VARIoT IoT vulnerabilities database
| VAR-201801-1836 | No CVE | D-Link DSL-6850U Router Remote Command Execution Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
D-LinkDSL-6850U is a wireless router product of D-Link. D-LinkDSL-6850U Router Remote Command Execution Vulnerability. Since the router has the remote web management service enabled by default, the service has the default credentials support:support and cannot be disabled. The attacker can log in to the router's web management interface through the default credentials, and then manually open the Wan port telnet service that is turned off by default. After logging in to the telnet service, you can use the && or || command sandbox escape to get full shell permissions.
| VAR-201801-0589 | CVE-2017-16753 | Advantech WebAccess Input validation vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An Improper Input Validation issue was discovered in Advantech WebAccess versions prior to 8.3. WebAccess allows some inputs that may cause the program to crash. Advantech WebAccess Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. The vulnerability is caused by a failure to properly validate WebAccess input. Advantech WebAccess is prone to the following security vulnerabilities:
1. Multiple denial-of-service vulnerabilities
2. Multiple stack-based buffer-overflow vulnerabilities
3. A directory-traversal vulnerability
4. An SQL-injection vulnerability
5. Multiple denial-of-service vulnerabilities
An attacker can exploit these issues to execute arbitrary code in the context of the application, or modify data, or exploit latent vulnerabilities in the underlying database,perform certain unauthorized actions, gain unauthorized access and obtain sensitive information
| VAR-201801-1712 | CVE-2017-5753 | CPU hardware utilizing speculative execution may be vulnerable to cache side-channel attacks |
CVSS V2: 4.7 CVSS V3: 5.6 Severity: MEDIUM |
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. Two vulnerabilities are identified, known as "Variant 3a" and "Variant 4". CPUhardware is a set of firmware that runs in the CPU (Central Processing Unit) for managing and controlling the CPU. The Meltdown vulnerability exists in the CPU processor core, which \"melts\" the security boundary implemented by hardware, allowing low-privileged user-level applications to \"cross-border\" access to system-level memory, causing data leakage. The following products and versions are affected: ARM Cortex-R7; Cortex-R8; Cortex-A8; Cortex-A9; Cortex-A12; Xeon CPU E5-1650 v3, v2, v4; Xeon E3-1265l v2, v3, v4 ; Xeon E3-1245 v2, v3, v5, v6 versions; Xeon X7542, etc. ==========================================================================
Ubuntu Security Notice USN-3597-2
March 15, 2018
linux-hwe vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
This update provides the corresponding updates for the Linux Hardware
Enablement (HWE) kernel from Ubuntu 17.10 for Ubuntu 16.04 LTS.
USNS 3541-2 and 3523-2 provided mitigations for Spectre and Meltdown
(CVE-2017-5715, CVE-2017-5753, CVE-2017-5754) for the i386, amd64,
and ppc64el architectures for Ubuntu 16.04 LTS. This flaw is known as Meltdown. This flaw is known as Spectre. (CVE-2017-5715,
CVE-2017-5753)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
linux-image-4.13.0-37-generic 4.13.0-37.42~16.04.1
linux-image-4.13.0-37-generic-lpae 4.13.0-37.42~16.04.1
linux-image-4.13.0-37-lowlatency 4.13.0-37.42~16.04.1
linux-image-generic-hwe-16.04 4.13.0.37.56
linux-image-generic-lpae-hwe-16.04 4.13.0.37.56
linux-image-lowlatency-hwe-16.04 4.13.0.37.56
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well. Summary:
An update for kernel is now available for Red Hat Enterprise Linux 5.9 Long
Life.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Long Life (v. 5.9 server) - i386, ia64, noarch, x86_64
3.
Security Fix(es):
An industry-wide issue was found in the way many modern microprocessor
designs have implemented speculative execution of instructions (a commonly
used performance optimization). There are three primary variants of the
issue which differ in the way the speculative execution can be exploited.
Note: This issue is present in hardware and cannot be fully fixed via
software update. The updated kernel packages provide software mitigation
for this hardware issue at a cost of potential performance penalty. Please
refer to References section for further information about this issue and
the performance impact.
In this update mitigations for x86-64 architecture are provided.
* Variant CVE-2017-5753 triggers the speculative execution by performing a
bounds-check bypass. It relies on the presence of a precisely-defined
instruction sequence in the privileged code as well as the fact that memory
accesses may cause allocation into the microprocessor's data cache even for
speculatively executed instructions that never actually commit (retire). As
a result, an unprivileged attacker could use this flaw to cross the syscall
boundary and read privileged memory by conducting targeted cache
side-channel attacks. (CVE-2017-5753, Important)
* Variant CVE-2017-5754 relies on the fact that, on impacted
microprocessors, during speculative execution of instruction permission
faults, exception generation triggered by a faulting access is suppressed
until the retirement of the whole instruction block. In a combination with
the fact that memory accesses may populate the cache even when the block is
being dropped and never committed (executed), an unprivileged local
attacker could use this flaw to read privileged (kernel space) memory by
conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)
Red Hat would like to thank Google Project Zero for reporting these issues.
Bug Fix(es):
* Previously, the page table isolation feature was able to modify the
kernel Page Global Directory (PGD) entries with the _NX bit even for CPUs
without the capability to use the "no execute" (NX) bit technology.
Consequently, the page tables got corrupted, and the kernel panicked at the
first page-fault occurrence. This update adds the check of CPU capabilities
before modifying kernel PGD entries with _NX. As a result, the operating
system no longer panics on boot due to corrupted page tables under the
described circumstances. (BZ#1538169)
* When booting the operating system with the Kernel Page Table Isolation
option enabled, the HPET VSYSCALL shadow mapping was not placed correctly.
Consequently, the High Precision Event Timer (HPET) feature was not
available early enough, and warnings on boot time occurred. This update
fixes the placement of HPET VSYSCALL, and the warnings on boot time due to
this behavior no longer occur. (BZ#1541281)
* Previously, the routine preparing the kexec crashkernel area did not
properly clear the page allocated to be kexec's Page Global Directory
(PGD). Consequently, the page table isolation shadow mapping routines
failed with a warning message when setting up page table entries. With this
update, the underlying source code has been fixed to clear the kexec PGD
allocated page before setting up its page table entries. As a result,
warnings are no longer issued when setting up kexec. (BZ#1541285)
* When changing a kernel page mapping from Read Only (RO) to Read Write
(RW), the Translation Lookaside Buffer (TLB) entry was previously not
updated. Consequently, a protection fault on a write operation occurred,
which led to a kernel panic. With this update, the underlying source code
has been fixed to handle such kind of fault properly, and the kernel no
longer panics in the described situation. (BZ#1541892)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1519778 - CVE-2017-5753 hw: cpu: speculative execution bounds-check bypass
1519781 - CVE-2017-5754 hw: cpu: speculative execution permission faults handling
6. Package List:
Red Hat Enterprise Linux Long Life (v. 5.9 server):
Source:
kernel-2.6.18-348.35.1.el5.src.rpm
i386:
kernel-2.6.18-348.35.1.el5.i686.rpm
kernel-PAE-2.6.18-348.35.1.el5.i686.rpm
kernel-PAE-debuginfo-2.6.18-348.35.1.el5.i686.rpm
kernel-PAE-devel-2.6.18-348.35.1.el5.i686.rpm
kernel-debug-2.6.18-348.35.1.el5.i686.rpm
kernel-debug-debuginfo-2.6.18-348.35.1.el5.i686.rpm
kernel-debug-devel-2.6.18-348.35.1.el5.i686.rpm
kernel-debuginfo-2.6.18-348.35.1.el5.i686.rpm
kernel-debuginfo-common-2.6.18-348.35.1.el5.i686.rpm
