VARIoT IoT vulnerabilities database
| VAR-201905-0509 | CVE-2019-1772 | Microsoft Windows for Cisco Webex Network Recording Player and Webex Player Buffer error vulnerability |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerability exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file via a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system.
These issues are being tracked by Cisco Bug IDs CSCvn88721, CSCvo03346, CSCvo05229, CSCvo05231, CSCvo33767, CSCvo33769, and CSCvo33774. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc
| VAR-201905-0536 | CVE-2019-1773 | Microsoft Windows for Cisco Webex Network Recording Player and Webex Player Buffer error vulnerability |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerability exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file via a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system.
These issues are being tracked by Cisco Bug IDs CSCvn88721, CSCvo03346, CSCvo05229, CSCvo05231, CSCvo33767, CSCvo33769, and CSCvo33774. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc
| VAR-201905-0508 | CVE-2019-1771 | Microsoft Windows for Cisco Webex Network Recording Player and Webex Player Buffer error vulnerability |
CVSS V2: 6.9 CVSS V3: 7.8 Severity: HIGH |
A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerability exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file via a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system.
These issues are being tracked by Cisco Bug IDs CSCvn88721, CSCvo03346, CSCvo05229, CSCvo05231, CSCvo33767, CSCvo33769, and CSCvo33774. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc
| VAR-201905-0519 | CVE-2019-1822 | Cisco Prime Infrastructure and Evolved Programmable Network Manager Input validation vulnerability |
CVSS V2: 9.0 CVSS V3: 7.2 Severity: HIGH |
A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to execute code with root-level privileges on the underlying operating system. This vulnerability exist because the software improperly validates user-supplied input. An attacker could exploit this vulnerability by uploading a malicious file to the administrative web interface. A successful exploit could allow the attacker to execute code with root-level privileges on the underlying operating system.
This issue is tracked by Cisco Bug ID's CSCvo22842, CSCvo28671, CSCvo28680, CSCvo62258, CSCvo62264 and CSCvo62280
| VAR-201905-0527 | CVE-2019-1823 | Cisco Prime Infrastructure and Evolved Programmable Network Manager Input validation vulnerability |
CVSS V2: 9.0 CVSS V3: 7.2 Severity: HIGH |
A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to execute code with root-level privileges on the underlying operating system. This vulnerability exist because the software improperly validates user-supplied input. An attacker could exploit this vulnerability by uploading a malicious file to the administrative web interface. A successful exploit could allow the attacker to execute code with root-level privileges on the underlying operating system.
This issue is tracked by Cisco Bug ID's CSCvo22842, CSCvo28671, CSCvo28680, CSCvo62258, CSCvo62264 and CSCvo62280
| VAR-201905-0510 | CVE-2019-1825 | Cisco Prime Infrastructure and Evolved Programmable Network Manager In SQL Injection vulnerability |
CVSS V2: 5.5 CVSS V3: 8.1 Severity: HIGH |
A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to execute arbitrary SQL queries. This vulnerability exist because the software improperly validates user-supplied input in SQL queries. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains malicious SQL statements to the affected application. A successful exploit could allow the attacker to view or modify entries in some database tables, affecting the integrity of the data.
This issue is tracked by Cisco Bug ID's CSCvo23576, CSCvo28734, CSCvo62268 and CSCvo62275. Attackers can exploit this vulnerability to execute illegal SQL commands
| VAR-201905-0528 | CVE-2019-1824 | Cisco Prime Infrastructure and Evolved Programmable Network Manager In SQL Injection vulnerability |
CVSS V2: 5.5 CVSS V3: 8.1 Severity: HIGH |
A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to execute arbitrary SQL queries. This vulnerability exist because the software improperly validates user-supplied input in SQL queries. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains malicious SQL statements to the affected application. A successful exploit could allow the attacker to view or modify entries in some database tables, affecting the integrity of the data.
This issue is tracked by Cisco Bug ID's CSCvo23576, CSCvo28734, CSCvo62268 and CSCvo62275. Attackers can exploit this vulnerability to execute illegal SQL commands
| VAR-201905-0515 | CVE-2019-1818 | Cisco Prime Infrastructure and Evolved Programmable Network Manager Path traversal vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network (EPN) Manager software could allow an authenticated, remote attacker to download and view files within the application that should be restricted. This vulnerability is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view application files that may contain sensitive information.
This issue is being tracked by Cisco Bug ID CSCvo28666 and CSCvo62256. The vulnerability stems from a network system or product that fails to properly filter resources or special elements in file paths. The following products and versions are affected: Cisco PI Software versions prior to 3.4, versions prior to 3.5, and versions prior to 3.6; Cisco EPN Manager versions prior to 3.0.1
| VAR-201905-0518 | CVE-2019-1821 | Cisco Prime Infrastructure and Evolved Programmable Network Manager Input validation vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to execute code with root-level privileges on the underlying operating system. This vulnerability exist because the software improperly validates user-supplied input. An attacker could exploit this vulnerability by uploading a malicious file to the administrative web interface. A successful exploit could allow the attacker to execute code with root-level privileges on the underlying operating system.
This issue is tracked by Cisco Bug ID's CSCvo22842, CSCvo28671, CSCvo28680, CSCvo62258, CSCvo62264 and CSCvo62280
| VAR-201905-1248 | CVE-2019-11091 | Multiple Intel Product Information Disclosure Vulnerabilities (CNVD-2019-22234) |
CVSS V2: 4.7 CVSS V3: 5.6 Severity: MEDIUM |
Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf. Intel Xeon Scalable Processors and so on are products of Intel Corporation of the United States. Intel XeonScalable Processors is a scalable server central processing unit (CPU). IntelXeonProcessorE7v4Family is a XeonE7 series server central processing unit (CPU). IntelXeonProcessorE5v4Family is a XeonE5 series server central processing unit (CPU). An information disclosure vulnerability exists in several Intel products. The vulnerability stems from errors in the configuration of the network system or product during operation. An unauthorized attacker can exploit the vulnerability to obtain sensitive information about the affected component. The following products and versions are affected: Intel Xeon Scalable Processors; Xeon Processor E7 v4 Family; Xeon Processor E5 v4 Family; Xeon Processor E3 v6 Family; Xeon Processor E3 v4 Family; Xeon Processor E; Xeon E Processor; Xeon D Processor; Puma; Pentium Processor Silver Series; Pentium Processor N Series; Pentium Processor J Series; Pentium Gold Processor Series; Mobile Communications Platforms; Microcode; Core X series Processors; Celeron Processor N Series; Celeron Processor J Series; Celeron Processor G Series; Atom Processor X Series ;Atom Processor E3900 Series;Atom Processor E3800 Series;Atom Processor.
The vulnerability is due to improper memory operations that could expose a side channel on the affected system. A successful exploit could be used to conduct further attacks.
Proof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available. A third-party patch is also available. ==========================================================================
Ubuntu Security Notice USN-3980-1
May 14, 2019
linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-raspi2 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.10
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-kvm: Linux kernel for cloud environments
- linux-raspi2: Linux kernel for Raspberry Pi 2
Details:
Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Giorgi Maisuradze, Dan
Horea Lutas, Andrei Lutas, Volodymyr Pikhur, Stephan van Schaik, Alyssa
Milburn, Sebastian \xd6sterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos,
Cristiano Giuffrida, Moritz Lipp, Michael Schwarz, and Daniel Gruss
discovered that memory previously stored in microarchitectural fill buffers
of an Intel CPU core may be exposed to a malicious process that is
executing on the same CPU core. (CVE-2018-12130)
Brandon Falk, Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Stephan
van Schaik, Alyssa Milburn, Sebastian \xd6sterlund, Pietro Frigo, Kaveh
Razavi, Herbert Bos, and Cristiano Giuffrida discovered that memory
previously stored in microarchitectural load ports of an Intel CPU core may
be exposed to a malicious process that is executing on the same CPU core.
(CVE-2018-12127)
Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Marina Minkin, Daniel
Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel
Gruss, Berk Sunar, Frank Piessens, and Yuval Yarom discovered that memory
previously stored in microarchitectural store buffers of an Intel CPU core
may be exposed to a malicious process that is executing on the same CPU
core.
(CVE-2018-12126)
Vasily Averin and Evgenii Shatokhin discovered that a use-after-free
vulnerability existed in the NFS41+ subsystem when multiple network
namespaces are in use. A local attacker in a container could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2018-16884)
Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Volodrmyr Pikhur,
Moritz Lipp, Michael Schwarz, Daniel Gruss, Stephan van Schaik, Alyssa
Milburn, Sebastian \xd6sterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and
Cristiano Giuffrida discovered that uncacheable memory previously stored in
microarchitectural buffers of an Intel CPU core may be exposed to a
malicious process that is executing on the same CPU core. (CVE-2019-11091)
Matteo Croce, Natale Vinto, and Andrea Spagnolo discovered that the cgroups
subsystem of the Linux kernel did not properly account for SCTP socket
buffers. A local attacker could use this to cause a denial of service
(system crash). (CVE-2019-3874)
Alex Williamson discovered that the vfio subsystem of the Linux kernel did
not properly limit DMA mappings. A local attacker could use this to cause a
denial of service (memory exhaustion). (CVE-2019-3882)
Marc Orr discovered that the KVM hypervisor implementation in the Linux
kernel did not properly restrict APIC MSR register values when nested
virtualization is used. An attacker in a guest vm could use this to cause a
denial of service (host OS crash). (CVE-2019-3887)
Hugues Anguelkov discovered that the Broadcom Wifi driver in the Linux
kernel contained a head puffer overflow. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2019-9500)
Hugues Anguelkov discovered that the Broadcom Wifi driver in the Linux
kernel did not properly prevent remote firmware events from being processed
for USB Wifi devices. A physically proximate attacker could use this to
send firmware events to the device. (CVE-2019-9503)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.10:
linux-image-4.18.0-1011-gcp 4.18.0-1011.12
linux-image-4.18.0-1012-kvm 4.18.0-1012.12
linux-image-4.18.0-1014-raspi2 4.18.0-1014.16
linux-image-4.18.0-1016-aws 4.18.0-1016.18
linux-image-4.18.0-1018-azure 4.18.0-1018.18
linux-image-4.18.0-20-generic 4.18.0-20.21
linux-image-4.18.0-20-generic-lpae 4.18.0-20.21
linux-image-4.18.0-20-lowlatency 4.18.0-20.21
linux-image-4.18.0-20-snapdragon 4.18.0-20.21
linux-image-aws 4.18.0.1016.16
linux-image-azure 4.18.0.1018.19
linux-image-gcp 4.18.0.1011.11
linux-image-generic 4.18.0.20.21
linux-image-generic-lpae 4.18.0.20.21
linux-image-gke 4.18.0.1011.11
linux-image-kvm 4.18.0.1012.12
linux-image-lowlatency 4.18.0.20.21
linux-image-powerpc-e500mc 4.18.0.20.21
linux-image-powerpc-smp 4.18.0.20.21
linux-image-powerpc64-emb 4.18.0.20.21
linux-image-powerpc64-smp 4.18.0.20.21
linux-image-raspi2 4.18.0.1014.11
linux-image-snapdragon 4.18.0.20.21
linux-image-virtual 4.18.0.20.21
After a standard system update you need to reboot your computer to make
all the necessary changes.
