VARIoT IoT vulnerabilities database
| VAR-201907-1641 | CVE-2019-13272 | Linux Kernel Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments. Linux Kernel Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. 8) - aarch64, noarch, ppc64le, s390x, x86_64
3. 8) - x86_64
3. =========================================================================
Ubuntu Security Notice USN-4094-1
August 13, 2019
linux, linux-hwe, linux-azure, linux-gcp, linux-gke-4.15, linux-kvm,
linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke-4.15: Linux kernel for Google Container Engine (GKE) systems
- linux-kvm: Linux kernel for cloud environments
- linux-oem: Linux kernel for OEM processors
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi2: Linux kernel for Raspberry Pi 2
- linux-snapdragon: Linux kernel for Snapdragon processors
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-hwe: Linux hardware enablement (HWE) kernel
Details:
It was discovered that the alarmtimer implementation in the Linux kernel
contained an integer overflow vulnerability. A local attacker could use
this to cause a denial of service. (CVE-2018-13053)
Wen Xu discovered that the XFS filesystem implementation in the Linux
kernel did not properly track inode validations. An attacker could use this
to construct a malicious XFS image that, when mounted, could cause a denial
of service (system crash). (CVE-2018-13093)
Wen Xu discovered that the f2fs file system implementation in the
Linux kernel did not properly validate metadata. An attacker could
use this to construct a malicious f2fs image that, when mounted,
could cause a denial of service (system crash). (CVE-2018-13097,
CVE-2018-13099, CVE-2018-13100, CVE-2018-14614, CVE-2018-14616,
CVE-2018-13096, CVE-2018-13098, CVE-2018-14615)
Wen Xu and Po-Ning Tseng discovered that btrfs file system
implementation in the Linux kernel did not properly validate
metadata. An attacker could use this to construct a malicious
btrfs image that, when mounted, could cause a denial of service
(system crash). (CVE-2018-14610, CVE-2018-14611, CVE-2018-14612,
CVE-2018-14613, CVE-2018-14609)
Wen Xu discovered that the HFS+ filesystem implementation in the Linux
kernel did not properly handle malformed catalog data in some situations.
An attacker could use this to construct a malicious HFS+ image that, when
mounted, could cause a denial of service (system crash). (CVE-2018-14617)
Vasily Averin and Pavel Tikhomirov discovered that the cleancache subsystem
of the Linux kernel did not properly initialize new files in some
situations. A local attacker could use this to expose sensitive
information. (CVE-2018-16862)
Hui Peng and Mathias Payer discovered that the USB subsystem in the Linux
kernel did not properly handle size checks when handling an extra USB
descriptor. A physically proximate attacker could use this to cause a
denial of service (system crash). (CVE-2018-20169)
It was discovered that a use-after-free error existed in the block layer
subsystem of the Linux kernel when certain failure conditions occurred. A
local attacker could possibly use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2018-20856)
Eli Biham and Lior Neumann discovered that the Bluetooth implementation in
the Linux kernel did not properly validate elliptic curve parameters during
Diffie-Hellman key exchange in some situations. An attacker could use this
to expose sensitive information. (CVE-2018-5383)
It was discovered that a heap buffer overflow existed in the Marvell
Wireless LAN device driver for the Linux kernel. An attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2019-10126)
Andrei Vlad Lutas and Dan Lutas discovered that some x86 processors
incorrectly handle SWAPGS instructions during speculative execution. A
local attacker could use this to expose sensitive information (kernel
memory). (CVE-2019-1125)
It was discovered that the PowerPC dlpar implementation in the Linux kernel
did not properly check for allocation errors in some situations. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2019-12614)
It was discovered that a NULL pointer dereference vulnerabilty existed in
the Near-field communication (NFC) implementation in the Linux kernel. An
attacker could use this to cause a denial of service (system crash).