kernel-devel-2.6.18-348.35.1.el5.i686.rpm
kernel-headers-2.6.18-348.35.1.el5.i386.rpm
kernel-xen-2.6.18-348.35.1.el5.i686.rpm
kernel-xen-debuginfo-2.6.18-348.35.1.el5.i686.rpm
kernel-xen-devel-2.6.18-348.35.1.el5.i686.rpm
ia64:
kernel-2.6.18-348.35.1.el5.ia64.rpm
kernel-debug-2.6.18-348.35.1.el5.ia64.rpm
kernel-debug-debuginfo-2.6.18-348.35.1.el5.ia64.rpm
kernel-debug-devel-2.6.18-348.35.1.el5.ia64.rpm
kernel-debuginfo-2.6.18-348.35.1.el5.ia64.rpm
kernel-debuginfo-common-2.6.18-348.35.1.el5.ia64.rpm
kernel-devel-2.6.18-348.35.1.el5.ia64.rpm
kernel-headers-2.6.18-348.35.1.el5.ia64.rpm
kernel-xen-2.6.18-348.35.1.el5.ia64.rpm
kernel-xen-debuginfo-2.6.18-348.35.1.el5.ia64.rpm
kernel-xen-devel-2.6.18-348.35.1.el5.ia64.rpm
noarch:
kernel-doc-2.6.18-348.35.1.el5.noarch.rpm
x86_64:
kernel-2.6.18-348.35.1.el5.x86_64.rpm
kernel-debug-2.6.18-348.35.1.el5.x86_64.rpm
kernel-debug-debuginfo-2.6.18-348.35.1.el5.x86_64.rpm
kernel-debug-devel-2.6.18-348.35.1.el5.x86_64.rpm
kernel-debuginfo-2.6.18-348.35.1.el5.x86_64.rpm
kernel-debuginfo-common-2.6.18-348.35.1.el5.x86_64.rpm
kernel-devel-2.6.18-348.35.1.el5.x86_64.rpm
kernel-headers-2.6.18-348.35.1.el5.x86_64.rpm
kernel-xen-2.6.18-348.35.1.el5.x86_64.rpm
kernel-xen-debuginfo-2.6.18-348.35.1.el5.x86_64.rpm
kernel-xen-devel-2.6.18-348.35.1.el5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/speculativeexecution
https://access.redhat.com/security/cve/CVE-2017-5753
https://access.redhat.com/security/cve/CVE-2017-5754
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFaoAQ0XlSAg2UNWIIRArlGAJ0f0JPSglQgYq1c1IU4IL6pgNsTMQCgp6aK
sO3x9fv644XZOoyNppb4R0M=
=X4yt
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4187-1 security@debian.org
https://www.debian.org/security/ Ben Hutchings
May 01, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : linux
CVE ID : CVE-2015-9016 CVE-2017-0861 CVE-2017-5715 CVE-2017-5753
CVE-2017-13166 CVE-2017-13220 CVE-2017-16526 CVE-2017-16911
CVE-2017-16912 CVE-2017-16913 CVE-2017-16914 CVE-2017-18017
CVE-2017-18203 CVE-2017-18216 CVE-2017-18232 CVE-2017-18241
CVE-2018-1066 CVE-2018-1068 CVE-2018-1092 CVE-2018-5332
CVE-2018-5333 CVE-2018-5750 CVE-2018-5803 CVE-2018-6927
CVE-2018-7492 CVE-2018-7566 CVE-2018-7740 CVE-2018-7757
CVE-2018-7995 CVE-2018-8781 CVE-2018-8822 CVE-2018-1000004
CVE-2018-1000199
Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.
CVE-2015-9016
Ming Lei reported a race condition in the multiqueue block layer
(blk-mq). On a system with a driver using blk-mq (mtip32xx,
null_blk, or virtio_blk), a local user might be able to use this
for denial of service or possibly for privilege escalation.
CVE-2017-0861
Robb Glasser reported a potential use-after-free in the ALSA (sound)
PCM core. We believe this was not possible in practice.
CVE-2017-5715
Multiple researchers have discovered a vulnerability in various
processors supporting speculative execution, enabling an attacker
controlling an unprivileged process to read memory from arbitrary
addresses, including from the kernel and all other processes
running on the system.
This specific attack has been named Spectre variant 2 (branch
target injection) and is mitigated for the x86 architecture (amd64
and i386) by using the "retpoline" compiler feature which allows
indirect branches to be isolated from speculative execution.
CVE-2017-5753
Multiple researchers have discovered a vulnerability in various
processors supporting speculative execution, enabling an attacker
controlling an unprivileged process to read memory from arbitrary
addresses, including from the kernel and all other processes
running on the system.
This specific attack has been named Spectre variant 1
(bounds-check bypass) and is mitigated by identifying vulnerable
code sections (array bounds checking followed by array access) and
replacing the array access with the speculation-safe
array_index_nospec() function.
More use sites will be added over time.
CVE-2017-13166
A bug in the 32-bit compatibility layer of the v4l2 ioctl handling
code has been found. Memory protections ensuring user-provided
buffers always point to userland memory were disabled, allowing
destination addresses to be in kernel space. On a 64-bit kernel a
local user with access to a suitable video device can exploit this
to overwrite kernel memory, leading to privilege escalation.
CVE-2017-13220
Al Viro reported that the Bluetooth HIDP implementation could
dereference a pointer before performing the necessary type check.
A local user could use this to cause a denial of service.
CVE-2017-16526
Andrey Konovalov reported that the UWB subsystem may dereference
an invalid pointer in an error case. A local user might be able
to use this for denial of service.
CVE-2017-16911
Secunia Research reported that the USB/IP vhci_hcd driver exposed
kernel heap addresses to local users. This information could aid the
exploitation of other vulnerabilities.
CVE-2017-16912
Secunia Research reported that the USB/IP stub driver failed to
perform a range check on a received packet header field, leading
to an out-of-bounds read. A remote user able to connect to the
USB/IP server could use this for denial of service.
CVE-2017-16913
Secunia Research reported that the USB/IP stub driver failed to
perform a range check on a received packet header field, leading
to excessive memory allocation. A remote user able to connect to
the USB/IP server could use this for denial of service.
CVE-2017-16914
Secunia Research reported that the USB/IP stub driver failed to
check for an invalid combination of fields in a received packet,
leading to a null pointer dereference. A remote user able to
connect to the USB/IP server could use this for denial of service.
CVE-2017-18017
Denys Fedoryshchenko reported that the netfilter xt_TCPMSS module
failed to validate TCP header lengths, potentially leading to a
use-after-free. If this module is loaded, it could be used by a
remote attacker for denial of service or possibly for code
execution.
CVE-2017-18203
Hou Tao reported that there was a race condition in creation and
deletion of device-mapper (DM) devices. A local user could
potentially use this for denial of service.
CVE-2017-18216
Alex Chen reported that the OCFS2 filesystem failed to hold a
necessary lock during nodemanager sysfs file operations,
potentially leading to a null pointer dereference. A local user
could use this for denial of service.
CVE-2017-18232
Jason Yan reported a race condition in the SAS (Serial-Attached
SCSI) subsystem, between probing and destroying a port. This
could lead to a deadlock. A physically present attacker could
use this to cause a denial of service.
CVE-2017-18241
Yunlei He reported that the f2fs implementation does not properly
initialise its state if the "noflush_merge" mount option is used.
A local user with access to a filesystem mounted with this option
could use this to cause a denial of service.
CVE-2018-1066
Dan Aloni reported to Red Hat that the CIFS client implementation
would dereference a null pointer if the server sent an invalid
response during NTLMSSP setup negotiation. This could be used
by a malicious server for denial of service.
CVE-2018-1068
The syzkaller tool found that the 32-bit compatibility layer of
ebtables did not sufficiently validate offset values. On a 64-bit
kernel, a local user with the CAP_NET_ADMIN capability (in any user
namespace) could use this to overwrite kernel memory, possibly
leading to privilege escalation. Debian disables unprivileged user
namespaces by default.
CVE-2018-1092
Wen Xu reported that a crafted ext4 filesystem image would
trigger a null dereference when mounted. A local user able
to mount arbitrary filesystems could use this for denial of
service.
CVE-2018-5332
Mohamed Ghannam reported that the RDS protocol did not
sufficiently validate RDMA requests, leading to an out-of-bounds
write. A local attacker on a system with the rds module loaded
could use this for denial of service or possibly for privilege
escalation.
CVE-2018-5333
Mohamed Ghannam reported that the RDS protocol did not properly
handle an error case, leading to a null pointer dereference. A
local attacker on a system with the rds module loaded could
possibly use this for denial of service.
CVE-2018-5750
Wang Qize reported that the ACPI sbshc driver logged a kernel heap
address. This information could aid the exploitation of other
vulnerabilities.