Please note that fully mitigating the Microarchitectural Data Sampling
(MDS) issues (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and
CVE-2019-11091) requires corresponding processor microcode/firmware
updates or, in virtual environments, hypervisor updates. Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables
fine-tuning for systems with extremely high determinism requirements. (CVE-2019-11091)
* kernel: Buffer overflow in firewire driver via crafted incoming packets
(CVE-2016-8633)
* kernel: crypto: privilege escalation in skcipher_recvmsg function
(CVE-2017-13215)
* Kernel: ipsec: xfrm: use-after-free leading to potential privilege
escalation (CVE-2017-16939)
* kernel: Out-of-bounds write via userland offsets in ebt_entry struct in
netfilter/ebtables.c (CVE-2018-1068)
* kernel: Use-after-free due to race condition in AF_PACKET implementation
(CVE-2018-18559)
* kernel: media: use-after-free in [tuner-xc2028] media driver
(CVE-2016-7913)
* kernel: Out-of-bounds access via an XFRM_MSG_MIGRATE xfrm Netlink message
(CVE-2017-11600)
* kernel: memory leak when merging buffers in SCSI IO vectors
(CVE-2017-12190)
* kernel: Unallocated memory access by malicious USB device via
bNumInterfaces overflow (CVE-2017-17558)
* Kernel: FPU state information leakage via lazy FPU restore
(CVE-2018-3665)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Bug Fix(es):
* update the MRG 2.5.z 3.10 kernel-rt sources (BZ#1692711)
4.
In addition this update provides mitigations for the "TSX Asynchronous Abort"
speculative side channel attack. For additional information please refer to
https://xenbits.xen.org/xsa/advisory-305.html
For the oldstable distribution (stretch), these problems have been fixed
in version 4.8.5.final+shim4.10.4-1+deb9u12. Note that this will be the
last security update for Xen in the oldstable distribution; upstream
support for the 4.8.x branch ended by the end of December 2019. If you
rely on security support for your Xen installation an update to the
stable distribution (buster) is recommended.
For the stable distribution (buster), these problems have been fixed in
version 4.11.3+24-g14b62ab3e5-1~deb10u1.
We recommend that you upgrade your xen packages.
For the detailed security status of xen please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/xen
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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3Qmh
-----END PGP SIGNATURE-----
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: qemu-kvm security update
Advisory ID: RHSA-2019:1178-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2019:1178
Issue date: 2019-05-14
CVE Names: CVE-2018-12126 CVE-2018-12127 CVE-2018-12130
CVE-2019-11091
=====================================================================
1. Summary:
An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
3. Description:
Kernel-based Virtual Machine (KVM) is a full virtualization solution for
Linux on a variety of architectures. The qemu-kvm packages provide the
user-space component for running virtual machines that use KVM.
Security Fix(es):
* A flaw was found in the implementation of the "fill buffer", a mechanism
used by modern CPUs when a cache-miss is made on L1 CPU cache. If an
attacker can generate a load operation that would create a page fault, the
execution will continue speculatively with incorrect data from the fill
buffer while the data is fetched from higher level caches. This response
time can be measured to infer data in the fill buffer. (CVE-2018-12130)
* Modern Intel microprocessors implement hardware-level micro-optimizations
to improve the performance of writing data back to CPU caches. The write
operation is split into STA (STore Address) and STD (STore Data)
sub-operations. These sub-operations allow the processor to hand-off
address generation logic into these sub-operations for optimized writes.
Both of these sub-operations write to a shared distributed processor
structure called the 'processor store buffer'. As a result, an unprivileged
attacker could use this flaw to read private data resident within the CPU's
processor store buffer. (CVE-2018-12126)
* Microprocessors use a ‘load port’ subcomponent to perform load operations
from memory or IO. During a load operation, the load port receives data
from the memory or IO subsystem and then provides the data to the CPU
registers and operations in the CPU’s pipelines. Stale load operations
results are stored in the 'load port' table until overwritten by newer
operations. Certain load-port operations triggered by an attacker can be
used to reveal data about previous stale requests leaking data back to the
attacker via a timing side-channel. (CVE-2019-11091)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, shut down all running virtual machines. Once
all virtual machines have shut down, start them again for this update to
take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1646781 - CVE-2018-12126 hardware: Microarchitectural Store Buffer Data Sampling (MSBDS)
1646784 - CVE-2018-12130 hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS)
1667782 - CVE-2018-12127 hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS)
1705312 - CVE-2019-11091 hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
6. Package List:
Red Hat Enterprise Linux Client (v. 7):
Source:
qemu-kvm-1.5.3-160.el7_6.2.src.rpm
x86_64:
qemu-img-1.5.3-160.el7_6.2.x86_64.rpm
qemu-kvm-1.5.3-160.el7_6.2.x86_64.rpm
qemu-kvm-common-1.5.3-160.el7_6.2.x86_64.rpm
qemu-kvm-debuginfo-1.5.3-160.el7_6.2.x86_64.rpm
qemu-kvm-tools-1.5.3-160.el7_6.2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
Source:
qemu-kvm-1.5.3-160.el7_6.2.src.rpm
x86_64:
qemu-img-1.5.3-160.el7_6.2.x86_64.rpm
qemu-kvm-1.5.3-160.el7_6.2.x86_64.rpm
qemu-kvm-common-1.5.3-160.el7_6.2.x86_64.rpm
qemu-kvm-debuginfo-1.5.3-160.el7_6.2.x86_64.rpm
qemu-kvm-tools-1.5.3-160.el7_6.2.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
qemu-kvm-1.5.3-160.el7_6.2.src.rpm
x86_64:
qemu-img-1.5.3-160.el7_6.2.x86_64.rpm
qemu-kvm-1.5.3-160.el7_6.2.x86_64.rpm
qemu-kvm-common-1.5.3-160.el7_6.2.x86_64.rpm
qemu-kvm-debuginfo-1.5.3-160.el7_6.2.x86_64.rpm
qemu-kvm-tools-1.5.3-160.el7_6.2.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
qemu-kvm-1.5.3-160.el7_6.2.src.rpm
x86_64:
qemu-img-1.5.3-160.el7_6.2.x86_64.rpm
qemu-kvm-1.5.3-160.el7_6.2.x86_64.rpm
qemu-kvm-common-1.5.3-160.el7_6.2.x86_64.rpm
qemu-kvm-debuginfo-1.5.3-160.el7_6.2.x86_64.rpm
qemu-kvm-tools-1.5.3-160.el7_6.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2018-12126
https://access.redhat.com/security/cve/CVE-2018-12127
https://access.redhat.com/security/cve/CVE-2018-12130
https://access.redhat.com/security/cve/CVE-2019-11091
https://access.redhat.com/security/vulnerabilities/mds
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=AYjv
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. This update provides the corresponding updates for the Linux
Hardware Enablement (HWE) kernel from Ubuntu 14.04 LTS for Ubuntu
12.04 LTS. (CVE-2019-11091)
4
| VAR-201905-0710 | CVE-2018-12127 | Multiple Intel Product Information Disclosure Vulnerability |
CVSS V2: 4.7 CVSS V3: 5.6 Severity: MEDIUM |
Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf. Intel Xeon Scalable Processors are all products of Intel Corporation of the United States. Intel Xeon Scalable Processors are a scalable server central processing unit (CPU). Intel Xeon Processor E7 v4 Family is a Xeon E7 series server central processing unit (CPU). Intel Xeon Processor E5 v4 Family is a Xeon E5 series server central processing unit (CPU). Information disclosure vulnerabilities exist in several Intel products. This vulnerability stems from configuration errors in network systems or products during operation. The following products and versions are affected: Intel Xeon Scalable Processors; Xeon Processor E7 v4 Family; Xeon Processor E5 v4 Family; Xeon Processor E3 v6 Family; Xeon Processor E3 v4 Family; Xeon Processor E; Xeon E Processor; Xeon D Processor; Puma; Pentium Processor Silver Series; Pentium Processor N Series; Pentium Processor J Series; Pentium Gold Processor Series; Mobile Communications Platforms; Microcode; Core X series Processors; Celeron Processor N Series; Celeron Processor J Series; Celeron Processor G Series; Atom Processor X Series ;Atom Processor E3900 Series;Atom Processor E3800 Series;Atom Processor.
The vulnerability is due to improper memory operations that could expose a side channel on the affected system. A successful exploit could be used to conduct further attacks.
Proof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available.
Intel has confirmed the vulnerability and released software updates. Description:
The VDSM service is required by a Virtualization Manager to manage the
Linux hosts. VDSM manages and monitors the host's storage, memory and
networks as well as virtual machine creation, other host administration
tasks, statistics gathering, and log collection. Relevant releases/architectures:
RHV-M 4.3 - noarch
3.
It includes the configuration of the Red Hat Support plugin, copying
downstream-only artifacts to the ISO domain, and links to the knowledgebase
and other support material. (CVE-2019-11091)
4. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: libvirt security update
Advisory ID: RHSA-2019:1177-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2019:1177
Issue date: 2019-05-14
CVE Names: CVE-2018-12126 CVE-2018-12127 CVE-2018-12130
CVE-2019-11091
=====================================================================
1. Summary:
An update for libvirt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - ppc64le, s390x
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, ppc64le, s390x
3. Description:
The libvirt library contains a C API for managing and interacting with the
virtualization capabilities of Linux and other operating systems. In
addition, libvirt provides tools for remote management of virtualized
systems.
Security Fix(es):
* A flaw was found in the implementation of the "fill buffer", a mechanism
used by modern CPUs when a cache-miss is made on L1 CPU cache. If an
attacker can generate a load operation that would create a page fault, the
execution will continue speculatively with incorrect data from the fill
buffer while the data is fetched from higher level caches. This response
time can be measured to infer data in the fill buffer. (CVE-2018-12130)
* Modern Intel microprocessors implement hardware-level micro-optimizations
to improve the performance of writing data back to CPU caches. The write
operation is split into STA (STore Address) and STD (STore Data)
sub-operations. These sub-operations allow the processor to hand-off
address generation logic into these sub-operations for optimized writes.