(CVE-2019-12818)
It was discovered that the MDIO bus devices subsystem in the Linux kernel
improperly dropped a device reference in an error condition, leading to a
use-after-free. An attacker could use this to cause a denial of service
(system crash). (CVE-2019-12819)
It was discovered that a NULL pointer dereference vulnerability existed in
the Near-field communication (NFC) implementation in the Linux kernel. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2019-12984)
Jann Horn discovered a use-after-free vulnerability in the Linux kernel
when accessing LDT entries in some situations. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2019-13233)
Jann Horn discovered that the ptrace implementation in the Linux kernel did
not properly record credentials in some situations. A local attacker could
use this to cause a denial of service (system crash) or possibly gain
administrative privileges. (CVE-2019-13272)
It was discovered that the Empia EM28xx DVB USB device driver
implementation in the Linux kernel contained a use-after-free vulnerability
when disconnecting the device. An attacker could use this to cause a denial
of service (system crash). (CVE-2019-2024)
It was discovered that the USB video device class implementation in the
Linux kernel did not properly validate control bits, resulting in an out of
bounds buffer read. A local attacker could use this to possibly expose
sensitive information (kernel memory). (CVE-2019-2101)
It was discovered that the Marvell Wireless LAN device driver in the Linux
kernel did not properly validate the BSS descriptor. A local attacker could
possibly use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2019-3846)
It was discovered that the Appletalk IP encapsulation driver in the Linux
kernel did not properly prevent kernel addresses from being copied to user
space. A local attacker with the CAP_NET_ADMIN capability could use this to
expose sensitive information. (CVE-2018-20511)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
linux-image-4.15.0-1021-oracle 4.15.0-1021.23
linux-image-4.15.0-1040-gcp 4.15.0-1040.42
linux-image-4.15.0-1040-gke 4.15.0-1040.42
linux-image-4.15.0-1042-kvm 4.15.0-1042.42
linux-image-4.15.0-1043-raspi2 4.15.0-1043.46
linux-image-4.15.0-1050-oem 4.15.0-1050.57
linux-image-4.15.0-1060-snapdragon 4.15.0-1060.66
linux-image-4.15.0-58-generic 4.15.0-58.64
linux-image-4.15.0-58-generic-lpae 4.15.0-58.64
linux-image-4.15.0-58-lowlatency 4.15.0-58.64
linux-image-gcp 4.15.0.1040.42
linux-image-generic 4.15.0.58.60
linux-image-generic-lpae 4.15.0.58.60
linux-image-gke 4.15.0.1040.43
linux-image-gke-4.15 4.15.0.1040.43
linux-image-kvm 4.15.0.1042.42
linux-image-lowlatency 4.15.0.58.60
linux-image-oem 4.15.0.1050.54
linux-image-oracle 4.15.0.1021.24
linux-image-powerpc-e500mc 4.15.0.58.60
linux-image-powerpc-smp 4.15.0.58.60
linux-image-powerpc64-emb 4.15.0.58.60
linux-image-powerpc64-smp 4.15.0.58.60
linux-image-raspi2 4.15.0.1043.41
linux-image-snapdragon 4.15.0.1060.63
linux-image-virtual 4.15.0.58.60
Ubuntu 16.04 LTS:
linux-image-4.15.0-1021-oracle 4.15.0-1021.23~16.04.1
linux-image-4.15.0-1040-gcp 4.15.0-1040.42~16.04.1
linux-image-4.15.0-1055-azure 4.15.0-1055.60
linux-image-4.15.0-58-generic 4.15.0-58.64~16.04.1
linux-image-4.15.0-58-generic-lpae 4.15.0-58.64~16.04.1
linux-image-4.15.0-58-lowlatency 4.15.0-58.64~16.04.1
linux-image-azure 4.15.0.1055.58
linux-image-gcp 4.15.0.1040.54
linux-image-generic-hwe-16.04 4.15.0.58.79
linux-image-generic-lpae-hwe-16.04 4.15.0.58.79
linux-image-gke 4.15.0.1040.54
linux-image-lowlatency-hwe-16.04 4.15.0.58.79
linux-image-oem 4.15.0.58.79
linux-image-oracle 4.15.0.1021.15
linux-image-virtual-hwe-16.04 4.15.0.58.79
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://usn.ubuntu.com/4094-1
CVE-2018-13053, CVE-2018-13093, CVE-2018-13096, CVE-2018-13097,
CVE-2018-13098, CVE-2018-13099, CVE-2018-13100, CVE-2018-14609,
CVE-2018-14610, CVE-2018-14611, CVE-2018-14612, CVE-2018-14613,
CVE-2018-14614, CVE-2018-14615, CVE-2018-14616, CVE-2018-14617,
CVE-2018-16862, CVE-2018-20169, CVE-2018-20511, CVE-2018-20856,
CVE-2018-5383, CVE-2019-10126, CVE-2019-1125, CVE-2019-12614,
CVE-2019-12818, CVE-2019-12819, CVE-2019-12984, CVE-2019-13233,
CVE-2019-13272, CVE-2019-2024, CVE-2019-2101, CVE-2019-3846
Package Information:
https://launchpad.net/ubuntu/+source/linux/4.15.0-58.64
https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1040.42
https://launchpad.net/ubuntu/+source/linux-gke-4.15/4.15.0-1040.42
https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1042.42
https://launchpad.net/ubuntu/+source/linux-oem/4.15.0-1050.57
https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1021.23
https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1043.46
https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1060.66
https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1055.60
https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1040.42~16.04.1
https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-58.64~16.04.1
https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1021.23~16.04.1
.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
[slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)
New kernel packages are available for Slackware 14.2 to fix security issues.
Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/linux-4.4.182/*: Upgraded.
These updates fix various bugs and many minor security issues.
Be sure to upgrade your initrd after upgrading the kernel packages.
If you use lilo to boot your machine, be sure lilo.conf points to the correct
kernel and initrd and run lilo as root to update the bootloader.
If you use elilo to boot your machine, you should run eliloconfig to copy the
kernel and initrd to the EFI System Partition.
For more information, see:
Fixed in 4.4.183:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3892
Fixed in 4.4.185:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16597
Fixed in 4.4.186:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated packages for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-firmware-20190717_bf13a71-noarch-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-generic-4.4.186-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-generic-smp-4.4.186_smp-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-headers-4.4.186_smp-x86-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-huge-4.4.186-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-huge-smp-4.4.186_smp-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-modules-4.4.186-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-modules-smp-4.4.186_smp-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-source-4.4.186_smp-noarch-1.txz
Updated packages for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware66-14.2/patches/packages/linux-4.4.186/kernel-firmware-20190717_bf13a71-noarch-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware66-14.2/patches/packages/linux-4.4.186/kernel-generic-4.4.186-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware66-14.2/patches/packages/linux-4.4.186/kernel-headers-4.4.186-x86-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware66-14.2/patches/packages/linux-4.4.186/kernel-huge-4.4.186-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware66-14.2/patches/packages/linux-4.4.186/kernel-modules-4.4.186-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware66-14.2/patches/packages/linux-4.4.186/kernel-source-4.4.186-noarch-1.txz
MD5 signatures:
+-------------+
Slackware 14.2 packages:
01138ebc336b6e6d692697570bb32920 kernel-firmware-20190717_bf13a71-noarch-1.txz
d7e0b9ffdc4265b45d4de39d49d52616 kernel-generic-4.4.186-i586-1.txz
c1131f8dd16f7113cc8b1e14c402a9b7 kernel-generic-smp-4.4.186_smp-i686-1.txz
ca4630c4ee7056c51f3262152bfb9213 kernel-headers-4.4.186_smp-x86-1.txz
61b95e68756fe9741ddbdc52f397fe49 kernel-huge-4.4.186-i586-1.txz
ff981138513726a502d57f9e2aecad36 kernel-huge-smp-4.4.186_smp-i686-1.txz
ca8f6fb5fc378d16e5afcee31dd032dc kernel-modules-4.4.186-i586-1.txz
25fc2f1280f1a706705ef4535f4efd1c kernel-modules-smp-4.4.186_smp-i686-1.txz
2d299723d6f910df1e8c21d18070b9ef kernel-source-4.4.186_smp-noarch-1.txz
Slackware x86_64 14.2 packages:
01138ebc336b6e6d692697570bb32920 kernel-firmware-20190717_bf13a71-noarch-1.txz
80caffb238022225afe93b957fecbff2 kernel-generic-4.4.186-x86_64-1.txz
f72e4543e3489d18604f33a901e04551 kernel-headers-4.4.186-x86-1.txz
0765db332a94cfedcacd987871903e56 kernel-huge-4.4.186-x86_64-1.txz
8d565a7b223b9444731796e6147116eb kernel-modules-4.4.186-x86_64-1.txz
0254fdbb4430362ea373b47584d8eb30 kernel-source-4.4.186-noarch-1.txz
Installation instructions:
+------------------------+
Upgrade the packages as root:
# upgradepkg kernel-*.txz
If you are using an initrd, you'll need to rebuild it.
For a 32-bit SMP machine, use this command (substitute the appropriate
kernel version if you are not running Slackware 14.2):
# /usr/share/mkinitrd/mkinitrd_command_generator.sh -k 4.4.186-smp | bash
For a 64-bit machine, or a 32-bit uniprocessor machine, use this command
(substitute the appropriate kernel version if you are not running
Slackware 14.2):
# /usr/share/mkinitrd/mkinitrd_command_generator.sh -k 4.4.186 | bash
Please note that "uniprocessor" has to do with the kernel you are running,
not with the CPU. Most systems should run the SMP kernel (if they can)
regardless of the number of cores the CPU has. If you aren't sure which
kernel you are running, run "uname -a". If you see SMP there, you are
running the SMP kernel and should use the 4.4.186-smp version when running
mkinitrd_command_generator. Note that this is only for 32-bit -- 64-bit
systems should always use 4.4.186 as the version.