CVE-2018-5803
Alexey Kodanev reported that the SCTP protocol did not range-check
the length of chunks to be created. A local or remote user could
use this to cause a denial of service.
CVE-2018-6927
Li Jinyue reported that the FUTEX_REQUEUE operation on futexes did
not check for negative parameter values, which might lead to a
denial of service or other security impact.
CVE-2018-7492
The syzkaller tool found that the RDS protocol was lacking a null
pointer check. A local attacker on a system with the rds module
loaded could use this for denial of service.
CVE-2018-7566
Fan LongFei reported a race condition in the ALSA (sound)
sequencer core, between write and ioctl operations. This could
lead to an out-of-bounds access or use-after-free. A local user
with access to a sequencer device could use this for denial of
service or possibly for privilege escalation.
CVE-2018-7740
Nic Losby reported that the hugetlbfs filesystem's mmap operation
did not properly range-check the file offset. A local user with
access to files on a hugetlbfs filesystem could use this to cause
a denial of service.
CVE-2018-7757
Jason Yan reported a memory leak in the SAS (Serial-Attached
SCSI) subsystem. A local user on a system with SAS devices
could use this to cause a denial of service.
CVE-2018-7995
Seunghun Han reported a race condition in the x86 MCE
(Machine Check Exception) driver. This is unlikely to have
any security impact.
CVE-2018-8781
Eyal Itkin reported that the udl (DisplayLink) driver's mmap
operation did not properly range-check the file offset. A local
user with access to a udl framebuffer device could exploit this to
overwrite kernel memory, leading to privilege escalation.
CVE-2018-8822
Dr Silvio Cesare of InfoSect reported that the ncpfs client
implementation did not validate reply lengths from the server. An
ncpfs server could use this to cause a denial of service or
remote code execution in the client.
CVE-2018-1000004
Luo Quan reported a race condition in the ALSA (sound) sequencer
core, between multiple ioctl operations. This could lead to a
deadlock or use-after-free. A local user with access to a
sequencer device could use this for denial of service or possibly
for privilege escalation.
CVE-2018-1000199
Andy Lutomirski discovered that the ptrace subsystem did not
sufficiently validate hardware breakpoint settings. Local users
can use this to cause a denial of service, or possibly for
privilege escalation, on x86 (amd64 and i386) and possibly other
architectures.
For the oldstable distribution (jessie), these problems have been fixed
in version 3.16.56-1.
We recommend that you upgrade your linux packages.
For the detailed security status of linux please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/linux
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAlron61fFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0Rtqw//Xf/L4bP65wU9M59Ef6xBt+Eph+yxeMsioGhu80ODdMemlmHzASMtfZjY
AXxyt9l8lbHn8MmwDA4aLhhwHYXwvKATdpHSy1SILrRfb4s9P9uV1vsHaIeZ649E
hDyNon9hP2tPso6BwqiYHZZy9Xxtd+T8vTBeBZwUKOLBkBRvV/gyNSUdJWp6L8WH
aF4D1hHl9ZotDkyIvkubbx77aqbJ88I4R0n69x7L9udFbuXa+U7hV6dJdnpzyl/7
OukJfEtnkaUgWu0MdOfFss6iH5OQISn/y/ricRi29oKQiEp3YwnT5J9pFwSQeJJS
H8ABVt251UoS0J+of3QWw0muOT/6UAF8SNpPKMJXC7Euq8pTmYVPSIeUYf4eqn65
UHZSCKXaszItq+uzVNYdkj504BJ4cG1lFxZtlrFWwKE8p7QOETN0GKvTRdu/SvDd
Hl2nb4HouLpBYS518Th2/MGgzhXXAuO12MH3smenptZbqxKn9Z0XSTJYzFupgJk/
kKF2xkDFBE4toTLVE+6XdUKwYk4vkeDZyOGOwRYThSkKAzrUh5zThgal4HnknD2A
5ye4XLhjgSIT47/nmor6lhxd7WGXGkV33GF0azYlHr/sclfzxcU2Ev3NUBWQ8M3s
CxfIO0FNCzO0WIUf40md7MlIAnDBIRGyYgNIIe7AnSRKKPykEx8=
=wNQS
-----END PGP SIGNATURE-----
.
Software Description:
- webkit2gtk: Web content engine library for GTK+
Details:
It was discovered that speculative execution performed by modern CPUs
could leak information through a timing side-channel attack, and that
this could be exploited in web browser JavaScript engines. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit this to obtain sensitive information from other
domains, bypassing same-origin restrictions.
Issue date: 2018-01-03
Updated on: 2018-01-09
CVE number: CVE-2017-5753, CVE-2017-5715
1.
Notes:
Hypervisor mitigation can be classified into the two following
categories:
- Hypervisor-Specific remediation (documented in this advisory)
- Hypervisor-Assisted Guest Remediation (documented in
VMSA-2018-0004)
The ESXi patches and new versions of Workstation and Fusion of
VMSA-2018-0004 include the Hypervisor-Specific remediation documented
in this VMware Security Advisory.
More information on the types of remediation may be found in VMware
Knowledge Base article 52245. Relevant Products
VMware vSphere ESXi (ESXi)
VMware Workstation Pro / Player (Workstation)
VMware Fusion Pro / Fusion (Fusion)
3.
Result of exploitation may allow for information disclosure from one
Virtual Machine to another Virtual Machine that is running on the
same host. The remediation listed in the table below is for the known
variants of the Bounds Check Bypass and Branch Target Injection
issues.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the identifiers CVE-2017-5753 (Bounds Check bypass) and
CVE-2017-5715 (Branch Target Injection) to these issues.
Column 5 of the following table lists the action required to
remediate the observed vulnerability in each release, if a solution
is available.
VMware Product Running Replace with/ Mitigation
Product Version on Severity Apply patch Workaround
========== ======= ======= ========= ============= ==========
ESXi 6.5 Any Important ESXi650-201712101-SG None
ESXi 6.0 Any Important ESXi600-201711101-SG None
ESXi 5.5 Any Important ESXi550-201801401-BG None
Workstation 14.x Any N/A Not affected N/A
Workstation 12.x Any Important 12.5.8 None
Fusion 10.x OS X N/A Not affected N/A
Fusion 8.x OS X Important 8.5.9 None
4. Solution
Please review the patch/release notes for your product and
version and verify the checksum of your downloaded file.
VMware ESXi 6.5
Downloads:
https://my.vmware.com/group/vmware/patch
Documentation:
http://kb.vmware.com/kb/2151099
VMware ESXi 6.0
Downloads:
https://my.vmware.com/group/vmware/patch
Documentation:
http://kb.vmware.com/kb/2151132
VMware ESXi 5.5
Downloads:
https://my.vmware.com/group/vmware/patch
Documentation:
http://kb.vmware.com/kb/52127
VMware Workstation Pro, Player 12.5.8
Downloads and Documentation:
https://www.vmware.com/go/downloadworkstation
https://www.vmware.com/support/pubs/ws_pubs.html
VMware Fusion Pro / Fusion 12.5.9
Downloads and Documentation:
https://www.vmware.com/go/downloadfusion
https://www.vmware.com/support/pubs/fusion_pubs.html
5. Change log
2018-01-03 VMSA-2018-0002
Initial security advisory
2018-01-09 VMSA-2018-0002.1
Updated security advisor after release of ESXi 5.5 patch
(ESXi550-201801401-BG) that has remediation against CVE-2017-5715 and
CVE-2017-5753 on 2018-01-09. Contact
E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
security-announce@lists.vmware.com
bugtraq@securityfocus.com
fulldisclosure@seclists.org
E-mail: security@vmware.com
PGP key at: https://kb.vmware.com/kb/1055
VMware Security Advisories
http://www.vmware.com/security/advisories
VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html
VMware Security & Compliance Blog
https://blogs.vmware.com/security
Twitter
https://twitter.com/VMwareSRC
Copyright 2018 VMware Inc. All rights reserved. Ubuntu is working with Intel and AMD to provide
future microcode updates that implement IBRS and IBPB as they are made
available. Ubuntu users with a processor from a different vendor should
contact the vendor to identify necessary firmware updates. Ubuntu
will provide corresponding QEMU updates in the future for users of
self-hosted virtual environments in coordination with upstream QEMU.