Both of these sub-operations write to a shared distributed processor
structure called the 'processor store buffer'. As a result, an
unprivileged attacker could use this flaw to read private data resident
within the CPU's processor store buffer. (CVE-2018-12126)
* Microprocessors use a ‘load port’ subcomponent to perform load operations
from memory or IO. During a load operation, the load port receives data
from the memory or IO subsystem and then provides the data to the CPU
registers and operations in the CPU’s pipelines. Stale load operations
results are stored in the 'load port' table until overwritten by newer
operations. Certain load-port operations triggered by an attacker can be
used to reveal data about previous stale requests leaking data back to the
attacker via a timing side-channel. (CVE-2019-11091)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, libvirtd will be restarted
automatically.
5. Bugs fixed (https://bugzilla.redhat.com/):
1646781 - CVE-2018-12126 hardware: Microarchitectural Store Buffer Data Sampling (MSBDS)
1646784 - CVE-2018-12130 hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS)
1667782 - CVE-2018-12127 hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS)
1705312 - CVE-2019-11091 hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
6. Package List:
Red Hat Enterprise Linux Client (v. 7):
Source:
libvirt-4.5.0-10.el7_6.9.src.rpm
x86_64:
libvirt-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-bash-completion-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-client-4.5.0-10.el7_6.9.i686.rpm
libvirt-client-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-config-network-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-interface-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-lxc-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-network-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-qemu-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-secret-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-kvm-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.i686.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-libs-4.5.0-10.el7_6.9.i686.rpm
libvirt-libs-4.5.0-10.el7_6.9.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64:
libvirt-admin-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-lxc-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.i686.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-devel-4.5.0-10.el7_6.9.i686.rpm
libvirt-devel-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-docs-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-lock-sanlock-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-login-shell-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-nss-4.5.0-10.el7_6.9.i686.rpm
libvirt-nss-4.5.0-10.el7_6.9.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
libvirt-4.5.0-10.el7_6.9.src.rpm
x86_64:
libvirt-bash-completion-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-client-4.5.0-10.el7_6.9.i686.rpm
libvirt-client-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.i686.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-libs-4.5.0-10.el7_6.9.i686.rpm
libvirt-libs-4.5.0-10.el7_6.9.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64:
libvirt-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-admin-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-config-network-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-interface-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-lxc-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-network-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-qemu-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-secret-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-kvm-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-lxc-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.i686.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-devel-4.5.0-10.el7_6.9.i686.rpm
libvirt-devel-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-docs-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-lock-sanlock-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-login-shell-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-nss-4.5.0-10.el7_6.9.i686.rpm
libvirt-nss-4.5.0-10.el7_6.9.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
libvirt-4.5.0-10.el7_6.9.src.rpm
ppc64:
libvirt-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-bash-completion-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-client-4.5.0-10.el7_6.9.ppc.rpm
libvirt-client-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-daemon-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-daemon-config-network-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-daemon-driver-interface-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-daemon-driver-lxc-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-daemon-driver-network-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-daemon-driver-qemu-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-daemon-driver-secret-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-daemon-driver-storage-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.ppc.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-devel-4.5.0-10.el7_6.9.ppc.rpm
libvirt-devel-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-docs-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-libs-4.5.0-10.el7_6.9.ppc.rpm
libvirt-libs-4.5.0-10.el7_6.9.ppc64.rpm
ppc64le:
libvirt-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-bash-completion-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-client-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-config-network-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-interface-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-lxc-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-network-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-qemu-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-secret-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-storage-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-kvm-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-devel-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-docs-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-libs-4.5.0-10.el7_6.9.ppc64le.rpm
s390x:
libvirt-4.5.0-10.el7_6.9.s390x.rpm
libvirt-bash-completion-4.5.0-10.el7_6.9.s390x.rpm
libvirt-client-4.5.0-10.el7_6.9.s390.rpm
libvirt-client-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-config-network-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-interface-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-lxc-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-network-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-qemu-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-secret-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-storage-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-kvm-4.5.0-10.el7_6.9.s390x.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.s390.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.s390x.rpm
libvirt-devel-4.5.0-10.el7_6.9.s390.rpm
libvirt-devel-4.5.0-10.el7_6.9.s390x.rpm
libvirt-docs-4.5.0-10.el7_6.9.s390x.rpm
libvirt-libs-4.5.0-10.el7_6.9.s390.rpm
libvirt-libs-4.5.0-10.el7_6.9.s390x.rpm
x86_64:
libvirt-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-bash-completion-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-client-4.5.0-10.el7_6.9.i686.rpm
libvirt-client-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-config-network-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-interface-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-lxc-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-network-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-qemu-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-secret-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-kvm-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.i686.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-devel-4.5.0-10.el7_6.9.i686.rpm
libvirt-devel-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-docs-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-libs-4.5.0-10.el7_6.9.i686.rpm
libvirt-libs-4.5.0-10.el7_6.9.x86_64.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):
Source:
libvirt-4.5.0-10.el7_6.9.src.rpm
ppc64le:
libvirt-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-bash-completion-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-client-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-config-network-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-interface-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-lxc-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-network-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-qemu-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-secret-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-storage-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-kvm-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-devel-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-docs-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-libs-4.5.0-10.el7_6.9.ppc64le.rpm
s390x:
libvirt-4.5.0-10.el7_6.9.s390x.rpm
libvirt-bash-completion-4.5.0-10.el7_6.9.s390x.rpm
libvirt-client-4.5.0-10.el7_6.9.s390.rpm
libvirt-client-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-config-network-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-interface-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-lxc-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-network-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-qemu-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-secret-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-storage-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-kvm-4.5.0-10.el7_6.9.s390x.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.s390.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.s390x.rpm
libvirt-devel-4.5.0-10.el7_6.9.s390.rpm
libvirt-devel-4.5.0-10.el7_6.9.s390x.rpm
libvirt-docs-4.5.0-10.el7_6.9.s390x.rpm
libvirt-libs-4.5.0-10.el7_6.9.s390.rpm
libvirt-libs-4.5.0-10.el7_6.9.s390x.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64:
libvirt-admin-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-daemon-lxc-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.ppc.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-lock-sanlock-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-login-shell-4.5.0-10.el7_6.9.ppc64.rpm
libvirt-nss-4.5.0-10.el7_6.9.ppc.rpm
libvirt-nss-4.5.0-10.el7_6.9.ppc64.rpm
ppc64le:
libvirt-admin-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-lxc-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-lock-sanlock-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-login-shell-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-nss-4.5.0-10.el7_6.9.ppc64le.rpm
s390x:
libvirt-admin-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-lxc-4.5.0-10.el7_6.9.s390x.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.s390.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.s390x.rpm
libvirt-lock-sanlock-4.5.0-10.el7_6.9.s390x.rpm
libvirt-login-shell-4.5.0-10.el7_6.9.s390x.rpm
libvirt-nss-4.5.0-10.el7_6.9.s390.rpm
libvirt-nss-4.5.0-10.el7_6.9.s390x.rpm
x86_64:
libvirt-admin-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-lxc-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.i686.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-lock-sanlock-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-login-shell-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-nss-4.5.0-10.el7_6.9.i686.rpm
libvirt-nss-4.5.0-10.el7_6.9.x86_64.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):
Source:
libvirt-4.5.0-10.el7_6.9.src.rpm
aarch64:
libvirt-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-admin-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-bash-completion-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-client-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-daemon-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-daemon-config-network-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-daemon-driver-interface-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-daemon-driver-lxc-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-daemon-driver-network-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-daemon-driver-qemu-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-daemon-driver-secret-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-daemon-driver-storage-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-daemon-kvm-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-daemon-lxc-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-devel-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-docs-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-libs-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-lock-sanlock-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-login-shell-4.5.0-10.el7_6.9.aarch64.rpm
libvirt-nss-4.5.0-10.el7_6.9.aarch64.rpm
ppc64le:
libvirt-admin-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-daemon-lxc-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-lock-sanlock-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-login-shell-4.5.0-10.el7_6.9.ppc64le.rpm
libvirt-nss-4.5.0-10.el7_6.9.ppc64le.rpm
s390x:
libvirt-admin-4.5.0-10.el7_6.9.s390x.rpm
libvirt-daemon-lxc-4.5.0-10.el7_6.9.s390x.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.s390.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.s390x.rpm
libvirt-lock-sanlock-4.5.0-10.el7_6.9.s390x.rpm
libvirt-login-shell-4.5.0-10.el7_6.9.s390x.rpm
libvirt-nss-4.5.0-10.el7_6.9.s390.rpm
libvirt-nss-4.5.0-10.el7_6.9.s390x.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
libvirt-4.5.0-10.el7_6.9.src.rpm
x86_64:
libvirt-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-bash-completion-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-client-4.5.0-10.el7_6.9.i686.rpm
libvirt-client-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-config-network-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-interface-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-lxc-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-network-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-qemu-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-secret-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-kvm-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.i686.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-devel-4.5.0-10.el7_6.9.i686.rpm
libvirt-devel-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-docs-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-libs-4.5.0-10.el7_6.9.i686.rpm
libvirt-libs-4.5.0-10.el7_6.9.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
libvirt-admin-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-daemon-lxc-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.i686.rpm
libvirt-debuginfo-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-lock-sanlock-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-login-shell-4.5.0-10.el7_6.9.x86_64.rpm
libvirt-nss-4.5.0-10.el7_6.9.i686.rpm
libvirt-nss-4.5.0-10.el7_6.9.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2018-12126
https://access.redhat.com/security/cve/CVE-2018-12127
https://access.redhat.com/security/cve/CVE-2018-12130
https://access.redhat.com/security/cve/CVE-2019-11091
https://access.redhat.com/security/vulnerabilities/mds
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=KkUM
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. 6.5) - x86_64
3. Description:
Kernel-based Virtual Machine (KVM) is a full virtualization solution for
Linux on a variety of architectures. The qemu-kvm packages provide the
user-space component for running virtual machines that use KVM. Once
all virtual machines have shut down, start them again for this update to
take effect. ==========================================================================
Ubuntu Security Notice USN-3981-1
May 14, 2019
linux, linux-aws, linux-gcp, linux-kvm, linux-oem, linux-oracle,
linux-raspi2, linux-snapdragon vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-kvm: Linux kernel for cloud environments
- linux-oem: Linux kernel for OEM processors
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi2: Linux kernel for Raspberry Pi 2
- linux-snapdragon: Linux kernel for Snapdragon processors
Details:
Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Giorgi Maisuradze, Dan
Horea Lutas, Andrei Lutas, Volodymyr Pikhur, Stephan van Schaik, Alyssa
Milburn, Sebastian \xd6sterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos,
Cristiano Giuffrida, Moritz Lipp, Michael Schwarz, and Daniel Gruss
discovered that memory previously stored in microarchitectural fill buffers
of an Intel CPU core may be exposed to a malicious process that is
executing on the same CPU core. A local attacker could use this to expose
sensitive information. (CVE-2018-12130)
Brandon Falk, Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Stephan
van Schaik, Alyssa Milburn, Sebastian \xd6sterlund, Pietro Frigo, Kaveh
Razavi, Herbert Bos, and Cristiano Giuffrida discovered that memory
previously stored in microarchitectural load ports of an Intel CPU core may
be exposed to a malicious process that is executing on the same CPU core. A
local attacker could use this to expose sensitive information.
