Executive Summary
Summary | |
---|---|
Title | kernel-alt security and bug fix update |
Informations | |||
---|---|---|---|
Name | RHSA-2019:0831 | First vendor Publication | 2019-04-23 |
Vendor | RedHat | Last vendor Modification | 2019-04-23 |
Severity (Vendor) | N/A | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:P/I:P/A:C) | |||
---|---|---|---|
Cvss Base Score | 6.1 | Attack Range | Local |
Cvss Impact Score | 8.5 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: An update for kernel-alt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, noarch, ppc64le, s390x Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, noarch, ppc64le 3. Description: The kernel-alt packages provide the Linux kernel version 4.x. Security Fix(es): * kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms (CVE-2019-9213) * kernel: use-after-free in ucma_leave_multicast in drivers/infiniband/core/ucma.c (CVE-2018-14734) * kernel: Unprivileged users able to inspect kernel stacks of arbitrary tasks (CVE-2018-17972) * kernel: TLB flush happens too late on mremap (CVE-2018-18281) * kernel: Type confusion in drivers/tty/n_tty.c allows for a denial of service (CVE-2018-18386) * kernel: userfaultfd bypasses tmpfs file permissions (CVE-2018-18397) * kernel: Integer overflow in the alarm_timer_nsleep function (CVE-2018-13053) * kernel: NULL pointer dereference in xfs_da_shrink_inode function (CVE-2018-13094) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Failed to boot with ftrace=function in kvm with 2vcpu (BZ#1501024) * [ALT-7.5][x86_64] perf test 63 - inet_pton fails on x86_64 (BZ#1518836) * BUG: potential out-of-bounds string access when forcing a SELinux label on a file (BZ#1595706) * stack out-of-bounds in smb{2,3}_create_lease_buf() on SMB2/SMB3 mounts (BZ#1598757) * [ALT-7.6][KVM][PANIC] ltp/lite proc01 - Unable to handle kernel paging request at virtual address ffff7fe000200018 (BZ#1623193) * Kernel lock up due to read/write lock (BZ#1636261) * [RHEL-ALT] Fix potential Spectre v1 in tty code (BZ#1639679) * [Huawei AArch64 7.6 Bug] HNS3: Vlan on HNS3 NIC cannot communicate (BZ#1639713) * [RHEL7.6-ALT][AWS] backport "nvme: update timeout module parameter type" (BZ#1654958) * ignore STABLE_FLAG of rmap_item->address in rmap_walk_ksm (BZ#1663565) * RHEL-Alt-7.6 - kernel: zcrypt: fix specification exception on z196 at ap probe (BZ#1670018) * [Huawei AArch64 7.6 Bug] Flock over NFSv3 failed (BZ#1670650) * [Huawei AArch64 7.6/7.6-z Bug] HNS3: if a single transmit packet(skb) has more than 8 frags, will cause the NIC to be unavailable (BZ#1677643) * krb5{,i,p} doesn't work with older enctypes on aarch64 (BZ#1678922) Users of kernel are advised to upgrade to these updated packages, which fix these bugs. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1597747 - CVE-2018-13053 kernel: Integer overflow in the alarm_timer_nsleep function 1597771 - CVE-2018-13094 kernel: NULL pointer dereference in xfs_da_shrink_inode function 1611005 - CVE-2018-14734 kernel: use-after-free in ucma_leave_multicast in drivers/infiniband/core/ucma.c 1636349 - CVE-2018-17972 kernel: Unprivileged users able to inspect kernel stacks of arbitrary tasks 1640598 - CVE-2018-18386 kernel: Type confusion in drivers/tty/n_tty.c allows for a denial of service 1641548 - CVE-2018-18397 kernel: userfaultfd bypasses tmpfs file permissions 1645121 - CVE-2018-18281 kernel: TLB flush happens too late on mremap 1686136 - CVE-2019-9213 kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2019-0831.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
29 % | CWE-476 | NULL Pointer Dereference |
14 % | CWE-704 | Incorrect Type Conversion or Cast |
14 % | CWE-459 | Incomplete Cleanup |
14 % | CWE-416 | Use After Free |
14 % | CWE-362 | Race Condition |
14 % | CWE-190 | Integer Overflow or Wraparound (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2019-01-03 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2018-ec3bf1b228.nasl - Type : ACT_GATHER_INFO |
2019-01-03 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2018-ca0e10fc6e.nasl - Type : ACT_GATHER_INFO |
2019-01-03 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2018-9f4381d8c4.nasl - Type : ACT_GATHER_INFO |
2019-01-03 | Name : The remote Fedora host is missing a security update. File : fedora_2018-50075276e8.nasl - Type : ACT_GATHER_INFO |
2018-12-28 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2018-1433.nasl - Type : ACT_GATHER_INFO |
2018-12-28 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2018-1432.nasl - Type : ACT_GATHER_INFO |
2018-11-21 | Name : The remote EulerOS Virtualization host is missing a security update. File : EulerOS_SA-2018-1370.nasl - Type : ACT_GATHER_INFO |
2018-11-09 | Name : The remote Amazon Linux 2 host is missing a security update. File : al2_ALAS-2018-1100.nasl - Type : ACT_GATHER_INFO |
2018-11-08 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2018-1100.nasl - Type : ACT_GATHER_INFO |
2018-10-18 | Name : The remote PhotonOS host is missing multiple security updates. File : PhotonOS_PHSA-2018-2_0-0100.nasl - Type : ACT_GATHER_INFO |
2018-10-17 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2018-2ee3411cb8.nasl - Type : ACT_GATHER_INFO |
2018-10-04 | Name : The remote Debian host is missing a security update. File : debian_DLA-1531.nasl - Type : ACT_GATHER_INFO |
2018-10-02 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-4308.nasl - Type : ACT_GATHER_INFO |
2018-09-21 | Name : The remote PhotonOS host is missing multiple security updates. File : PhotonOS_PHSA-2018-1_0-0184.nasl - Type : ACT_GATHER_INFO |
2018-08-10 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2018-2f6df9abfb.nasl - Type : ACT_GATHER_INFO |
2018-08-07 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2018-1048.nasl - Type : ACT_GATHER_INFO |
2018-08-07 | Name : The remote Amazon Linux 2 host is missing a security update. File : al2_ALAS-2018-1051.nasl - Type : ACT_GATHER_INFO |
2018-07-24 | Name : The remote Fedora host is missing a security update. File : fedora_2018-8484550fff.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2020-03-19 13:18:10 |
|