Ubuntu users in cloud environments should contact the cloud provider
to confirm that the hypervisor has been updated to expose the new
CPU features to virtual machines. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: hpesbhf03805en_us
Version: 4
HPESBHF03805 rev.4 - Certain HPE products using Microprocessors from Intel,
AMD, and ARM, with Speculative Execution, Elevation of Privilege and
Information Disclosure.
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2018-01-10
Last Updated: 2018-01-09
Potential Security Impact: Local: Disclosure of Information, Elevation of
Privilege
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
On January 3 2018, side-channel security vulnerabilities involving
speculative execution were publicly disclosed. These vulnerabilities may
impact the listed HPE products, potentially leading to information disclosure
and elevation of privilege. Mitigation and resolution of these
vulnerabilities may call for both an operating system update, provided by the
OS vendor, and a system ROM update from HPE.
**Note:**
* This issue takes advantage of techniques commonly used in many modern
processor architectures.
* For further information, microprocessor vendors have provided security
advisories:
- Intel:
<https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00088&langu
geid=en-fr>
- AMD: <http://www.amd.com/en/corporate/speculative-execution>
- ARM: <https://developer.arm.com/support/security-update>
References:
- PSRT110634
- PSRT110633
- PSRT110632
- CVE-2017-5715 - aka Spectre, branch target injection
- CVE-2017-5753 - aka Spectre, bounds check bypass
- CVE-2017-5754 - aka Meltdown, rogue data cache load, memory access
permission check performed after kernel memory read
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HPE ProLiant DL380 Gen10 Server prior to v1.28
- HPE ProLiant DL180 Gen10 Server prior to v1.28
- HPE ProLiant DL160 Gen10 Server prior to v1.28
- HPE ProLiant DL360 Gen10 Server prior to v1.28
- HPE ProLiant ML110 Gen10 Server prior to v1.28
- HPE ProLiant DL580 Gen10 Server prior to v1.28
- HPE ProLiant DL560 Gen10 Server prior to v1.28
- HPE ProLiant DL120 Gen10 Server prior to v1.28
- HPE ProLiant ML350 Gen10 Server prior to v1.28
- HPE ProLiant XL450 Gen10 Server prior to v1.28
- HPE ProLiant XL170r Gen10 Server prior to v1.28
- HPE ProLiant BL460c Gen10 Server Blade prior to v1.28
- HPE ProLiant XL230a Gen9 Server prior to v2.54
- HPE ProLiant XL230k Gen10 Server prior to v1.28
- HPE ProLiant XL730f Gen9 Server prior to v2.54
- HPE ProLiant XL740f Gen9 Server prior to v2.54
- HPE ProLiant XL750f Gen9 Server prior to v2.54
- HPE ProLiant XL170r Gen9 Server prior to v2.54
- HP ProLiant DL60 Gen9 Server prior to v2.54
- HPE ProLiant XL450 Gen9 Server prior to v2.54
- HP ProLiant DL160 Gen9 Server prior to v2.54
- HPE Apollo 4200 Gen9 Server prior to v2.54
- HP ProLiant BL460c Gen9 Server Blade prior to v2.54
- HP ProLiant ML110 Gen9 Server prior to v2.54
- HP ProLiant ML150 Gen9 Server prior to v2.54
- HPE ProLiant ML350 Gen9 Server prior to v2.54
- HP ProLiant DL380 Gen9 Server prior to v2.54
- HP ProLiant DL120 Gen9 Server prior to v2.54
- HPE ProLiant DL560 Gen9 Server prior to v2.54
- HPE ProLiant XL270d Gen9 Special Server prior to v2.54
- HP ProLiant BL660c Gen9 Server prior to v2.54
- HPE ProLiant m710x Server Cartridge prior to v1.60
- HPE ProLiant DL20 Gen9 Server prior to v2.52
- HPE ProLiant DL385 Gen10 Server prior to v1.04
- HPE Synergy 660 Gen9 Compute Module prior to v2.54
- HPE Synergy 480 Gen10 Compute Module prior to v1.28
- HPE Synergy 480 Gen9 Compute Module prior to v2.54
- HPE ProLiant ML30 Gen9 Server prior to v2.52
- HPE ProLiant XL190r Gen10 Server prior to v1.28
- HPE ProLiant XL250a Gen9 Server prior to v2.54
- HPE ProLiant XL190r Gen9 Server prior to v2.54
- HP ProLiant DL80 Gen9 Server prior to v2.54
- HPE ProLiant DL180 Gen9 Server prior to v2.54
- HPE ProLiant XL270d Gen9 Accelerator Tray 2U Configure-to-order Server
prior to v2.54
- HPE ProLiant WS460c Gen9 Workstation prior to v2.54
- HPE ProLiant DL580 Gen9 Special Server prior to v2.54
- HPE Synergy 680 Gen9 Compute Modules prior to v2.54
- HPE ProLiant XL260a Gen9 Server prior to 1/22/2018
- HPE ProLiant m510 Server Cartridge prior to 1/22/2018
- HPE ProLiant m710p Server Cartridge prior to 12/12/2017
- HP ProLiant m350 Server Cartridge prior to 12/12/2017
- HP ProLiant m300 Server Cartridge prior to 12/12/2017
- HP ProLiant ML350e Gen8 Server prior to 12/12/2017
- HPE ProLiant ML350e Gen8 v2 Server prior to 12/12/2017
- HP ProLiant BL460c Gen8 Server prior to 12/12/2017
- HP ProLiant BL660c Gen8 Server prior to 12/12/2017
- HPE ProLiant SL4540 Gen8 1 Node Server prior to 12/12/2017
- HP ProLiant DL380e Gen8 Server prior to 12/12/2017
- HP ProLiant DL360e Gen8 Server prior to 12/12/2017
- HP ProLiant ML350p Gen8 Server prior to 12/12/2017
- HP ProLiant DL360p Gen8 Server prior to 12/12/2017
- HP ProLiant DL380p Gen8 Server prior to 12/12/2017
- HP ProLiant DL320e Gen8 Server prior to 12/12/2017
- HPE ProLiant DL320e Gen8 v2 Server prior to 12/12/2017
- HP ProLiant ML310e Gen8 Server prior to 12/12/2017
- HPE ProLiant ML310e Gen8 v2 Server prior to 12/12/2017
- HP ProLiant DL160 Gen8 Server prior to 12/12/2017
- HP ProLiant SL270s Gen8 Server prior to 12/12/2017
- HP ProLiant SL250s Gen8 Server prior to 12/12/2017
- HP ProLiant SL230s Gen8 Server prior to 12/12/2017
- HP ProLiant DL560 Gen8 Server prior to 12/12/2017
- HPE ProLiant SL210t Gen8 Server prior to 12/12/2017
- HP ProLiant DL580 Gen8 Server prior to 12/12/2017 (v1.98)
- HP ProLiant ML10 Server prior to 12/12/2017
- HP ProLiant m710 Server Cartridge prior to 12/12/2017 (v1.60)
- HPE Synergy Composer prior to 12/12/2017
- HPE Integrity Superdome X with BL920s Blades prior to 8.8.6
- HPE Superdome Flex Server prior to 2.3.110
- HP ProLiant DL360 Gen9 Server prior to v2.54
- HPE Synergy 620 Gen9 Compute Module prior to v2.54
- HPE ProLiant Thin Micro TM200 Server prior to 1/16/2017
- HPE ProLiant ML350 Gen10 Server prior to v1.28
- HP ProLiant BL420c Gen8 Server prior to 12/12/2017
- HPE ProLiant ML10 v2 Server prior to 12/12/2017
- HPE ProLiant MicroServer Gen8 prior to 12/12/2017
- HPE Synergy 660 Gen10 Compute Module prior to v1.28
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2017-5715
8.2 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
6.8 (AV:A/AC:L/Au:N/C:C/I:P/A:N)
CVE-2017-5753
5.0 CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L
5.4 (AV:A/AC:M/Au:N/C:P/I:P/A:P)
CVE-2017-5754
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has made the following system ROM updates which include an updated
microcode to resolve the vulnerability:
* HPE has provided a customer bulletin
<https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00039267en_us>
with specific instructions to obtain the udpated sytem ROM
- Note:
+ CVE-2017-5715 requires that the System ROM be updated and a vendor
supplied operating system update be applied as well.