(CVE-2018-12127)
Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Marina Minkin, Daniel
Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel
Gruss, Berk Sunar, Frank Piessens, and Yuval Yarom discovered that memory
previously stored in microarchitectural store buffers of an Intel CPU core
may be exposed to a malicious process that is executing on the same CPU
core. A local attacker could use this to expose sensitive information.
(CVE-2018-12126)
Vasily Averin and Evgenii Shatokhin discovered that a use-after-free
vulnerability existed in the NFS41+ subsystem when multiple network
namespaces are in use. A local attacker in a container could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2018-16884)
Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Volodrmyr Pikhur,
Moritz Lipp, Michael Schwarz, Daniel Gruss, Stephan van Schaik, Alyssa
Milburn, Sebastian \xd6sterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and
Cristiano Giuffrida discovered that uncacheable memory previously stored in
microarchitectural buffers of an Intel CPU core may be exposed to a
malicious process that is executing on the same CPU core. A local attacker
could use this to expose sensitive information. (CVE-2019-11091)
Matteo Croce, Natale Vinto, and Andrea Spagnolo discovered that the cgroups
subsystem of the Linux kernel did not properly account for SCTP socket
buffers. A local attacker could use this to cause a denial of service
(system crash). (CVE-2019-3874)
Alex Williamson discovered that the vfio subsystem of the Linux kernel did
not properly limit DMA mappings. A local attacker could use this to cause a
denial of service (memory exhaustion). (CVE-2019-3882)
Hugues Anguelkov discovered that the Broadcom Wifi driver in the Linux
kernel contained a heap buffer overflow. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2019-9500)
Hugues Anguelkov discovered that the Broadcom Wifi driver in the Linux
kernel did not properly prevent remote firmware events from being processed
for USB Wifi devices. A physically proximate attacker could use this to
send firmware events to the device. (CVE-2019-9503)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
linux-image-4.15.0-1013-oracle 4.15.0-1013.15
linux-image-4.15.0-1032-gcp 4.15.0-1032.34
linux-image-4.15.0-1034-kvm 4.15.0-1034.34
linux-image-4.15.0-1036-raspi2 4.15.0-1036.38
linux-image-4.15.0-1038-oem 4.15.0-1038.43
linux-image-4.15.0-1039-aws 4.15.0-1039.41
linux-image-4.15.0-1053-snapdragon 4.15.0-1053.57
linux-image-4.15.0-50-generic 4.15.0-50.54
linux-image-4.15.0-50-generic-lpae 4.15.0-50.54
linux-image-4.15.0-50-lowlatency 4.15.0-50.54
linux-image-4.15.0-50-snapdragon 4.15.0-50.54
linux-image-aws 4.15.0.1039.38
linux-image-gcp 4.15.0.1032.34
linux-image-generic 4.15.0.50.52
linux-image-generic-lpae 4.15.0.50.52
linux-image-kvm 4.15.0.1034.34
linux-image-lowlatency 4.15.0.50.52
linux-image-oem 4.15.0.1038.43
linux-image-oracle 4.15.0.1013.16
linux-image-powerpc-e500mc 4.15.0.50.52
linux-image-powerpc-smp 4.15.0.50.52
linux-image-powerpc64-emb 4.15.0.50.52
linux-image-powerpc64-smp 4.15.0.50.52
linux-image-raspi2 4.15.0.1036.34
linux-image-snapdragon 4.15.0.1053.56
linux-image-virtual 4.15.0.50.52
After a standard system update you need to reboot your computer to make
all the necessary changes.
Please note that fully mitigating the Microarchitectural Data Sampling
(MDS) issues (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and
CVE-2019-11091) requires corresponding processor microcode/firmware
updates or, in virtual environments, hypervisor updates. 7.4) - ppc64, ppc64le, x86_64
3. Description:
The kernel packages contain the Linux kernel, the core of any Linux
operating system. (CVE-2019-11091)
* kernel: Buffer overflow in firewire driver via crafted incoming packets
(CVE-2016-8633)
* kernel: crypto: privilege escalation in skcipher_recvmsg function
(CVE-2017-13215)
* Kernel: ipsec: xfrm: use-after-free leading to potential privilege
escalation (CVE-2017-16939)
* kernel: Out-of-bounds write via userland offsets in ebt_entry struct in
netfilter/ebtables.c (CVE-2018-1068)
* kernel: Use-after-free due to race condition in AF_PACKET implementation
(CVE-2018-18559)
* kernel: media: use-after-free in [tuner-xc2028] media driver
(CVE-2016-7913)
* kernel: Out-of-bounds access via an XFRM_MSG_MIGRATE xfrm Netlink message
(CVE-2017-11600)
* kernel: memory leak when merging buffers in SCSI IO vectors
(CVE-2017-12190)
* kernel: Unallocated memory access by malicious USB device via
bNumInterfaces overflow (CVE-2017-17558)
* Kernel: KVM: DoS via write flood to I/O port 0x80 (CVE-2017-1000407)
* Kernel: FPU state information leakage via lazy FPU restore
(CVE-2018-3665)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Bug Fix(es):
* rwsem in inconsistent state leading system to hung (BZ#1690321)
* efi_bgrt_init fails to ioremap error during boot (BZ#1692284)
4
| VAR-201905-0711 | CVE-2018-12130 | Multiple Intel Product Information Disclosure Vulnerabilities (CNVD-2019-22233) |
CVSS V2: 4.7 CVSS V3: 5.6 Severity: MEDIUM |
Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf. Intel Xeon Scalable Processors and so on are products of Intel Corporation of the United States. Intel XeonScalable Processors is a scalable server central processing unit (CPU). IntelXeonProcessorE7v4Family is a XeonE7 series server central processing unit (CPU). IntelXeonProcessorE5v4Family is a XeonE5 series server central processing unit (CPU). An information disclosure vulnerability exists in several Intel products. The vulnerability stems from errors in the configuration of the network system or product during operation. An unauthorized attacker can exploit the vulnerability to obtain sensitive information about the affected component. The following products and versions are affected: Intel Xeon Scalable Processors; Xeon Processor E7 v4 Family; Xeon Processor E5 v4 Family; Xeon Processor E3 v6 Family; Xeon Processor E3 v4 Family; Xeon Processor E; Xeon E Processor; Xeon D Processor; Puma; Pentium Processor Silver Series; Pentium Processor N Series; Pentium Processor J Series; Pentium Gold Processor Series; Mobile Communications Platforms; Microcode; Core X series Processors; Celeron Processor N Series; Celeron Processor J Series; Celeron Processor G Series; Atom Processor X Series ;Atom Processor E3900 Series;Atom Processor E3800 Series;Atom Processor.
The vulnerability is due to improper memory operations that could expose a side channel on the affected system. A successful exploit could be used to conduct further attacks.
Proof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available. A third-party patch is also available. The appliance is available
to download as an OVA file from the Customer Portal. 7.2) - noarch, x86_64
3. Description:
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Bug Fix(es):
* rwsem in inconsistent state leading system to hung (BZ#1690318)
4. ==========================================================================
Ubuntu Security Notice USN-3981-2
May 15, 2019
linux-hwe, linux-azure, linux-gcp, linux-oracle vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
- Ubuntu 14.04 ESM
Summary:
Several security issues were fixed in the Linux kernel. This update provides the corresponding updates for the Linux
Hardware Enablement (HWE) kernel from Ubuntu 18.04 LTS for Ubuntu
16.04 LTS and for the Linux Azure kernel for Ubuntu 14.04 LTS.
Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Giorgi Maisuradze, Dan
Horea Lutas, Andrei Lutas, Volodymyr Pikhur, Stephan van Schaik, Alyssa
Milburn, Sebastian \xd6sterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos,
Cristiano Giuffrida, Moritz Lipp, Michael Schwarz, and Daniel Gruss
discovered that memory previously stored in microarchitectural fill buffers
of an Intel CPU core may be exposed to a malicious process that is
executing on the same CPU core. (CVE-2018-12130)
Brandon Falk, Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Stephan
van Schaik, Alyssa Milburn, Sebastian \xd6sterlund, Pietro Frigo, Kaveh
Razavi, Herbert Bos, and Cristiano Giuffrida discovered that memory
previously stored in microarchitectural load ports of an Intel CPU core may
be exposed to a malicious process that is executing on the same CPU core.
(CVE-2018-12127)
Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Marina Minkin, Daniel
Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel
Gruss, Berk Sunar, Frank Piessens, and Yuval Yarom discovered that memory
previously stored in microarchitectural store buffers of an Intel CPU core
may be exposed to a malicious process that is executing on the same CPU
core.
(CVE-2018-12126)
Vasily Averin and Evgenii Shatokhin discovered that a use-after-free
vulnerability existed in the NFS41+ subsystem when multiple network
namespaces are in use. A local attacker in a container could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2018-16884)
Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Volodrmyr Pikhur,
Moritz Lipp, Michael Schwarz, Daniel Gruss, Stephan van Schaik, Alyssa
Milburn, Sebastian \xd6sterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and
Cristiano Giuffrida discovered that uncacheable memory previously stored in
microarchitectural buffers of an Intel CPU core may be exposed to a
malicious process that is executing on the same CPU core. (CVE-2019-11091)
Matteo Croce, Natale Vinto, and Andrea Spagnolo discovered that the cgroups
subsystem of the Linux kernel did not properly account for SCTP socket
buffers. A local attacker could use this to cause a denial of service
(system crash). (CVE-2019-3874)
Alex Williamson discovered that the vfio subsystem of the Linux kernel did
not properly limit DMA mappings. A local attacker could use this to cause a
denial of service (memory exhaustion). (CVE-2019-3882)
Hugues Anguelkov discovered that the Broadcom Wifi driver in the Linux
kernel contained a heap buffer overflow. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2019-9500)
Hugues Anguelkov discovered that the Broadcom Wifi driver in the Linux
kernel did not properly prevent remote firmware events from being processed
for USB Wifi devices. A physically proximate attacker could use this to
send firmware events to the device. (CVE-2019-9503)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
linux-image-4.15.0-1013-oracle 4.15.0-1013.15~16.04.1
linux-image-4.15.0-1032-gcp 4.15.0-1032.34~16.04.1
linux-image-4.15.0-1045-azure 4.15.0-1045.49
linux-image-4.15.0-50-generic 4.15.0-50.54~16.04.1
linux-image-4.15.0-50-generic-lpae 4.15.0-50.54~16.04.1
linux-image-4.15.0-50-lowlatency 4.15.0-50.54~16.04.1
linux-image-azure 4.15.0.1045.49
linux-image-gcp 4.15.0.1032.46
linux-image-generic-hwe-16.04 4.15.0.50.71
linux-image-generic-lpae-hwe-16.04 4.15.0.50.71
linux-image-gke 4.15.0.1032.46
linux-image-lowlatency-hwe-16.04 4.15.0.50.71
linux-image-oem 4.15.0.50.71
linux-image-oracle 4.15.0.1013.7
linux-image-virtual-hwe-16.04 4.15.0.50.71
Ubuntu 14.04 ESM:
linux-image-4.15.0-1045-azure 4.15.0-1045.49~14.04.1
linux-image-azure 4.15.0.1045.32
After a standard system update you need to reboot your computer to make
all the necessary changes.
