kernel: use-after-free in serial_ir_init_module() (CVE-2019-19543)
  • kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry (CVE-2019-19767)
  • kernel: use-after-free in debugfs_remove (CVE-2019-19770)
  • kernel: out-of-bounds write via crafted keycode table (CVE-2019-20636)
  • kernel: possible use-after-free due to a race condition in cdev_get (CVE-2020-0305)
  • kernel: out-of-bounds read in in vc_do_resize function (CVE-2020-8647)
  • kernel: use-after-free in n_tty_receive_buf_common function (CVE-2020-8648)
  • kernel: invalid read location in vgacon_invert_region function (CVE-2020-8649)
  • kernel: uninitialized kernel data leak in userspace coredumps (CVE-2020-10732)
  • kernel: SELinux netlink permission check bypass (CVE-2020-10751)
  • kernel: out-of-bounds write in mpol_parse_str (CVE-2020-11565)
  • kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)
  • kernel: buffer overflow in mt76_add_fragment function (CVE-2020-12465)
  • kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption (CVE-2020-12659)
  • kernel: sg_write function lacks an sg_remove_request call in a certain failure case (CVE-2020-12770)
  • kernel: possible to send arbitrary signals to a privileged (suidroot) parent process (CVE-2020-12826)
  • kernel: referencing inode of removed superblock in get_futex_key() causes UAF (CVE-2020-14381)
  • kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)
  • kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure (CVE-2019-9455)
  • kernel: null pointer dereference in dlpar_parse_cc_property (CVE-2019-12614)
  • kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c (CVE-2019-16231)
  • kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c (CVE-2019-16233)
  • kernel: memory leak in af9005_identify_state() function (CVE-2019-18809)
  • kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function (CVE-2019-19056)
  • kernel: memory leak in the crypto_report() function (CVE-2019-19062)
  • kernel: Two memory leaks in the rtl_usb_probe() function (CVE-2019-19063)
  • kernel: A memory leak in the rtl8xxxu_submit_int_urb() function (CVE-2019-19068)
  • kernel: A memory leak in the predicate_parse() function (CVE-2019-19072)
  • kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c (CVE-2019-19533)
  • kernel: Null pointer dereference in drop_sysctl_table() (CVE-2019-20054)
  • kernel: kernel stack information leak on s390/s390x (CVE-2020-10773)
  • kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features (CVE-2020-10774)
  • kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field (CVE-2020-10942)
  • kernel: sync of excessive duration via an XFS v5 image with crafted metadata (CVE-2020-12655)

Solution

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for ARM 64 8 aarch64
  • Red Hat CodeReady Linux Builder for x86_64 8 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 8 aarch64

Fixes

  • BZ - 1660798 - NFSv4.2: security label of mount point shows as "unlabeled_t" for ~30 seconds after mounting
  • BZ - 1718176 - CVE-2019-12614 kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service
  • BZ - 1759052 - CVE-2019-15925 kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg
  • BZ - 1760100 - CVE-2019-15917 kernel: use-after-free in drivers/bluetooth/hci_ldisc.c
  • BZ - 1760310 - CVE-2019-16231 kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c
  • BZ - 1760420 - CVE-2019-16233 kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c
  • BZ - 1774946 - CVE-2019-19072 kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS
  • BZ - 1774963 - CVE-2019-19068 kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS
  • BZ - 1774988 - CVE-2019-19046 kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c
  • BZ - 1775015 - CVE-2019-19063 kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS
  • BZ - 1775021 - CVE-2019-19062 kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS
  • BZ - 1775097 - CVE-2019-19056 kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS
  • BZ - 1777418 - CVE-2019-18808 kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c
  • BZ - 1777449 - CVE-2019-18809 kernel: memory leak in af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c
  • BZ - 1778762 - Please backport Jitter Entropy patches
  • BZ - 1779594 - CVE-2019-19332 Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid
  • BZ - 1781679 - CVE-2019-19447 kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c
  • BZ - 1781810 - CVE-2019-19543 kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c
  • BZ - 1783459 - CVE-2019-19524 kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free
  • BZ - 1783534 - CVE-2019-19533 kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c
  • BZ - 1783561 - CVE-2019-19537 kernel: race condition caused by a malicious USB device in the USB character device driver layer
  • BZ - 1784130 - CVE-2019-19319 kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c
  • BZ - 1786160 - CVE-2019-19767 kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c
  • BZ - 1786179 - CVE-2019-19770 kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c
  • BZ - 1790063 - CVE-2019-20054 kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c
  • BZ - 1802555 - CVE-2020-8649 kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c
  • BZ - 1802559 - CVE-2020-8648 kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c
  • BZ - 1802563 - CVE-2020-8647 kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c
  • BZ - 1817718 - CVE-2020-10942 kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field
  • BZ - 1819377 - CVE-2019-9458 kernel: use after free due to race condition in the video driver leads to local privilege escalation
  • BZ - 1819399 - CVE-2019-9455 kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure
  • BZ - 1820402 - Sometimes hit "error: kvm run failed Bad address" when launching a guest on Power8
  • BZ - 1822077 - CVE-2020-12826 kernel: possible to send arbitrary signals to a privileged (suidroot) parent process
  • BZ - 1823764 - RFE: Enable genfs+xattr labeling for CephFS
  • BZ - 1824059 - CVE-2019-20636 kernel: out-of-bounds write via crafted keycode table
  • BZ - 1824792 - CVE-2020-11668 kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c
  • BZ - 1824918 - CVE-2020-11565 kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c
  • BZ - 1830280 - Please enable CONFIG_RANDOM_TRUST_CPU
  • BZ - 1831399 - CVE-2020-10732 kernel: uninitialized kernel data leak in userspace coredumps
  • BZ - 1831699 - CVE-2020-12465 kernel: buffer overflow in mt76_add_fragment function in drivers/net/wireless/mediatek/mt76/dma.c
  • BZ - 1832543 - CVE-2020-12655 kernel: sync of excessive duration via an XFS v5 image with crafted metadata
  • BZ - 1832876 - CVE-2020-12659 kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption
  • BZ - 1834845 - CVE-2020-12770 kernel: sg_write function lacks an sg_remove_request call in a certain failure case
  • BZ - 1839634 - CVE-2020-10751 kernel: SELinux netlink permission check bypass
  • BZ - 1844520 - Incorrect pinning of IRQ threads on isolated CPUs by drivers that use cpumask_local_spread()
  • BZ - 1846380 - CVE-2020-10773 kernel: kernel stack information leak on s390/s390x
  • BZ - 1846964 - CVE-2020-10774 kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features
  • BZ - 1853447 - Guest IA32_SPEC_CTRL wrmsr failure on AMD processors that support STIBP but don't support for IBRS
  • BZ - 1856588 - Guest crashed and hung when hot unplug vcpus
  • BZ - 1860065 - CVE-2020-0305 kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c
  • BZ - 1874311 - CVE-2020-14381 kernel: referencing inode of removed superblock in get_futex_key() causes UAF
  • BZ - 1881424 - CVE-2020-25641 kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS

CVEs

References