+ For CVE-2017-5753, CVE-2017-5754 require only updates of a vendor
supplied operating system.
+ HPE will continue to add additional products to the list. Not all
listed products have updated system ROMs yet. Impacted products awaiting
system ROM updates are marked TBS (to be supplied).
HISTORY
Version:1 (rev.1) - 4 January 2018 Initial release
Version:2 (rev.2) - 5 January 2018 Added additional impacted products
Version:3 (rev.3) - 10 January 2018 Added more impacted products
Version:4 (rev.4) - 9 January 2018 Fixed product ID
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported
product:
Web form: https://www.hpe.com/info/report-security-vulnerability
Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners. 7.2) - noarch, x86_64
3. (CVE-2017-5754, Important)
Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64
microprocessors are not affected by this issue
| VAR-201801-1711 | CVE-2017-5754 | CPU hardware utilizing speculative execution may be vulnerable to cache side-channel attacks |
CVSS V2: 4.7 CVSS V3: 5.6 Severity: MEDIUM |
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache. Two vulnerabilities are identified, known as "Variant 3a" and "Variant 4". CPUhardware is a set of firmware that runs in the CPU (Central Processing Unit) for managing and controlling the CPU. The Spectre vulnerability exists in the CPU processor core. Because Intel does not separate low-privileged applications from accessing kernel memory, an attacker can use a malicious application to obtain private data that should be quarantined. Intel and ARM CPU chips have an information disclosure vulnerability, which originates from a flaw in the processor data boundary mechanism. The following products and versions are affected: ARM Cortex-A75; Intel Xeon E5-1650 v3, v2, v4; Xeon E3-1265l v2, v3, v4; Xeon E3-1245 v2, v3, v5, v6; Xeon X7542 wait. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
APPLE-SA-2018-1-23-2 macOS High Sierra 10.13.3,
Security Update 2018-001 Sierra,
and Security Update 2018-001 El Capitan
macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and
Security Update 2018-001 El Capitan are now available and address
the following:
Audio
Available for: macOS High Sierra 10.13.2, macOS Sierra 10.12.6
Impact: Processing a maliciously crafted audio file may lead to
arbitrary code execution
Description: A memory corruption issue was addressed through improved
input validation.
CVE-2018-4094: Mingi Cho, MinSik Shin, Seoyoung Kim, Yeongho Lee and
Taekyoung Kwon of the Information Security Lab, Yonsei University
curl
Available for: macOS High Sierra 10.13.2
Impact: Multiple issues in curl
Description: An out-of-bounds read issue existed in the curl. This
issue was addressed through improved bounds checking.
CVE-2017-8817: found by OSS-Fuzz
IOHIDFamily
Available for: macOS High Sierra 10.13.2, macOS Sierra 10.12.6,
OS X El Capitan 10.11.6
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2017-5754: Jann Horn of Google Project Zero; Moritz Lipp of
Graz University of Technology; Michael Schwarz of Graz University of
Technology; Daniel Gruss of Graz University of Technology;
Thomas Prescher of Cyberus Technology GmbH; Werner Haas of Cyberus
Technology GmbH; Stefan Mangard of Graz University of Technology;
Paul Kocher; Daniel Genkin of University of Pennsylvania and
University of Maryland; Yuval Yarom of University of Adelaide and
Data61; and Mike Hamburg of Rambus (Cryptography Research Division)
Kernel
Available for: macOS High Sierra 10.13.2
Impact: An application may be able to read restricted memory
Description: A memory initialization issue was addressed through
improved memory handling.
CVE-2018-4090: Jann Horn of Google Project Zero
Kernel
Available for: macOS High Sierra 10.13.2
Impact: An application may be able to read restricted memory
Description: A race condition was addressed through improved locking.
CVE-2018-4092: an anonymous researcher
Kernel
Available for: macOS High Sierra 10.13.2, macOS Sierra 10.12.6,
OS X El Capitan 10.11.6
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A memory corruption issue was addressed through improved
input validation.
CVE-2018-4082: Russ Cox of Google
Kernel
Available for: macOS High Sierra 10.13.2, macOS Sierra 10.12.6
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A logic issue was addressed with improved validation.
CVE-2018-4097: Resecurity, Inc.
Kernel
Available for: macOS High Sierra 10.13.2
Impact: An application may be able to read restricted memory
Description: A validation issue was addressed with improved input
sanitization.
CVE-2018-4093: Jann Horn of Google Project Zero
LinkPresentation
Available for: macOS High Sierra 10.13.2, macOS Sierra 10.12.6.2
Impact: Processing a maliciously crafted text message may lead to
application denial of service
Description: A resource exhaustion issue was addressed through
improved input validation.
CVE-2018-4100: Abraham Masri (@cheesecakeufo)
QuartzCore
Available for: macOS High Sierra 10.13.2, macOS Sierra 10.12.6,
OS X El Capitan 10.11.6
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A memory corruption issue existed in the processing of
web content. This issue was addressed through improved input
validation.
CVE-2018-4085: Ret2 Systems Inc. working with Trend Micro's Zero Day
Initiative
Sandbox
Available for: macOS High Sierra 10.13.2
Impact: A sandboxed process may be able to circumvent sandbox
restrictions
Description: An access issue was addressed through additional sandbox
restrictions.
CVE-2018-4091: Alex Gaynor of Mozilla
Security
Available for: macOS High Sierra 10.13.2, macOS Sierra 10.12.6
Impact: A certificate may have name constraints applied incorrectly
Description: A certificate evaluation issue existed in the handling
of name constraints. This issue was addressed through improved trust
evaluation of certificates.
CVE-2018-4086: Ian Haken of Netflix
WebKit
Available for: macOS High Sierra 10.13.2
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: Multiple memory corruption issues were addressed with
improved memory handling.
CVE-2018-4088: Jeonghoon Shin of Theori
CVE-2018-4089: Ivan Fratric of Google Project Zero
CVE-2018-4096: found by OSS-Fuzz
Wi-Fi
Available for: macOS High Sierra 10.13.2, macOS Sierra 10.12.6,
OS X El Capitan 10.11.6
Impact: An application may be able to read restricted memory
Description: A validation issue was addressed with improved input
sanitization.
CVE-2018-4084: Hyung Sup Lee of Minionz, You Chan Lee of Hanyang
University
Installation note:
macOS High Sierra 10.13.3, Security Update 2018-001 Sierra,
and Security Update 2018-001 El Capitan may be obtained from the
Mac App Store or Apple's Software Downloads web site:
https://support.apple.com/downloads/
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----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=pc7O
-----END PGP SIGNATURE-----
. By now, we're sure most everyone have heard of the Meltdown and Spectre
attacks. If not, head over to https://meltdownattack.com/ and get an
overview.
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
The FreeBSD Security Team was notified of the issue in late December
and received a briefing under NDA with the original embargo date of
January 9th. Since we received relatively late notice of the issue, our
ability to provide fixes is delayed.
Meltdown (CVE-2017-5754)
~~~~~~~~~~~~~~~~~~~~~~~~
In terms of priority, the first step is to mitigate against the Meltdown
attack (CVE-2017-5754, cited as variant 3 by Project Zero). Work for
this is ongoing, but due to the relatively large changes needed, this is
going to take a little while. We are currently targeting patches for
amd64 being dev complete this week with testing probably running into
next week. From there, we hope to give it a short bake time before
pushing it into the 11.1-RELEASE branch. Additional work will be
required to bring the mitigation to 10.3-RELEASE and 10.4-RELEASE.
The code will be selectable via a tunable which will automatically turn
on for modern Intel processors and off for AMD processors (since they
are reportedly not vulnerable). Since the fix for Meltdown does incur a
performance hit for any transition between user space and kernel space,
this could be rather impactful depending on the workload. As such, the
tunable can also be overridden by the end-user if they are willing to
accept the risk.
Initial work can be tracked at https://reviews.freebsd.org/D13797.
Please note this is a work in progress and some stuff is likely to be
broken.