If you are using lilo or elilo to boot the machine, you'll need to ensure
that the machine is properly prepared before rebooting.
If using LILO:
By default, lilo.conf contains an image= line that references a symlink
that always points to the correct kernel. No editing should be required
unless your machine uses a custom lilo.conf. If that is the case, be sure
that the image= line references the correct kernel file. Either way,
you'll need to run "lilo" as root to reinstall the boot loader.
If using elilo:
Ensure that the /boot/vmlinuz symlink is pointing to the kernel you wish
to use, and then run eliloconfig to update the EFI System Partition.
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. (CVE-2019-13272)
Update instructions:
The problem can be corrected by updating your livepatches to the following
versions:
| Kernel | Version | flavors |
|--------------------------+----------+--------------------------|
| 4.4.0-148.174 | 54.1 | lowlatency, generic |
| 4.4.0-150.176 | 54.1 | generic, lowlatency |
| 4.4.0-151.178 | 54.1 | lowlatency, generic |
| 4.4.0-154.181 | 54.1 | lowlatency, generic |
| 4.4.0-157.185 | 54.1 | lowlatency, generic |
| 4.15.0-50.54 | 54.2 | generic, lowlatency |
| 4.15.0-50.54~16.04.1 | 54.2 | generic, lowlatency |
| 4.15.0-51.55 | 54.2 | generic, lowlatency |
| 4.15.0-51.55~16.04.1 | 54.2 | generic, lowlatency |
| 4.15.0-52.56 | 54.2 | lowlatency, generic |
| 4.15.0-52.56~16.04.1 | 54.2 | generic, lowlatency |
| 4.15.0-54.58 | 54.2 | generic, lowlatency |
| 4.15.0-54.58~16.04.1 | 54.2 | generic, lowlatency |
| 4.15.0-55.60 | 54.2 | generic, lowlatency |
References:
CVE-2018-1129, CVE-2019-2101, CVE-2019-3846, CVE-2019-10126,
CVE-2019-12614, CVE-2019-12818, CVE-2019-12819, CVE-2019-12984,
CVE-2019-13272
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel-alt security, bug fix, and enhancement update
Advisory ID: RHSA-2019:2809-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2019:2809
Issue date: 2019-09-20
CVE Names: CVE-2019-5489 CVE-2019-6974 CVE-2019-13272
====================================================================
1. Summary:
An update for kernel-alt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, noarch, ppc64le, s390x
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, noarch, ppc64le
3. Description:
The kernel-alt packages provide the Linux kernel version 4.x.
Security Fix(es):
* Kernel: page cache side channel attacks (CVE-2019-5489)
* Kernel: KVM: potential use-after-free via kvm_ioctl_create_device()
(CVE-2019-6974)
* kernel: broken permission and object lifetime handling for PTRACE_TRACEME
(CVE-2019-13272)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Bug Fix(es):
* [kernel-alt]: BUG: unable to handle kernel NULL pointer IP:
crypto_remove_spawns+0x118/0x2e0 (BZ#1536967)
* [HPE Apache] update ssif max_xmit_msg_size limit for multi-part messages
(BZ#1610534)
* RHEL-Alt-7.6 - powerpc/pseries: Fix unitialized timer reset on migration
/ powerpc/pseries/mobility: Extend start/stop topology update scope (LPM)
(BZ#1673613)
* RHEL-Alt-7.6 - s390: sha3_generic module fails and triggers panic when in
FIPS mode (BZ#1673979)
* RHEL-Alt-7.6 - System crashed after oom - During ICP deployment
(BZ#1710304)
* kernel-alt: Race condition in hashtables [rhel-alt-7.6.z] (BZ#1712127)
* RHEL-Alt-7.6 - OP930:PM_Test:cpupower -r command set values for first 3
cores in quad and misses last core. (CORAL) (BZ#1717836)
* RHEL-Alt-7.6 - disable runtime NUMA remapping for PRRN/LPM/VPHN
(BZ#1717906)
* fragmented packets timing out (BZ#1729066)
* Backport TCP follow-up for small buffers (BZ#1733617)
Enhancement(s):
* RHEL-Alt-7.6 - perfevent PMDA cannot create file descriptors for reading
nest events using the perf API (pcp/kernel) (CORAL) (BZ#1723036)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1664110 - CVE-2019-5489 Kernel: page cache side channel attacks
1671913 - CVE-2019-6974 Kernel: KVM: potential use-after-free via kvm_ioctl_create_device()
1730895 - CVE-2019-13272 kernel: broken permission and object lifetime handling for PTRACE_TRACEME
6. Package List:
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):
Source:
kernel-alt-4.14.0-115.12.1.el7a.src.rpm
aarch64:
kernel-4.14.0-115.12.1.el7a.aarch64.rpm
kernel-debug-4.14.0-115.12.1.el7a.aarch64.rpm
kernel-debug-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm
kernel-debug-devel-4.14.0-115.12.1.el7a.aarch64.rpm
kernel-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm
kernel-debuginfo-common-aarch64-4.14.0-115.12.1.el7a.aarch64.rpm