Please note that fully mitigating the Microarchitectural Data Sampling
(MDS) issues (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and
CVE-2019-11091) requires corresponding processor microcode/firmware
updates or, in virtual environments, hypervisor updates. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
============================================================================
FreeBSD-SA-19:26.mcu Security Advisory
The FreeBSD Project
Topic: Intel CPU Microcode Update
Category: 3rd party
Module: Intel CPU microcode
Announced: 2019-11-12
Credits: Intel
Affects: All supported versions of FreeBSD running on certain
Intel CPUs.
CVE Name: CVE-2019-11135, CVE-2019-11139, CVE-2018-12126,
CVE-2018-12127, CVE-2018-12130, CVE-2018-11091,
CVE-2017-5715
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:https://security.FreeBSD.org/>. Background
- From time to time Intel releases new CPU microcode to address functional
issues and security vulnerabilities. Such a release is also known as a
Micro Code Update (MCU), and is a component of a broader Intel Platform
Update (IPU). FreeBSD distributes CPU microcode via the devcpu-data port
and package.
II. Problem Description
Starting with version 1.26, the devcpu-data port/package includes updates and
mitigations for the following technical and security advisories (depending
on CPU model).
Intel TSX Updates (TAA) CVE-2019-11135
Voltage Modulation Vulnerability CVE-2019-11139
MD_CLEAR Operations CVE-2018-12126
CVE-2018-12127
CVE-2018-12130
CVE-2018-11091
TA Indirect Sharing CVE-2017-5715
EGETKEY CVE-2018-12126
CVE-2018-12127
CVE-2018-12130
CVE-2018-11091
JCC SKX102 Erratum
Updated microcode includes mitigations for CPU issues, but may also cause a
performance regression due to the JCC erratum mitigation. Please visit
http://www.intel.com/benchmarks for further information.
Please visit http://www.intel.com/security for detailed information on
these advisories as well as a list of CPUs that are affected.
III. Impact
Operating a CPU without the latest microcode may result in erratic or
unpredictable behavior, including system crashes and lock ups. Certain
issues listed in this advisory may result in the leakage of privileged
system information to unprivileged users.
IV. Workaround
To determine if TSX is present in your system, run the following:
1. kldload cpuctl
2. cpucontrol -i 7 /dev/cpuctl0
If bits 4 (0x10) and 11 (0x800) are set in the second response word (EBX),
TSX is present.
In the absence of updated microcode, TAA can be mitigated by enabling the
MDS mitigation:
3. sysctl hw.mds_disable=1
Systems must be running FreeBSD 11.3, FreeBSD 12.1, or later for this to
work.
*IMPORTANT*
If your use case can tolerate leaving the CPU issues unmitigated and cannot
tolerate a performance regression, ensure that the devcpu-data package is
not installed or is locked at 1.25 or earlier.
# pkg delete devcpu-data
or
# pkg lock devcpu-data
Later versions of the LLVM and GCC compilers will include changes that
partially relieve the peformance impact.
V. Solution
Install the latest Intel Microcode Update via the devcpu-data port/package,
version 1.26 or later.
Updated microcode adds the ability to disable TSX. With updated microcode
the issue can still be mitigated by enabling the MDS mitigation as
described in the workaround section, or by disabling TSX instead:
1. kldload cpuctl
2. cpucontrol -i 7 /dev/cpuctl0
If bit 29 (0x20000000) is set in the fourth response word (EDX), then the
0x10a MSR is present. cpucontrol -m 0x10a /dev/cpuctl0
If bit 8 (0x100) of the response word is set, your CPU is not vulnerable to
TAA and no further action is required.
If bit 7 (0x80) is cleared, then your CPU does not have updated microcode
that facilitates TSX to be disabled. The only remedy available is to
enable the MDS mitigation, as documented above. cpucontrol -m 0x122=3 /dev/cpuctl0
Repeat step 4 for each numbered CPU that is present.
A future kernel change to FreeBSD will provide automatic detection and
mitigation for TAA.
LLVM 9.0 will be updated in FreeBSD 13-current to address the JCC
peformance impact. Updates to prior versions of LLVM are currently being
evaluated.
VI. Correction details
There are currently no changes in FreeBSD to address this issue.
VII. Relevant releases/architectures:
RHV-M 4.2 - noarch
3.
It includes the configuration of the Red Hat Support plugin, copying
downstream-only artifacts to the ISO domain, and links to the knowledgebase
and other support material. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: libvirt security update
Advisory ID: RHSA-2019:1180-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2019:1180
Issue date: 2019-05-14
CVE Names: CVE-2018-12126 CVE-2018-12127 CVE-2018-12130
CVE-2019-11091
=====================================================================
1. Summary:
An update for libvirt is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - x86_64
3. Description:
The libvirt library contains a C API for managing and interacting with the
virtualization capabilities of Linux and other operating systems. In
addition, libvirt provides tools for remote management of virtualized
systems.
Security Fix(es):
* A flaw was found in the implementation of the "fill buffer", a mechanism
used by modern CPUs when a cache-miss is made on L1 CPU cache. If an
attacker can generate a load operation that would create a page fault, the
execution will continue speculatively with incorrect data from the fill
buffer while the data is fetched from higher level caches. This response
time can be measured to infer data in the fill buffer. (CVE-2018-12130)
* Modern Intel microprocessors implement hardware-level micro-optimizations
to improve the performance of writing data back to CPU caches. The write
operation is split into STA (STore Address) and STD (STore Data)
sub-operations. These sub-operations allow the processor to hand-off
address generation logic into these sub-operations for optimized writes.
Both of these sub-operations write to a shared distributed processor
structure called the 'processor store buffer'. As a result, an unprivileged
attacker could use this flaw to read private data resident within the CPU's
processor store buffer. (CVE-2018-12126)
* Microprocessors use a ‘load port’ subcomponent to perform load operations
from memory or IO. During a load operation, the load port receives data
from the memory or IO subsystem and then provides the data to the CPU
registers and operations in the CPU’s pipelines. Stale load operations
results are stored in the 'load port' table until overwritten by newer
operations. Certain load-port operations triggered by an attacker can be
used to reveal data about previous stale requests leaking data back to the
attacker via a timing side-channel. (CVE-2019-11091)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, libvirtd will be restarted
automatically.
5. Bugs fixed (https://bugzilla.redhat.com/):
1646781 - CVE-2018-12126 hardware: Microarchitectural Store Buffer Data Sampling (MSBDS)
1646784 - CVE-2018-12130 hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS)
1667782 - CVE-2018-12127 hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS)
1705312 - CVE-2019-11091 hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
6. Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source:
libvirt-0.10.2-64.el6_10.1.src.rpm
i386:
libvirt-0.10.2-64.el6_10.1.i686.rpm
libvirt-client-0.10.2-64.el6_10.1.i686.rpm
libvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm
libvirt-python-0.10.2-64.el6_10.1.i686.rpm
x86_64:
libvirt-0.10.2-64.el6_10.1.x86_64.rpm
libvirt-client-0.10.2-64.el6_10.1.i686.rpm
libvirt-client-0.10.2-64.el6_10.1.x86_64.rpm
libvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm
libvirt-debuginfo-0.10.2-64.el6_10.1.x86_64.rpm
libvirt-python-0.10.2-64.el6_10.1.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
i386:
libvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm
libvirt-devel-0.10.2-64.el6_10.1.i686.rpm
x86_64:
libvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm
libvirt-debuginfo-0.10.2-64.el6_10.1.x86_64.rpm
libvirt-devel-0.10.2-64.el6_10.1.i686.rpm
libvirt-devel-0.10.2-64.el6_10.1.x86_64.rpm
libvirt-lock-sanlock-0.10.2-64.el6_10.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source:
libvirt-0.10.2-64.el6_10.1.src.rpm
x86_64:
libvirt-0.10.2-64.el6_10.1.x86_64.rpm
libvirt-client-0.10.2-64.el6_10.1.i686.rpm
libvirt-client-0.10.2-64.el6_10.1.x86_64.rpm
libvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm
libvirt-debuginfo-0.10.2-64.el6_10.1.x86_64.rpm
libvirt-python-0.10.2-64.el6_10.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
x86_64:
libvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm
libvirt-debuginfo-0.10.2-64.el6_10.1.x86_64.rpm
libvirt-devel-0.10.2-64.el6_10.1.i686.rpm
libvirt-devel-0.10.2-64.el6_10.1.x86_64.rpm
libvirt-lock-sanlock-0.10.2-64.el6_10.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source:
libvirt-0.10.2-64.el6_10.1.src.rpm
i386:
libvirt-0.10.2-64.el6_10.1.i686.rpm
libvirt-client-0.10.2-64.el6_10.1.i686.rpm
libvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm
libvirt-devel-0.10.2-64.el6_10.1.i686.rpm
libvirt-python-0.10.2-64.el6_10.1.i686.rpm
ppc64:
libvirt-0.10.2-64.el6_10.1.ppc64.rpm
libvirt-client-0.10.2-64.el6_10.1.ppc.rpm
libvirt-client-0.10.2-64.el6_10.1.ppc64.rpm
libvirt-debuginfo-0.10.2-64.el6_10.1.ppc.rpm
libvirt-debuginfo-0.10.2-64.el6_10.1.ppc64.rpm
libvirt-devel-0.10.2-64.el6_10.1.ppc.rpm
libvirt-devel-0.10.2-64.el6_10.1.ppc64.rpm
libvirt-python-0.10.2-64.el6_10.1.ppc64.rpm
s390x:
libvirt-0.10.2-64.el6_10.1.s390x.rpm
libvirt-client-0.10.2-64.el6_10.1.s390.rpm
libvirt-client-0.10.2-64.el6_10.1.s390x.rpm
libvirt-debuginfo-0.10.2-64.el6_10.1.s390.rpm
libvirt-debuginfo-0.10.2-64.el6_10.1.s390x.rpm
libvirt-devel-0.10.2-64.el6_10.1.s390.rpm
libvirt-devel-0.10.2-64.el6_10.1.s390x.rpm
libvirt-python-0.10.2-64.el6_10.1.s390x.rpm
x86_64:
libvirt-0.10.2-64.el6_10.1.x86_64.rpm
libvirt-client-0.10.2-64.el6_10.1.i686.rpm
libvirt-client-0.10.2-64.el6_10.1.x86_64.rpm
libvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm
libvirt-debuginfo-0.10.2-64.el6_10.1.x86_64.rpm
libvirt-devel-0.10.2-64.el6_10.1.i686.rpm
libvirt-devel-0.10.2-64.el6_10.1.x86_64.rpm
libvirt-python-0.10.2-64.el6_10.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
x86_64:
libvirt-debuginfo-0.10.2-64.el6_10.1.x86_64.rpm
libvirt-lock-sanlock-0.10.2-64.el6_10.1.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source:
libvirt-0.10.2-64.el6_10.1.src.rpm
i386:
libvirt-0.10.2-64.el6_10.1.i686.rpm
libvirt-client-0.10.2-64.el6_10.1.i686.rpm
libvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm
libvirt-devel-0.10.2-64.el6_10.1.i686.rpm
libvirt-python-0.10.2-64.el6_10.1.i686.rpm
x86_64:
libvirt-0.10.2-64.el6_10.1.x86_64.rpm
libvirt-client-0.10.2-64.el6_10.1.i686.rpm
libvirt-client-0.10.2-64.el6_10.1.x86_64.rpm
libvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm
libvirt-debuginfo-0.10.2-64.el6_10.1.x86_64.rpm
libvirt-devel-0.10.2-64.el6_10.1.i686.rpm
libvirt-devel-0.10.2-64.el6_10.1.x86_64.rpm
libvirt-python-0.10.2-64.el6_10.1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
x86_64:
libvirt-debuginfo-0.10.2-64.el6_10.1.x86_64.rpm
libvirt-lock-sanlock-0.10.2-64.el6_10.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2018-12126
https://access.redhat.com/security/cve/CVE-2018-12127
https://access.redhat.com/security/cve/CVE-2018-12130
https://access.redhat.com/security/cve/CVE-2019-11091
https://access.redhat.com/security/vulnerabilities/mds
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=CE4I
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. Description:
Kernel-based Virtual Machine (KVM) is a full virtualization solution for
Linux on a variety of architectures. The qemu-kvm packages provide the
user-space component for running virtual machines that use KVM. Once
all virtual machines have shut down, start them again for this update to
take effect. These packages include redhat-release-virtualization-host,
ovirt-node, and rhev-hypervisor. RHVH features a Cockpit user
interface for monitoring the host's resources and performing administrative
tasks. These
packages include redhat-release-virtualization-host, ovirt-node, and
rhev-hypervisor. RHVH features a Cockpit user interface for
monitoring the host's resources and performing administrative tasks
| VAR-201905-1185 | CVE-2019-0981 | Microsoft .NET Framework and .NET Core Service disruption in (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A denial of service vulnerability exists when .NET Framework or .NET Core improperly handle web requests, aka '.Net Framework and .Net Core Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0820, CVE-2019-0980. This vulnerability CVE-2019-0820 and CVE-2019-0980 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Both Microsoft .NET Core and Microsoft ASP.NET Core are products of Microsoft Corporation of the United States. .NET Core is a free open source development platform. The platform has features such as multi-language support and cross-platform. Microsoft ASP.NET Core is a cross-platform open source framework. The framework is used to build cloud-based applications such as web applications, IoT applications, and mobile backends. The vulnerability originates from improper design or implementation during code development of a network system or product. The following products and versions are affected: Microsoft .NET Framework version 4.7.2, version 4.7.1, version 4.6.2, version 4.6.1, version 3.5.1, version 4.8, version 4.7, version 4.6, version 4.5.2, Version 3.5, 3.0 SP2, 2.0 SP2; .NET Core 2.2, 2.1, 1.1, 1.0.
An attacker can exploit this issue to cause a denial of service condition.
Bug Fix(es):
* dotnet: new SocketException((int)SocketError.InvalidArgument).Message is
empty (BZ#1712471)
4. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: .NET Core on Red Hat Enterprise Linux security and bug fix update
Advisory ID: RHSA-2019:1236-01
Product: .NET Core on Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2019:1236
Issue date: 2019-05-15
CVE Names: CVE-2019-0820 CVE-2019-0980 CVE-2019-0981
====================================================================
1. Summary:
Updates for rh-dotnetcore10-dotnetcore, rh-dotnetcore11-dotnetcore,
rh-dotnet21-dotnet, rh-dotnet22-dotnet and rh-dotnet22-curl are now
available for .NET Core on Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
.NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64
.NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64
3. It implements a subset of the
.NET framework APIs and several new APIs, and it includes a CLR
implementation.
Security Fix(es):
* dotNET: timeouts for regular expressions are not enforced (CVE-2019-0820)
* dotNET: infinite loop in URI.TryCreate leading to ASP.Net Core Denial of
Service (CVE-2019-0980)
* dotNET: crash in IPAddress.TryCreate leading to ASP.Net Core Denial of
Service (CVE-2019-0981)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Bug Fix(es):
* Re-enable bash completion in rh-dotnet22-dotnet (BZ#1654863)
* Error rebuilding rh-dotnet22-curl in CentOS (BZ#1678932)
* Broken apphost caused by unset DOTNET_ROOT (BZ#1703479)
* Make bash completion compatible with rh-dotnet22 packages (BZ#1705259)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1654863 - Re-enable bash completion in rh-dotnet22-dotnet
1678932 - Error rebuilding rh-dotnet22-curl in CentOS
1703479 - Broken apphost caused by unset DOTNET_ROOT
1703508 - Update to .NET Core 1.1.13
1704454 - Update to .NET Core 1.0.16
1704934 - Update to .NET Core Runtime 2.2.5 and SDK 2.2.107
1705147 - Update to .NET Core Runtime 2.1.11 and SDK 2.1.507
1705259 - Make bash completion compatible with rh-dotnet22 packages
1705502 - CVE-2019-0980 dotNET: infinite loop in URI.TryCreate leading to ASP.Net Core Denial of Service
1705504 - CVE-2019-0981 dotNET: crash in IPAddress.TryCreate leading to ASP.Net Core Denial of Service
1705506 - CVE-2019-0820 dotNET: timeouts for regular expressions are not enforced
6. Package List:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
rh-dotnet22-2.2-7.el7.src.rpm
rh-dotnet22-curl-7.61.1-2.el7.src.rpm
rh-dotnet22-dotnet-2.2.107-2.el7.src.rpm
x86_64:
rh-dotnet22-2.2-7.el7.x86_64.rpm
rh-dotnet22-curl-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-curl-debuginfo-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-dotnet-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-debuginfo-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-host-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-host-fxr-2.2-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-runtime-2.2-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-libcurl-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-libcurl-devel-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-runtime-2.2-7.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source:
rh-dotnetcore10-dotnetcore-1.0.16-1.el7.src.rpm
x86_64:
rh-dotnetcore10-dotnetcore-1.0.16-1.el7.x86_64.rpm
rh-dotnetcore10-dotnetcore-debuginfo-1.0.16-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source:
rh-dotnetcore11-dotnetcore-1.1.13-1.el7.src.rpm
x86_64:
rh-dotnetcore11-dotnetcore-1.1.13-1.el7.x86_64.rpm
rh-dotnetcore11-dotnetcore-debuginfo-1.1.13-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source:
rh-dotnet21-2.1-10.el7.src.rpm
rh-dotnet21-dotnet-2.1.507-2.el7.src.rpm
x86_64:
rh-dotnet21-2.1-10.el7.x86_64.rpm
rh-dotnet21-dotnet-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-dotnet-debuginfo-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-dotnet-host-2.1.11-2.el7.x86_64.rpm
rh-dotnet21-dotnet-runtime-2.1-2.1.11-2.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-runtime-2.1-10.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source:
rh-dotnet22-2.2-7.el7.src.rpm
rh-dotnet22-curl-7.61.1-2.el7.src.rpm
rh-dotnet22-dotnet-2.2.107-2.el7.src.rpm
x86_64:
rh-dotnet22-2.2-7.el7.x86_64.rpm
rh-dotnet22-curl-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-curl-debuginfo-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-dotnet-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-debuginfo-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-host-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-host-fxr-2.2-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-runtime-2.2-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-libcurl-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-libcurl-devel-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-runtime-2.2-7.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-dotnetcore10-dotnetcore-1.0.16-1.el7.src.rpm
x86_64:
rh-dotnetcore10-dotnetcore-1.0.16-1.el7.x86_64.rpm
rh-dotnetcore10-dotnetcore-debuginfo-1.0.16-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-dotnetcore11-dotnetcore-1.1.13-1.el7.src.rpm
x86_64:
rh-dotnetcore11-dotnetcore-1.1.13-1.el7.x86_64.rpm
rh-dotnetcore11-dotnetcore-debuginfo-1.1.13-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-dotnet21-2.1-10.el7.src.rpm
rh-dotnet21-dotnet-2.1.507-2.el7.src.rpm
x86_64:
rh-dotnet21-2.1-10.el7.x86_64.rpm
rh-dotnet21-dotnet-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-dotnet-debuginfo-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-dotnet-host-2.1.11-2.el7.x86_64.rpm
rh-dotnet21-dotnet-runtime-2.1-2.1.11-2.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-runtime-2.1-10.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-dotnet22-2.2-7.el7.src.rpm
rh-dotnet22-curl-7.61.1-2.el7.src.rpm
rh-dotnet22-dotnet-2.2.107-2.el7.src.rpm
x86_64:
rh-dotnet22-2.2-7.el7.x86_64.rpm
rh-dotnet22-curl-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-curl-debuginfo-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-dotnet-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-debuginfo-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-host-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-host-fxr-2.2-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-runtime-2.2-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-libcurl-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-libcurl-devel-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-runtime-2.2-7.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2019-0820
https://access.redhat.com/security/cve/CVE-2019-0980
https://access.redhat.com/security/cve/CVE-2019-0981
https://access.redhat.com/security/updates/classification/#moderate
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0820
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0980
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0981
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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dJ6F
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201905-0991 | CVE-2019-0820 | .NET Framework and .NET Core Vulnerable to denial of service operation |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A denial of service vulnerability exists when .NET Framework and .NET Core improperly process RegEx strings, aka '.NET Framework and .NET Core Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0980, CVE-2019-0981. This vulnerability CVE-2019-0980 and CVE-2019-0981 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state.
An attacker can exploit this issue to cause a denial of service condition.