Spectre (CVE-2017-5753 and CVE-2017-5715)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
When it comes to the Spectre vulnerabilities, it is much harder to sort
these out. Variant 1 (CVE-2017-5753) is going to require some static
analysis to determine vulnerable use cases that will require barriers to
stop speculation from disclosing information it shouldn't. While we
haven't done the analysis to determine where we are vulnerable, the
number of cases here are supposed to be pretty small. Apparently there
have been some Coverity rules developed to help look for these, but we
are still evaluating what can be done here.
The other half of Spectre, variant 2 (CVE-2017-5715) is a bit trickier
as it affects both normal processes and bhyve. There is a proposed patch
for LLVM (https://reviews.llvm.org/D41723) that introduces a concept
called 'retpoline' which mitigates this issue. We are likely to pull
this into HEAD and 11-STABLE once it hits the LLVM tree. Unfortunately,
the currently supported FreeBSD releases are using older versions of
LLVM for which we are not sure the LLVM project will produce patches. We
will be looking at the feasibility to backport these patches to these
earlier versions.
There are CPU microcode fixes coming out when in concert with OS changes
would also help, but that's a bit down the road at the moment.
Best regards,
Gordon Tetlow
with security-officer hat on
.
==========================================================================
Ubuntu Security Notice USN-3540-2
January 23, 2018
linux-lts-xenial, linux-aws vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
Several security issues were addressed in the Linux kernel. This update provides the corresponding updates for the
Linux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for
Ubuntu 14.04 LTS.
(CVE-2017-5715, CVE-2017-5753)
USN-3522-2 mitigated CVE-2017-5754 (Meltdown) for the amd64
architecture in the Linux Hardware Enablement (HWE) kernel from Ubuntu
16.04 LTS for Ubuntu 14.04 LTS. This flaw is known as Meltdown. (CVE-2017-5754)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
linux-image-4.4.0-1011-aws 4.4.0-1011.11
linux-image-4.4.0-111-generic 4.4.0-111.134~14.04.1
linux-image-4.4.0-111-lowlatency 4.4.0-111.134~14.04.1
linux-image-4.4.0-111-powerpc-e500mc 4.4.0-111.134~14.04.1
linux-image-4.4.0-111-powerpc-smp 4.4.0-111.134~14.04.1
linux-image-4.4.0-111-powerpc64-emb 4.4.0-111.134~14.04.1
linux-image-4.4.0-111-powerpc64-smp 4.4.0-111.134~14.04.1
linux-image-aws 4.4.0.1011.11
linux-image-generic-lts-xenial 4.4.0.111.95
linux-image-lowlatency-lts-xenial 4.4.0.111.95
linux-image-powerpc-e500mc-lts-xenial 4.4.0.111.95
linux-image-powerpc-smp-lts-xenial 4.4.0.111.95
linux-image-powerpc64-emb-lts-xenial 4.4.0.111.95
linux-image-powerpc64-smp-lts-xenial 4.4.0.111.95
Please note that fully mitigating CVE-2017-5715 (Spectre Variant 2)
requires corresponding processor microcode/firmware updates or,
in virtual environments, hypervisor updates. On i386 and amd64
architectures, the IBRS and IBPB features are required to enable the
kernel mitigations. Ubuntu is working with Intel and AMD to provide
future microcode updates that implement IBRS and IBPB as they are made
available. Ubuntu users with a processor from a different vendor should
contact the vendor to identify necessary firmware updates. Ubuntu
will provide corresponding QEMU updates in the future for users of
self-hosted virtual environments in coordination with upstream QEMU.
Ubuntu users in cloud environments should contact the cloud provider
to confirm that the hypervisor has been updated to expose the new
CPU features to virtual machines.
Bug Fix(es):
* Previously, the page table isolation feature was able to modify the
kernel Page Global Directory (PGD) entries with the _NX bit even for CPUs
without the capability to use the "no execute" (NX) bit technology.
Consequently, the page tables got corrupted, and the kernel panicked at the
first page-fault occurrence. This update adds the check of CPU capabilities
before modifying kernel PGD entries with _NX. As a result, the operating
system no longer panics on boot due to corrupted page tables under the
described circumstances. (BZ#1538169)
* When booting the operating system with the Kernel Page Table Isolation
option enabled, the HPET VSYSCALL shadow mapping was not placed correctly.
Consequently, the High Precision Event Timer (HPET) feature was not
available early enough, and warnings on boot time occurred. This update
fixes the placement of HPET VSYSCALL, and the warnings on boot time due to
this behavior no longer occur. (BZ#1541281)
* Previously, the routine preparing the kexec crashkernel area did not
properly clear the page allocated to be kexec's Page Global Directory
(PGD). Consequently, the page table isolation shadow mapping routines
failed with a warning message when setting up page table entries. With this
update, the underlying source code has been fixed to clear the kexec PGD
allocated page before setting up its page table entries. As a result,
warnings are no longer issued when setting up kexec. (BZ#1541285)
* When changing a kernel page mapping from Read Only (RO) to Read Write
(RW), the Translation Lookaside Buffer (TLB) entry was previously not
updated. Consequently, a protection fault on a write operation occurred,
which led to a kernel panic. With this update, the underlying source code
has been fixed to handle such kind of fault properly, and the kernel no
longer panics in the described situation. (BZ#1541892)
4. X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Thu, 04 Jan 2018 01:01:01 +0000 (UTC)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel security update
Advisory ID: RHSA-2018:0008-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2018:0008
Issue date: 2018-01-03
=====================================================================
1. Summary:
An update for kernel is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
3. Description:
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security Fix(es):
An industry-wide issue was found in the way many modern microprocessor
designs have implemented speculative execution of instructions (a commonly
used performance optimization). There are three primary variants of the
issue which differ in the way the speculative execution can be exploited.
Note: This issue is present in hardware and cannot be fully fixed via
software update. The updated kernel packages provide software mitigation
for this hardware issue at a cost of potential performance penalty. Please
refer to References section for further information about this issue and
the performance impact.
In this update mitigations for x86-64 architecture are provided.
Variant CVE-2017-5753 triggers the speculative execution by performing a
bounds-check bypass. It relies on the presence of a precisely-defined
instruction sequence in the privileged code as well as the fact that memory
accesses may cause allocation into the microprocessor's data cache even for
speculatively executed instructions that never actually commit (retire). As
a result, an unprivileged attacker could use this flaw to cross the syscall
boundary and read privileged memory by conducting targeted cache
side-channel attacks. (CVE-2017-5753, Important)
Variant CVE-2017-5715 triggers the speculative execution by utilizing
branch target injection. It relies on the presence of a precisely-defined
instruction sequence in the privileged code as well as the fact that memory
accesses may cause allocation into the microprocessor's data cache even for
speculatively executed instructions that never actually commit (retire). As
a result, an unprivileged attacker could use this flaw to cross the syscall
and guest/host boundaries and read privileged memory by conducting targeted
cache side-channel attacks. (CVE-2017-5715, Important)
Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors,
during speculative execution of instruction permission faults, exception
generation triggered by a faulting access is suppressed until the
retirement of the whole instruction block. In a combination with the fact
that memory accesses may populate the cache even when the block is being
dropped and never committed (executed), an unprivileged local attacker
could use this flaw to read privileged (kernel space) memory by conducting
targeted cache side-channel attacks. (CVE-2017-5754, Important)
Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64
microprocessors are not affected by this issue.