kernel-devel-4.14.0-115.12.1.el7a.aarch64.rpm
kernel-headers-4.14.0-115.12.1.el7a.aarch64.rpm
kernel-tools-4.14.0-115.12.1.el7a.aarch64.rpm
kernel-tools-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm
kernel-tools-libs-4.14.0-115.12.1.el7a.aarch64.rpm
perf-4.14.0-115.12.1.el7a.aarch64.rpm
perf-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm
python-perf-4.14.0-115.12.1.el7a.aarch64.rpm
python-perf-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm
noarch:
kernel-abi-whitelists-4.14.0-115.12.1.el7a.noarch.rpm
kernel-doc-4.14.0-115.12.1.el7a.noarch.rpm
ppc64le:
kernel-4.14.0-115.12.1.el7a.ppc64le.rpm
kernel-bootwrapper-4.14.0-115.12.1.el7a.ppc64le.rpm
kernel-debug-4.14.0-115.12.1.el7a.ppc64le.rpm
kernel-debug-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm
kernel-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.14.0-115.12.1.el7a.ppc64le.rpm
kernel-devel-4.14.0-115.12.1.el7a.ppc64le.rpm
kernel-headers-4.14.0-115.12.1.el7a.ppc64le.rpm
kernel-tools-4.14.0-115.12.1.el7a.ppc64le.rpm
kernel-tools-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm
kernel-tools-libs-4.14.0-115.12.1.el7a.ppc64le.rpm
perf-4.14.0-115.12.1.el7a.ppc64le.rpm
perf-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm
python-perf-4.14.0-115.12.1.el7a.ppc64le.rpm
python-perf-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm
s390x:
kernel-4.14.0-115.12.1.el7a.s390x.rpm
kernel-debug-4.14.0-115.12.1.el7a.s390x.rpm
kernel-debug-debuginfo-4.14.0-115.12.1.el7a.s390x.rpm
kernel-debug-devel-4.14.0-115.12.1.el7a.s390x.rpm
kernel-debuginfo-4.14.0-115.12.1.el7a.s390x.rpm
kernel-debuginfo-common-s390x-4.14.0-115.12.1.el7a.s390x.rpm
kernel-devel-4.14.0-115.12.1.el7a.s390x.rpm
kernel-headers-4.14.0-115.12.1.el7a.s390x.rpm
kernel-kdump-4.14.0-115.12.1.el7a.s390x.rpm
kernel-kdump-debuginfo-4.14.0-115.12.1.el7a.s390x.rpm
kernel-kdump-devel-4.14.0-115.12.1.el7a.s390x.rpm
perf-4.14.0-115.12.1.el7a.s390x.rpm
perf-debuginfo-4.14.0-115.12.1.el7a.s390x.rpm
python-perf-4.14.0-115.12.1.el7a.s390x.rpm
python-perf-debuginfo-4.14.0-115.12.1.el7a.s390x.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):
aarch64:
kernel-debug-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm
kernel-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm
kernel-debuginfo-common-aarch64-4.14.0-115.12.1.el7a.aarch64.rpm
kernel-tools-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm
kernel-tools-libs-devel-4.14.0-115.12.1.el7a.aarch64.rpm
perf-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm
python-perf-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm
noarch:
kernel-doc-4.14.0-115.12.1.el7a.noarch.rpm
ppc64le:
kernel-debug-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm
kernel-debug-devel-4.14.0-115.12.1.el7a.ppc64le.rpm
kernel-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.14.0-115.12.1.el7a.ppc64le.rpm
kernel-tools-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm
kernel-tools-libs-devel-4.14.0-115.12.1.el7a.ppc64le.rpm
perf-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm
python-perf-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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yv43
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201907-0668 | CVE-2019-13585 | FANUC Robotics Virtual Robot Controller Buffer error vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
The remote admin webserver on FANUC Robotics Virtual Robot Controller 8.23 has a Buffer Overflow via a forged HTTP request
| VAR-201907-0667 | CVE-2019-13584 | FANUC Robotics Virtual Robot Controller Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
The remote admin webserver on FANUC Robotics Virtual Robot Controller 8.23 allows Directory Traversal via a forged HTTP request
| VAR-201907-0394 | CVE-2019-1943 |
plural Cisco Small Business Series redirect software open redirect vulnerability
Related entries in the VARIoT exploits database: VAR-E-201907-0018 |
CVSS V2: 5.8 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Switches software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting a user's HTTP request and modifying it into a request that causes the web interface to redirect the user to a specific malicious URL. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites. CiscoSmallBusiness200SeriesManagedSwitches, etc. are products of Cisco. CiscoSmallBusiness200SeriesManagedSwitches is a 200 Series Managed Switch. Security vulnerabilities exist in CiscoSmallBusiness200, 300, and 500Switches.