Bug Fix(es):
* dotnet: new SocketException((int)SocketError.InvalidArgument).Message is
empty (BZ#1712471)
4. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: .NET Core on Red Hat Enterprise Linux security and bug fix update
Advisory ID: RHSA-2019:1236-01
Product: .NET Core on Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2019:1236
Issue date: 2019-05-15
CVE Names: CVE-2019-0820 CVE-2019-0980 CVE-2019-0981
====================================================================
1. Summary:
Updates for rh-dotnetcore10-dotnetcore, rh-dotnetcore11-dotnetcore,
rh-dotnet21-dotnet, rh-dotnet22-dotnet and rh-dotnet22-curl are now
available for .NET Core on Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
.NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64
.NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64
3. It implements a subset of the
.NET framework APIs and several new APIs, and it includes a CLR
implementation.
New versions of .NET Core that address security vulnerabilities are now
available. The updated versions are .NET Core 1.0.16, 1.1.13, 2.1.11, and
2.2.5.
Security Fix(es):
* dotNET: timeouts for regular expressions are not enforced (CVE-2019-0820)
* dotNET: infinite loop in URI.TryCreate leading to ASP.Net Core Denial of
Service (CVE-2019-0980)
* dotNET: crash in IPAddress.TryCreate leading to ASP.Net Core Denial of
Service (CVE-2019-0981)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Bug Fix(es):
* Re-enable bash completion in rh-dotnet22-dotnet (BZ#1654863)
* Error rebuilding rh-dotnet22-curl in CentOS (BZ#1678932)
* Broken apphost caused by unset DOTNET_ROOT (BZ#1703479)
* Make bash completion compatible with rh-dotnet22 packages (BZ#1705259)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1654863 - Re-enable bash completion in rh-dotnet22-dotnet
1678932 - Error rebuilding rh-dotnet22-curl in CentOS
1703479 - Broken apphost caused by unset DOTNET_ROOT
1703508 - Update to .NET Core 1.1.13
1704454 - Update to .NET Core 1.0.16
1704934 - Update to .NET Core Runtime 2.2.5 and SDK 2.2.107
1705147 - Update to .NET Core Runtime 2.1.11 and SDK 2.1.507
1705259 - Make bash completion compatible with rh-dotnet22 packages
1705502 - CVE-2019-0980 dotNET: infinite loop in URI.TryCreate leading to ASP.Net Core Denial of Service
1705504 - CVE-2019-0981 dotNET: crash in IPAddress.TryCreate leading to ASP.Net Core Denial of Service
1705506 - CVE-2019-0820 dotNET: timeouts for regular expressions are not enforced
6. Package List:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
rh-dotnetcore10-dotnetcore-1.0.16-1.el7.src.rpm
x86_64:
rh-dotnetcore10-dotnetcore-1.0.16-1.el7.x86_64.rpm
rh-dotnetcore10-dotnetcore-debuginfo-1.0.16-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
rh-dotnetcore11-dotnetcore-1.1.13-1.el7.src.rpm
x86_64:
rh-dotnetcore11-dotnetcore-1.1.13-1.el7.x86_64.rpm
rh-dotnetcore11-dotnetcore-debuginfo-1.1.13-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
rh-dotnet21-2.1-10.el7.src.rpm
rh-dotnet21-dotnet-2.1.507-2.el7.src.rpm
x86_64:
rh-dotnet21-2.1-10.el7.x86_64.rpm
rh-dotnet21-dotnet-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-dotnet-debuginfo-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-dotnet-host-2.1.11-2.el7.x86_64.rpm
rh-dotnet21-dotnet-runtime-2.1-2.1.11-2.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-runtime-2.1-10.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
rh-dotnet22-2.2-7.el7.src.rpm
rh-dotnet22-curl-7.61.1-2.el7.src.rpm
rh-dotnet22-dotnet-2.2.107-2.el7.src.rpm
x86_64:
rh-dotnet22-2.2-7.el7.x86_64.rpm
rh-dotnet22-curl-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-curl-debuginfo-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-dotnet-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-debuginfo-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-host-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-host-fxr-2.2-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-runtime-2.2-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-libcurl-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-libcurl-devel-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-runtime-2.2-7.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source:
rh-dotnetcore10-dotnetcore-1.0.16-1.el7.src.rpm
x86_64:
rh-dotnetcore10-dotnetcore-1.0.16-1.el7.x86_64.rpm
rh-dotnetcore10-dotnetcore-debuginfo-1.0.16-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source:
rh-dotnetcore11-dotnetcore-1.1.13-1.el7.src.rpm
x86_64:
rh-dotnetcore11-dotnetcore-1.1.13-1.el7.x86_64.rpm
rh-dotnetcore11-dotnetcore-debuginfo-1.1.13-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source:
rh-dotnet21-2.1-10.el7.src.rpm
rh-dotnet21-dotnet-2.1.507-2.el7.src.rpm
x86_64:
rh-dotnet21-2.1-10.el7.x86_64.rpm
rh-dotnet21-dotnet-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-dotnet-debuginfo-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-dotnet-host-2.1.11-2.el7.x86_64.rpm
rh-dotnet21-dotnet-runtime-2.1-2.1.11-2.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-runtime-2.1-10.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source:
rh-dotnet22-2.2-7.el7.src.rpm
rh-dotnet22-curl-7.61.1-2.el7.src.rpm
rh-dotnet22-dotnet-2.2.107-2.el7.src.rpm
x86_64:
rh-dotnet22-2.2-7.el7.x86_64.rpm
rh-dotnet22-curl-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-curl-debuginfo-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-dotnet-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-debuginfo-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-host-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-host-fxr-2.2-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-runtime-2.2-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-libcurl-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-libcurl-devel-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-runtime-2.2-7.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-dotnetcore10-dotnetcore-1.0.16-1.el7.src.rpm
x86_64:
rh-dotnetcore10-dotnetcore-1.0.16-1.el7.x86_64.rpm
rh-dotnetcore10-dotnetcore-debuginfo-1.0.16-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-dotnetcore11-dotnetcore-1.1.13-1.el7.src.rpm
x86_64:
rh-dotnetcore11-dotnetcore-1.1.13-1.el7.x86_64.rpm
rh-dotnetcore11-dotnetcore-debuginfo-1.1.13-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-dotnet21-2.1-10.el7.src.rpm
rh-dotnet21-dotnet-2.1.507-2.el7.src.rpm
x86_64:
rh-dotnet21-2.1-10.el7.x86_64.rpm
rh-dotnet21-dotnet-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-dotnet-debuginfo-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-dotnet-host-2.1.11-2.el7.x86_64.rpm
rh-dotnet21-dotnet-runtime-2.1-2.1.11-2.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-runtime-2.1-10.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-dotnet22-2.2-7.el7.src.rpm
rh-dotnet22-curl-7.61.1-2.el7.src.rpm
rh-dotnet22-dotnet-2.2.107-2.el7.src.rpm
x86_64:
rh-dotnet22-2.2-7.el7.x86_64.rpm
rh-dotnet22-curl-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-curl-debuginfo-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-dotnet-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-debuginfo-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-host-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-host-fxr-2.2-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-runtime-2.2-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-libcurl-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-libcurl-devel-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-runtime-2.2-7.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2019-0820
https://access.redhat.com/security/cve/CVE-2019-0980
https://access.redhat.com/security/cve/CVE-2019-0981
https://access.redhat.com/security/updates/classification/#moderate
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0820
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0980
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0981
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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dJ6F
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201905-1230 | CVE-2019-0980 | Microsoft .NET Framework and .NET Core Service disruption in (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A denial of service vulnerability exists when .NET Framework or .NET Core improperly handle web requests, aka '.Net Framework and .Net Core Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0820, CVE-2019-0981. This vulnerability CVE-2019-0820 and CVE-2019-0981 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state.
An attacker can exploit this issue to cause a denial of service condition.
Bug Fix(es):
* dotnet: new SocketException((int)SocketError.InvalidArgument).Message is
empty (BZ#1712471)
4. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: .NET Core on Red Hat Enterprise Linux security and bug fix update
Advisory ID: RHSA-2019:1236-01
Product: .NET Core on Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2019:1236
Issue date: 2019-05-15
CVE Names: CVE-2019-0820 CVE-2019-0980 CVE-2019-0981
====================================================================
1. Summary:
Updates for rh-dotnetcore10-dotnetcore, rh-dotnetcore11-dotnetcore,
rh-dotnet21-dotnet, rh-dotnet22-dotnet and rh-dotnet22-curl are now
available for .NET Core on Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
.NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64
.NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64
3. It implements a subset of the
.NET framework APIs and several new APIs, and it includes a CLR
implementation.