Red Hat would like to thank Google Project Zero for reporting these issues.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1519778 - CVE-2017-5753 hw: cpu: speculative execution bounds-check bypass
1519780 - CVE-2017-5715 hw: cpu: speculative execution branch target injection
1519781 - CVE-2017-5754 hw: cpu: speculative execution permission faults handling
6. Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source:
kernel-2.6.32-696.18.7.el6.src.rpm
i386:
kernel-2.6.32-696.18.7.el6.i686.rpm
kernel-debug-2.6.32-696.18.7.el6.i686.rpm
kernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm
kernel-debug-devel-2.6.32-696.18.7.el6.i686.rpm
kernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm
kernel-devel-2.6.32-696.18.7.el6.i686.rpm
kernel-headers-2.6.32-696.18.7.el6.i686.rpm
perf-2.6.32-696.18.7.el6.i686.rpm
perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
python-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
noarch:
kernel-abi-whitelists-2.6.32-696.18.7.el6.noarch.rpm
kernel-doc-2.6.32-696.18.7.el6.noarch.rpm
kernel-firmware-2.6.32-696.18.7.el6.noarch.rpm
x86_64:
kernel-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debug-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm
kernel-debug-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debug-devel-2.6.32-696.18.7.el6.i686.rpm
kernel-debug-devel-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm
kernel-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm
kernel-debuginfo-common-x86_64-2.6.32-696.18.7.el6.x86_64.rpm
kernel-devel-2.6.32-696.18.7.el6.x86_64.rpm
kernel-headers-2.6.32-696.18.7.el6.x86_64.rpm
perf-2.6.32-696.18.7.el6.x86_64.rpm
perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
python-perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
i386:
kernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm
kernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm
perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
python-perf-2.6.32-696.18.7.el6.i686.rpm
python-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
x86_64:
kernel-debug-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-696.18.7.el6.x86_64.rpm
perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
python-perf-2.6.32-696.18.7.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source:
kernel-2.6.32-696.18.7.el6.src.rpm
noarch:
kernel-abi-whitelists-2.6.32-696.18.7.el6.noarch.rpm
kernel-doc-2.6.32-696.18.7.el6.noarch.rpm
kernel-firmware-2.6.32-696.18.7.el6.noarch.rpm
x86_64:
kernel-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debug-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm
kernel-debug-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debug-devel-2.6.32-696.18.7.el6.i686.rpm
kernel-debug-devel-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm
kernel-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm
kernel-debuginfo-common-x86_64-2.6.32-696.18.7.el6.x86_64.rpm
kernel-devel-2.6.32-696.18.7.el6.x86_64.rpm
kernel-headers-2.6.32-696.18.7.el6.x86_64.rpm
perf-2.6.32-696.18.7.el6.x86_64.rpm
perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
python-perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
x86_64:
kernel-debug-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-696.18.7.el6.x86_64.rpm
perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
python-perf-2.6.32-696.18.7.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source:
kernel-2.6.32-696.18.7.el6.src.rpm
i386:
kernel-2.6.32-696.18.7.el6.i686.rpm
kernel-debug-2.6.32-696.18.7.el6.i686.rpm
kernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm
kernel-debug-devel-2.6.32-696.18.7.el6.i686.rpm
kernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm
kernel-devel-2.6.32-696.18.7.el6.i686.rpm
kernel-headers-2.6.32-696.18.7.el6.i686.rpm
perf-2.6.32-696.18.7.el6.i686.rpm
perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
python-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
noarch:
kernel-abi-whitelists-2.6.32-696.18.7.el6.noarch.rpm
kernel-doc-2.6.32-696.18.7.el6.noarch.rpm
kernel-firmware-2.6.32-696.18.7.el6.noarch.rpm
ppc64:
kernel-2.6.32-696.18.7.el6.ppc64.rpm
kernel-bootwrapper-2.6.32-696.18.7.el6.ppc64.rpm
kernel-debug-2.6.32-696.18.7.el6.ppc64.rpm
kernel-debug-debuginfo-2.6.32-696.18.7.el6.ppc64.rpm
kernel-debug-devel-2.6.32-696.18.7.el6.ppc64.rpm
kernel-debuginfo-2.6.32-696.18.7.el6.ppc64.rpm
kernel-debuginfo-common-ppc64-2.6.32-696.18.7.el6.ppc64.rpm
kernel-devel-2.6.32-696.18.7.el6.ppc64.rpm
kernel-headers-2.6.32-696.18.7.el6.ppc64.rpm
perf-2.6.32-696.18.7.el6.ppc64.rpm
perf-debuginfo-2.6.32-696.18.7.el6.ppc64.rpm
python-perf-debuginfo-2.6.32-696.18.7.el6.ppc64.rpm
s390x:
kernel-2.6.32-696.18.7.el6.s390x.rpm
kernel-debug-2.6.32-696.18.7.el6.s390x.rpm
kernel-debug-debuginfo-2.6.32-696.18.7.el6.s390x.rpm
kernel-debug-devel-2.6.32-696.18.7.el6.s390x.rpm
kernel-debuginfo-2.6.32-696.18.7.el6.s390x.rpm
kernel-debuginfo-common-s390x-2.6.32-696.18.7.el6.s390x.rpm
kernel-devel-2.6.32-696.18.7.el6.s390x.rpm
kernel-headers-2.6.32-696.18.7.el6.s390x.rpm
kernel-kdump-2.6.32-696.18.7.el6.s390x.rpm
kernel-kdump-debuginfo-2.6.32-696.18.7.el6.s390x.rpm
kernel-kdump-devel-2.6.32-696.18.7.el6.s390x.rpm
perf-2.6.32-696.18.7.el6.s390x.rpm
perf-debuginfo-2.6.32-696.18.7.el6.s390x.rpm
python-perf-debuginfo-2.6.32-696.18.7.el6.s390x.rpm
x86_64:
kernel-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debug-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm
kernel-debug-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debug-devel-2.6.32-696.18.7.el6.i686.rpm
kernel-debug-devel-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm
kernel-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm
kernel-debuginfo-common-x86_64-2.6.32-696.18.7.el6.x86_64.rpm
kernel-devel-2.6.32-696.18.7.el6.x86_64.rpm
kernel-headers-2.6.32-696.18.7.el6.x86_64.rpm
perf-2.6.32-696.18.7.el6.x86_64.rpm
perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
python-perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
i386:
kernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm
kernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm
perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
python-perf-2.6.32-696.18.7.el6.i686.rpm
python-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
ppc64:
kernel-debug-debuginfo-2.6.32-696.18.7.el6.ppc64.rpm
kernel-debuginfo-2.6.32-696.18.7.el6.ppc64.rpm
kernel-debuginfo-common-ppc64-2.6.32-696.18.7.el6.ppc64.rpm
perf-debuginfo-2.6.32-696.18.7.el6.ppc64.rpm
python-perf-2.6.32-696.18.7.el6.ppc64.rpm
python-perf-debuginfo-2.6.32-696.18.7.el6.ppc64.rpm
s390x:
kernel-debug-debuginfo-2.6.32-696.18.7.el6.s390x.rpm
kernel-debuginfo-2.6.32-696.18.7.el6.s390x.rpm
kernel-debuginfo-common-s390x-2.6.32-696.18.7.el6.s390x.rpm
kernel-kdump-debuginfo-2.6.32-696.18.7.el6.s390x.rpm
perf-debuginfo-2.6.32-696.18.7.el6.s390x.rpm
python-perf-2.6.32-696.18.7.el6.s390x.rpm
python-perf-debuginfo-2.6.32-696.18.7.el6.s390x.rpm
x86_64:
kernel-debug-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-696.18.7.el6.x86_64.rpm
perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
python-perf-2.6.32-696.18.7.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source:
kernel-2.6.32-696.18.7.el6.src.rpm
i386:
kernel-2.6.32-696.18.7.el6.i686.rpm
kernel-debug-2.6.32-696.18.7.el6.i686.rpm
kernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm
kernel-debug-devel-2.6.32-696.18.7.el6.i686.rpm
kernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm
kernel-devel-2.6.32-696.18.7.el6.i686.rpm
kernel-headers-2.6.32-696.18.7.el6.i686.rpm
perf-2.6.32-696.18.7.el6.i686.rpm
perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
python-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
noarch:
kernel-abi-whitelists-2.6.32-696.18.7.el6.noarch.rpm
kernel-doc-2.6.32-696.18.7.el6.noarch.rpm
kernel-firmware-2.6.32-696.18.7.el6.noarch.rpm
x86_64:
kernel-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debug-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm
kernel-debug-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debug-devel-2.6.32-696.18.7.el6.i686.rpm
kernel-debug-devel-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm
kernel-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm
kernel-debuginfo-common-x86_64-2.6.32-696.18.7.el6.x86_64.rpm
kernel-devel-2.6.32-696.18.7.el6.x86_64.rpm
kernel-headers-2.6.32-696.18.7.el6.x86_64.rpm
perf-2.6.32-696.18.7.el6.x86_64.rpm
perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
python-perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
i386:
kernel-debug-debuginfo-2.6.32-696.18.7.el6.i686.rpm
kernel-debuginfo-2.6.32-696.18.7.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-696.18.7.el6.i686.rpm
perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
python-perf-2.6.32-696.18.7.el6.i686.rpm
python-perf-debuginfo-2.6.32-696.18.7.el6.i686.rpm
x86_64:
kernel-debug-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-696.18.7.el6.x86_64.rpm
perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
python-perf-2.6.32-696.18.7.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-696.18.7.el6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/speculativeexecution
https://access.redhat.com/security/cve/CVE-2017-5753
https://access.redhat.com/security/cve/CVE-2017-5715
https://access.redhat.com/security/cve/CVE-2017-5754
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFaTXwuXlSAg2UNWIIRAp3LAKCNdSqjVu7zsXcUTnpGuuQAuUlTpwCfTE/O
OR+iGnoY+cALbsBWKwbmzQM=
=V4ow
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. 6.5) - x86_64
3. 7) - noarch, x86_64
3. Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables
fine-tuning for systems with extremely high determinism requirements. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: hpesbhf03805en_us
Version: 7
HPESBHF03805 rev.7 - Certain HPE products using Microprocessors from Intel,
AMD, and ARM, with Speculative Execution, Elevation of Privilege and
Information Disclosure.