An attacker can leverage this issue by constructing a crafted URI and enticing a user to follow it. When an unsuspecting victim follows the link, they may be redirected to an attacker-controlled site; this may aid in phishing attacks. Other attacks are possible.
This issue is being tracked by Cisco Bug ID CSCvp23218.
*************************************************************************************************************************************
Can change to different domain under the host header and redirect the request to fake website and can be used for phishing attack also can be used for domain fronting.
Normal Request
GET / HTTP/1.1
Host: 10.1.1.120
Accept-Encoding: gzip, deflate
Accept: */*
Accept-Language: en-US,en-GB;q=0.9,en;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36
Connection: close
Cache-Control: max-age=0
Normal Response
HTTP/1.1 302 Redirect
Server: GoAhead-Webs
Date: Fri Mar 07 09:40:22 2014
Connection: close
Pragma: no-cache
Cache-Control: no-cache
Content-Type: text/html
Location: https://10.21.151.120/cs703dae2c/
<html><head></head><body>
This document has moved to a new <a href="https://10.1.1.120/cs703dae2c/">location</a>.
Please update your documents to reflect the new location.
</body></html>
*************************************************************************************************************************************
POC
*************************************************************************************************************************************
Host Header changed to different domain (example google.com).
Request:
GET /cs703dae2c HTTP/1.1
Host: google.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:63.0) Gecko/20100101 Firefox/63.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-GB,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
Cookie: activeLangId=English; isStackableDevice=false
Upgrade-Insecure-Requests: 1
Response:
HTTP/1.1 302 Redirect
activeLangId=English; isStackableDevice=falseServer: GoAhead-Webs
Date: Fri Mar 07 09:45:26 2014
Connection: close
Pragma: no-cache
Cache-Control: no-cache
Content-Type: text/html
Location: http://google.com/cs703dae2c/config/log_off_page.htm
<html><head></head><body>
This document has moved to a new <a href="http://google.com/cs703dae2c/config/log_off_page.htm">location</a>.
Please update your documents to reflect the new location.
</body></html>
The redirection is happening to http://google.com/cs703dae2c/config/log_off_page.htm. The attacker need to be in same network and should be able to modify the victims request on the wire in order to trigger this vulnerabilty.
*************************************************************************************************************************************
Attack Vector:
*************************************************************************************************************************************
Can be used for domain fronting.
curl -k --header "Host: attack.host.net" "domainname of the cisco device"
*************************************************************************************************************************************
Vendor Response:
*************************************************************************************************************************************
Issue 1:
Due to the limited information given out, we are not considering it a vulnerability as such. Still, it would be better if it was not happening, so, we will treat it as a hardening enhancement.
Issue 2:
The developers won't be able to provide a fix for this in the short term (90 days), so, we are planning to disclose this issue through an advisory on July 17th 2019.
We have assigned CVE CVE-2019-1943 for this issue.