Security Fix(es):
* dotNET: timeouts for regular expressions are not enforced (CVE-2019-0820)
* dotNET: infinite loop in URI.TryCreate leading to ASP.Net Core Denial of
Service (CVE-2019-0980)
* dotNET: crash in IPAddress.TryCreate leading to ASP.Net Core Denial of
Service (CVE-2019-0981)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Bug Fix(es):
* Re-enable bash completion in rh-dotnet22-dotnet (BZ#1654863)
* Error rebuilding rh-dotnet22-curl in CentOS (BZ#1678932)
* Broken apphost caused by unset DOTNET_ROOT (BZ#1703479)
* Make bash completion compatible with rh-dotnet22 packages (BZ#1705259)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1654863 - Re-enable bash completion in rh-dotnet22-dotnet
1678932 - Error rebuilding rh-dotnet22-curl in CentOS
1703479 - Broken apphost caused by unset DOTNET_ROOT
1703508 - Update to .NET Core 1.1.13
1704454 - Update to .NET Core 1.0.16
1704934 - Update to .NET Core Runtime 2.2.5 and SDK 2.2.107
1705147 - Update to .NET Core Runtime 2.1.11 and SDK 2.1.507
1705259 - Make bash completion compatible with rh-dotnet22 packages
1705502 - CVE-2019-0980 dotNET: infinite loop in URI.TryCreate leading to ASP.Net Core Denial of Service
1705504 - CVE-2019-0981 dotNET: crash in IPAddress.TryCreate leading to ASP.Net Core Denial of Service
1705506 - CVE-2019-0820 dotNET: timeouts for regular expressions are not enforced
6. Package List:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
rh-dotnetcore10-dotnetcore-1.0.16-1.el7.src.rpm
x86_64:
rh-dotnetcore10-dotnetcore-1.0.16-1.el7.x86_64.rpm
rh-dotnetcore10-dotnetcore-debuginfo-1.0.16-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
rh-dotnetcore11-dotnetcore-1.1.13-1.el7.src.rpm
x86_64:
rh-dotnetcore11-dotnetcore-1.1.13-1.el7.x86_64.rpm
rh-dotnetcore11-dotnetcore-debuginfo-1.1.13-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
rh-dotnet21-2.1-10.el7.src.rpm
rh-dotnet21-dotnet-2.1.507-2.el7.src.rpm
x86_64:
rh-dotnet21-2.1-10.el7.x86_64.rpm
rh-dotnet21-dotnet-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-dotnet-debuginfo-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-dotnet-host-2.1.11-2.el7.x86_64.rpm
rh-dotnet21-dotnet-runtime-2.1-2.1.11-2.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-runtime-2.1-10.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
rh-dotnet22-2.2-7.el7.src.rpm
rh-dotnet22-curl-7.61.1-2.el7.src.rpm
rh-dotnet22-dotnet-2.2.107-2.el7.src.rpm
x86_64:
rh-dotnet22-2.2-7.el7.x86_64.rpm
rh-dotnet22-curl-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-curl-debuginfo-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-dotnet-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-debuginfo-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-host-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-host-fxr-2.2-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-runtime-2.2-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-libcurl-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-libcurl-devel-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-runtime-2.2-7.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source:
rh-dotnetcore10-dotnetcore-1.0.16-1.el7.src.rpm
x86_64:
rh-dotnetcore10-dotnetcore-1.0.16-1.el7.x86_64.rpm
rh-dotnetcore10-dotnetcore-debuginfo-1.0.16-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source:
rh-dotnetcore11-dotnetcore-1.1.13-1.el7.src.rpm
x86_64:
rh-dotnetcore11-dotnetcore-1.1.13-1.el7.x86_64.rpm
rh-dotnetcore11-dotnetcore-debuginfo-1.1.13-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source:
rh-dotnet21-2.1-10.el7.src.rpm
rh-dotnet21-dotnet-2.1.507-2.el7.src.rpm
x86_64:
rh-dotnet21-2.1-10.el7.x86_64.rpm
rh-dotnet21-dotnet-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-dotnet-debuginfo-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-dotnet-host-2.1.11-2.el7.x86_64.rpm
rh-dotnet21-dotnet-runtime-2.1-2.1.11-2.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-runtime-2.1-10.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source:
rh-dotnet22-2.2-7.el7.src.rpm
rh-dotnet22-curl-7.61.1-2.el7.src.rpm
rh-dotnet22-dotnet-2.2.107-2.el7.src.rpm
x86_64:
rh-dotnet22-2.2-7.el7.x86_64.rpm
rh-dotnet22-curl-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-curl-debuginfo-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-dotnet-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-debuginfo-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-host-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-host-fxr-2.2-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-runtime-2.2-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-libcurl-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-libcurl-devel-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-runtime-2.2-7.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-dotnetcore10-dotnetcore-1.0.16-1.el7.src.rpm
x86_64:
rh-dotnetcore10-dotnetcore-1.0.16-1.el7.x86_64.rpm
rh-dotnetcore10-dotnetcore-debuginfo-1.0.16-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-dotnetcore11-dotnetcore-1.1.13-1.el7.src.rpm
x86_64:
rh-dotnetcore11-dotnetcore-1.1.13-1.el7.x86_64.rpm
rh-dotnetcore11-dotnetcore-debuginfo-1.1.13-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-dotnet21-2.1-10.el7.src.rpm
rh-dotnet21-dotnet-2.1.507-2.el7.src.rpm
x86_64:
rh-dotnet21-2.1-10.el7.x86_64.rpm
rh-dotnet21-dotnet-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-dotnet-debuginfo-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-dotnet-host-2.1.11-2.el7.x86_64.rpm
rh-dotnet21-dotnet-runtime-2.1-2.1.11-2.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.507-2.el7.x86_64.rpm
rh-dotnet21-runtime-2.1-10.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-dotnet22-2.2-7.el7.src.rpm
rh-dotnet22-curl-7.61.1-2.el7.src.rpm
rh-dotnet22-dotnet-2.2.107-2.el7.src.rpm
x86_64:
rh-dotnet22-2.2-7.el7.x86_64.rpm
rh-dotnet22-curl-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-curl-debuginfo-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-dotnet-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-debuginfo-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-host-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-host-fxr-2.2-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-runtime-2.2-2.2.5-2.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.107-2.el7.x86_64.rpm
rh-dotnet22-libcurl-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-libcurl-devel-7.61.1-2.el7.x86_64.rpm
rh-dotnet22-runtime-2.2-7.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2019-0820
https://access.redhat.com/security/cve/CVE-2019-0980
https://access.redhat.com/security/cve/CVE-2019-0981
https://access.redhat.com/security/updates/classification/#moderate
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0820
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0980
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0981
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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dJ6F
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201905-1322 | CVE-2019-10916 | plural SIMATIC Vulnerability related to input validation in products |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions < V8.1 with WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1 Upd 9), SIMATIC WinCC (TIA Portal) V15 (All versions < V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions < V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Upd 3), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 19), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). An attacker with access to the project file could run arbitrary system commands with the privileges of the local database server. The vulnerability could be exploited by an attacker with access to the project file. The vulnerability does impact the confidentiality, integrity, and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known. plural SIMATIC The product contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Siemens SIMATIC PCS 7 and SIMATIC WinCC are products of Siemens AG, Germany. SIMATIC PCS 7 is a process control system. SIMATIC WinCC is an automated data acquisition and monitoring (SCADA) system. An input validation error vulnerability exists in Siemens SIMATIC PCS 7 and SIMATIC WinCC that was caused by a network system or product that did not properly validate the input data and could be exploited by an attacker to access project files. Siemens SIMATIC products are prone to following security vulnerabilities:
1. A denial-of-service vulnerability
2. An SQL injection vulnerability3.
3. An arbitrary command execution
Exploiting these vulnerabilities could allow an attacker to compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, bypass security restrictions, or execute arbitrary code or cause a denial of service condition.
The following Siemens SIMATIC products are affected:
SIMATIC PCS 7 version 8.0 and prior
SIMATIC PCS 7 version 8.1
SIMATIC PCS 7 version 8.2
SIMATIC PCS 7 version 9.0
SIMATIC WinCC (TIA Portal) version 13
SIMATIC WinCC (TIA Portal) version 14
SIMATIC WinCC (TIA Portal) version 15
SIMATIC WinCC Runtime Professional, all version
SIMATIC WinCC version 7.2 and prior
SIMATIC WinCC version 7.3
SIMATIC WinCC version 7.4
SIMATIC WinCC version 7.5, all version prior to version 7.5 Update 3
| VAR-201905-1324 | CVE-2019-10917 | plural SIMATIC Vulnerability related to input validation in products |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions < V8.1 with WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1 Upd 9), SIMATIC WinCC (TIA Portal) V15 (All versions < V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions < V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Upd 3), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 19), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). An attacker with local access to the project file could cause a Denial-of-Service condition on the affected product while the project file is loaded. Successful exploitation requires access to the project file. An attacker could use the vulnerability to compromise availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known. plural SIMATIC The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Siemens SIMATIC PCS 7 and SIMATIC WinCC are products of Siemens AG, Germany. SIMATIC PCS 7 is a process control system. SIMATIC WinCC is an automated data acquisition and monitoring (SCADA) system. An input validation error vulnerability exists in Siemens SIMATIC PCS 7 and SIMATIC WinCC that originated from a network system or product that did not properly validate the entered data. service. Siemens SIMATIC products are prone to following security vulnerabilities:
1. A denial-of-service vulnerability
2. An SQL injection vulnerability3.
3. An arbitrary command execution
Exploiting these vulnerabilities could allow an attacker to compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, bypass security restrictions, or execute arbitrary code or cause a denial of service condition.
The following Siemens SIMATIC products are affected:
SIMATIC PCS 7 version 8.0 and prior
SIMATIC PCS 7 version 8.1
SIMATIC PCS 7 version 8.2
SIMATIC PCS 7 version 9.0
SIMATIC WinCC (TIA Portal) version 13
SIMATIC WinCC (TIA Portal) version 14
SIMATIC WinCC (TIA Portal) version 15
SIMATIC WinCC Runtime Professional, all version
SIMATIC WinCC version 7.2 and prior
SIMATIC WinCC version 7.3
SIMATIC WinCC version 7.4
SIMATIC WinCC version 7.5, all version prior to version 7.5 Update 3
| VAR-201905-1076 | CVE-2019-10922 | SIMATIC PCS 7 and WinCC Vulnerability in |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 and newer (All versions), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 and newer (All versions). An attacker with network access to affected installations, which are configured without "Encrypted Communication", can execute arbitrary code. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected installation. No user interaction is required to exploit this security vulnerability. The vulnerability impacts confidentiality, integrity, and availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known. SIMATIC PCS 7 and WinCC Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens SIMATIC PCS 7 and SIMATIC WinCC are products of Siemens AG, Germany. SIMATIC PCS 7 is a process control system. SIMATIC WinCC is an automated data acquisition and monitoring (SCADA) system. An access control error vulnerability exists in Siemens SIMATIC PCS 7 and SIMATIC WinCC
| VAR-201905-1077 | CVE-2019-10924 | LOGO! Soft Comfort Access control vulnerability |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
A vulnerability has been identified in LOGO! Soft Comfort (All versions < V8.3). The vulnerability could allow an attacker to execute arbitrary code if the attacker tricks a legitimate user to open a manipulated project. In order to exploit the vulnerability, a valid user must open a manipulated project file. No further privileges are required on the target system. The vulnerability could compromise the confidentiality, integrity and availability of the engineering station. At the time of advisory publication no public exploitation of this security vulnerability was known. LOGO! Soft Comfort Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state
| VAR-201905-0037 | CVE-2019-6821 | plural Modicon Vulnerabilities related to insufficient random values in products |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
CWE-330: Use of Insufficiently Random Values vulnerability, which could cause the hijacking of the TCP connection when using Ethernet communication in Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum. plural Modicon The product contains a vulnerability related to the use of insufficient random values.Information may be obtained. Schneider Electric Modicon M580 and others are products of Schneider Electric, France. The Schneider Electric Modicon M580 is a programmable automation controller. Schneider Electric Modicon Premium is a large programmable logic controller (PLC) for discrete or process applications. Schneider Electric Modicon Quantum is a large programmable logic controller (PLC) for process applications, high availability and safety solutions. There are insufficient random value exploits in Modicon M580/M340/Premium/Quantum. An attacker could exploit this vulnerability to implement TCP connection hijacking when using Ethernet communications.
An attacker can exploit this issue to bypass certain security restrictions, obtain sensitive information and perform unauthorized actions; this may aid in launching further attacks.
The following Schneider Electric Modicon products are vulnerable:
Modicon M580 versions prior to 2.30
Modicon M340
Modicon Premium
Modicon Quantum. This vulnerability is due to the lack of security measures such as authentication, access control, and rights management in network systems or products