Reference: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190717-sbss-redirect
*************************************************************************************************************************************
| VAR-201907-1036 | CVE-2014-10374 | Fitbit Charge 2 Vulnerable to information disclosure |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
On Fitbit activity-tracker devices, certain addresses never change. According to the popets-2019-0036.pdf document, this leads to "permanent trackability" and "considerable privacy concerns" without a user-accessible anonymization feature. The devices, such as Charge 2, transmit Bluetooth Low Energy (BLE) advertising packets with a TxAdd flag indicating random addresses, but the addresses remain constant. If devices come within BLE range at one or more locations where an adversary has set up passive sniffing, the adversary can determine whether the same device has entered one of these locations. Fitbit Charge 2 Contains an information disclosure vulnerability.Information may be obtained. Fitbit activity-tracker is a smart sports watch made by Fitbit Company in the United States. This vulnerability stems from configuration errors in network systems or products during operation. An unauthorized attacker could exploit the vulnerability to obtain sensitive information of the affected components
| VAR-201907-0677 | CVE-2019-13604 | HID Global DigitalPersona U.are.U 4500 Fingerprint Reader Vulnerable to information disclosure |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
There is a short key vulnerability in HID Global DigitalPersona (formerly Crossmatch) U.are.U 4500 Fingerprint Reader v24. The key for obfuscating the fingerprint image is vulnerable to brute-force attacks. This allows an attacker to recover the key and decrypt that image using the key. Successful exploitation causes a sensitive biometric information leak
| VAR-201907-1760 | No CVE | Tpshop v3.5 Or ***. Php page has SQL injection vulnerability (CNVD-2019-17507) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Tpshop is a multi-business model mall system developed by Shenzhen Sobao Network Co., Ltd.
Tpshop v3.5 Or ***. Php page has SQL injection vulnerability. An attacker could use the vulnerability to obtain sensitive database information.
| VAR-201907-1758 | No CVE | Tpshop v3.5 Or ***. Php page has SQL injection vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Tpshop is a multi-business model mall system developed by Shenzhen Sobao Network Co., Ltd.
Tpshop v3.5 Or ***. Php page has SQL injection vulnerability. An attacker could use the vulnerability to obtain sensitive database information.
| VAR-201907-0070 | CVE-2019-6825 | ProClima Vulnerabilities in uncontrolled search path elements |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
A CWE-427: Uncontrolled Search Path Element vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow a malicious DLL file, with the same name of any resident DLLs inside the software installation, to execute arbitrary code in all versions of ProClima prior to version 8.0.0. ProClima Contains a vulnerability related to uncontrolled search path elements.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Schneider Electric ProClima is a set of heat calculation software from Schneider Electric, France. This software provides thermal management functions for the environment and electrical/electronic equipment installed in the control panel by analyzing specified thermal data. A code issue vulnerability exists in Schneider Electric ProClima versions prior to 8.0.0. This vulnerability stems from improper design or implementation problems in the code development process of network systems or products
| VAR-201907-0069 | CVE-2019-6824 | ProClima Buffer error vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
A CWE-119: Buffer Errors vulnerability exists in ProClima (all versions prior to version 8.0.0) which allows an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0. ProClima Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Schneider Electric ProClima is a set of heat calculation software from Schneider Electric, France. This software provides thermal management functions for the environment and electrical/electronic equipment installed in the control panel by analyzing specified thermal data. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc
| VAR-201907-0068 | CVE-2019-6823 | ProClima Code injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
A CWE-94: Code Injection vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0. ProClima Contains a code injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Schneider Electric ProClima is a set of heat calculation software from Schneider Electric, France. This software provides thermal management functions for the environment and electrical/electronic equipment installed in the control panel by analyzing specified thermal data. This vulnerability stems from the fact that the network system or product does not correctly filter special elements in the process of constructing code segments from external input data. Attackers can exploit this vulnerability to generate illegal code segments and modify the expected execution control flow of network systems or components
| VAR-201907-0674 | CVE-2019-13598 | Vera Edge Home Controller In OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
LuaUPnP in Vera Edge Home Controller 1.7.4452 allows remote unauthenticated users to execute arbitrary OS commands via the code parameter to /port_3480/data_request because the "No unsafe lua allowed" code block is skipped. Vera Edge Home Controller Is OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Vera Edge Home Controller is a smart home central control unit. There is a security vulnerability in LuaUPnP in Vera Edge Home Controller version 1.7.4452
| VAR-201907-1271 | CVE-2019-1010009 | DGLogik Inc DGLux Server Permissions vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
DGLogik Inc DGLux Server All Versions is affected by: Insecure Permissions. The impact is: Remote Execution, Credential Leaks. The component is: IoT API. The attack vector is: Any Accessible Server. DGLogik Inc DGLux Server Contains a permission vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. DGLogik DGLux Server is an enterprise-level web server software from DGLogik, USA. An attacker could use this vulnerability to execute arbitrary commands on the host device
| VAR-201907-1651 | No CVE | KUNBUS-GW Ethernet / IP Denial of Service Vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
KUNBUS-GW Ethernet / IP is a programmable logic controller (PLC), which provides an integrated ControlNet communication port and two integrated Ethernet interfaces.
KUNBUS-GW Ethernet / IP has a denial of service vulnerability. The attacker uses the vulnerability to send the constructed special protocol package to take the device down
| VAR-201907-1715 | CVE-2019-13491 | Tenda D301 cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Tenda D301 is a wireless router from China Tenda.
There is a cross-site scripting vulnerability in Tenda D301 v2. The vulnerability stems from the lack of proper verification of client data by WEB applications. Attackers can use this vulnerability to execute client code.
| VAR-201907-1458 | CVE-2019-10982 | Delta Industrial Automation CNCSoft ScreenEditor DPB File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
Delta Electronics CNCSoft ScreenEditor, Versions 1.00.89 and prior. Multiple heap-based buffer overflow vulnerabilities may be exploited by processing specially crafted project files, allowing an attacker to remotely execute arbitrary code. There is a lack of user input validation before copying data from project files onto the heap. Delta Electronics CNCSoft ScreenEditor Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Industrial Automation CNCSoft ScreenEditor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DPB files. An attacker can leverage this vulnerability to execute code in the context of an administrator. Multiple heap-based buffer-overflow vulnerabilities
2. Multiple information disclosure vulnerabilities. Failed exploit attempts will likely cause a denial-of-service condition
| VAR-201907-1460 | CVE-2019-10992 | Delta Industrial Automation CNCSoft ScreenEditor DPB File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability |
CVSS V2: 4.3 CVSS V3: 5.5 Severity: LOW |
Delta Electronics CNCSoft ScreenEditor, Versions 1.00.89 and prior. Multiple out-of-bounds read vulnerabilities may cause information disclosure due to lacking user input validation for processing project files. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Delta Industrial Automation CNCSoft ScreenEditor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DPB files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of an administrator. Multiple heap-based buffer-overflow vulnerabilities
2. Multiple information disclosure vulnerabilities. Failed exploit attempts will likely cause a denial-of-service condition
| VAR-201907-0071 | CVE-2019-6827 | Interactive Graphical SCADA System Vulnerable to out-of-bounds writing |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
A CWE-787: Out-of-bounds Write vulnerability exists in Interactive Graphical SCADA System (IGSS), Version 14 and prior, which could cause a software crash when data in the mdb database is manipulated. Interactive Graphical SCADA System (IGSS) Contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Schneider Electric IGSS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within use of the UnitIdx data in the BaseUnits table. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Schneider Electric Interactive Graphical SCADA System (IGSS) is a set of SCADA (Data Acquisition and Supervisory Control System) system used to monitor and control industrial processes from Schneider Electric in France.
A buffer error vulnerability exists in Schneider Electric IGSS 14 and earlier versions. Attackers can use this vulnerability to cause software crashes with the help of specially crafted project files
| VAR-201907-0641 | CVE-2019-13562 | D-Link DIR-655 C Cross-Site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
D-Link DIR-655 C devices before 3.02B05 BETA03 allow XSS, as demonstrated by the /www/ping_response.cgi ping_ipaddr parameter, the /www/ping6_response.cgi ping6_ipaddr parameter, and the /www/apply_sec.cgi html_response_return_page parameter. D-Link DIR-655 C The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. D-LinkDIR-655C is a wireless router from D-Link Corporation of Taiwan, China. A cross-site scripting vulnerability exists in previous versions of D-LinkDIR-655C3.02B05BETA03. The vulnerability stems from the lack of proper validation of client data for web applications. An attacker could exploit the vulnerability to execute client code
| VAR-201907-0092 | CVE-2019-3415 | ZTE ZXMW NR8000 Path Traversal Vulnerability |
CVSS V2: 2.7 CVSS V3: 5.7 Severity: MEDIUM |
ZTE MW NR8000V2.4.4.03 and NR8000V2.4.4.04 are impacted by path traversal vulnerability. Due to path traversal,users can download any files. ZTEZXMWNR8000 is a relay radio device from China ZTE Corporation (ZTE). The vulnerability stems from a network system or product failing to properly filter specific elements in a resource or file path. An attacker could exploit this vulnerability to access a location outside of a restricted directory