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2018-01-23
Last Updated: 2018-01-22
Potential Security Impact: Local: Disclosure of Information, Elevation of
Privilege
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
On January 3 2018, side-channel security vulnerabilities involving
speculative execution were publicly disclosed. These vulnerabilities may
impact the listed HPE products, potentially leading to information disclosure
and elevation of privilege. Mitigation and resolution of these
vulnerabilities may call for both an operating system update, provided by the
OS vendor, and a system ROM update from HPE.
**Note:**
* This issue takes advantage of techniques commonly used in many modern
processor architectures.
* For further information, microprocessor vendors have provided security
advisories:
- Intel:
<https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00088&langu
geid=en-fr>
- AMD: <http://www.amd.com/en/corporate/speculative-execution>
- ARM: <https://developer.arm.com/support/security-update>
References:
- CVE-2017-5715 - aka Spectre, branch target injection
- CVE-2017-5753 - aka Spectre, bounds check bypass
- CVE-2017-5754 - aka Meltdown, rogue data cache load, memory access
permission check performed after kernel memory read
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HPE ProLiant DL380 Gen10 Server - To be delivered
- HPE ProLiant DL180 Gen10 Server - To be delivered
- HPE ProLiant DL160 Gen10 Server - To be delivered
- HPE ProLiant DL360 Gen10 Server - To be delivered
- HPE ProLiant ML110 Gen10 Server - To be delivered
- HPE ProLiant DL580 Gen10 Server - To be delivered
- HPE ProLiant DL560 Gen10 Server - To be delivered
- HPE ProLiant DL120 Gen10 Server - To be delivered
- HPE ProLiant ML350 Gen10 Server - To be delivered
- HPE ProLiant XL450 Gen10 Server - To be delivered
- HPE Synergy 660 Gen10 Compute Module - To be delivered
- HPE ProLiant DL385 Gen10 Server - prior to v1.04
- HPE ProLiant XL170r Gen10 Server - To be delivered
- HPE ProLiant BL460c Gen10 Server Blade - To be delivered
- HPE ProLiant XL190r Gen10 Server - To be delivered
- HPE ProLiant XL230k Gen10 Server - To be delivered
- HPE Synergy 480 Gen10 Compute Module - To be delivered
- HPE ProLiant XL730f Gen9 Server - To be delivered
- HPE ProLiant XL230a Gen9 Server - To be delivered
- HPE ProLiant XL740f Gen9 Server - To be delivered
- HPE ProLiant XL750f Gen9 Server - To be delivered
- HPE ProLiant XL170r Gen9 Server - To be delivered
- HP ProLiant DL60 Gen9 Server - To be delivered
- HP ProLiant DL160 Gen9 Server - To be delivered
- HPE ProLiant DL360 Gen9 Server - To be delivered
- HP ProLiant DL380 Gen9 Server - To be delivered
- HPE ProLiant XL450 Gen9 Server - To be delivered
- HPE Apollo 4200 Gen9 Server - To be delivered
- HP ProLiant BL460c Gen9 Server Blade - To be delivered
- HP ProLiant ML110 Gen9 Server - To be delivered
- HP ProLiant ML150 Gen9 Server - To be delivered
- HPE ProLiant ML350 Gen9 Server - To be delivered
- HP ProLiant DL120 Gen9 Server - To be delivered
- HPE ProLiant DL560 Gen9 Server - To be delivered
- HP ProLiant BL660c Gen9 Server - To be delivered
- HPE ProLiant ML30 Gen9 Server - To be delivered
- HPE ProLiant XL170r Gen10 Server - To be delivered
- HPE ProLiant DL20 Gen9 Server - To be delivered
- HPE Synergy 660 Gen9 Compute Module - To be delivered
- HPE Synergy 480 Gen9 Compute Module - To be delivered
- HPE ProLiant XL250a Gen9 Server - To be delivered
- HPE ProLiant XL190r Gen9 Server - To be delivered
- HP ProLiant DL80 Gen9 Server - To be delivered
- HPE ProLiant DL180 Gen9 Server - To be delivered
- HPE ProLiant XL270d Gen9 Accelerator Tray 2U Configure-to-order Server -
To be delivered
- HPE ProLiant WS460c Gen9 Workstation - To be delivered
- HPE ProLiant XL260a Gen9 Server - To be delivered
- HPE Synergy 620 Gen9 Compute Module - To be delivered
- HPE ProLiant DL580 Gen9 Server - To be delivered
- HP ProLiant XL220a Gen8 v2 Server - To be delivered
- HPE Synergy 680 Gen9 Compute Module - To be delivered
- HPE ProLiant m510 Server Cartridge - To be delivered
- HPE ProLiant m710p Server Cartridge - To be delivered
- HPE ProLiant m710x Server Cartridge - To be delivered
- HP ProLiant m710 Server Cartridge - To be delivered
- HP ProLiant DL980 G7 Server - To be delivered
- HPE Synergy Composer - To be delivered
- HPE ProLiant Thin Micro TM200 Server - To be delivered
- HPE ProLiant ML10 v2 Server - To be delivered
- HPE ProLiant m350 Server Cartridge - To be delivered
- HPE ProLiant m300 Server Cartridge - To be delivered
- HPE ProLiant MicroServer Gen8 - To be delivered
- HPE ProLiant ML310e Gen8 v2 Server - To be delivered
- HPE Superdome Flex Server - To be delivered
- HP 3PAR StoreServ File Controller - To be delivered - v3 impacted
- HPE StoreVirtual 3000 File Controller - To be delivered
- HPE StoreEasy 1450 Storage - To be delivered
- HPE StoreEasy 1550 Storage - To be delivered
- HPE StoreEasy 1650 Storage - To be delivered
- HPE StoreEasy 3850 Gateway Storage - To be delivered
- HPE StoreEasy 1850 Storage - To be delivered
- HP ConvergedSystem 700 - To be delivered
- HPE Converged Architecture 700 - To be delivered
- HP ProLiant DL580 Gen8 Server - To be delivered
- HPE Cloudline CL2100 Gen10 Server - To be delivered
- HPE Cloudline CL2200 Gen10 Server - To be delivered
- HPE Cloudline CL3150 G4 Server - To be delivered
- HPE Cloudline CL5200 G3 Server - To be delivered
- HPE Cloudline CL3100 G3 Server - To be delivered
- HPE Cloudline CL2100 G3 807S 8 SFF Configure-to-order Server - To be
delivered
- HPE Cloudline CL2100 G3 407S 4 LFF Configure-to-order Server - To be
delivered
- HPE Cloudline CL2100 G3 806R 8SFF Configure-to-order Server - To be
delivered
- HPE Cloudline CL2200 G3 1211R 12 LFF Configure-to-order Server - To be
delivered
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2017-5715
8.2 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
6.8 (AV:A/AC:L/Au:N/C:C/I:P/A:N)
CVE-2017-5753
5.0 CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L
5.4 (AV:A/AC:M/Au:N/C:P/I:P/A:P)
CVE-2017-5754
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
On January 11, Intel announced issues with an increased frequency of reboots
when using the microcodes they released to address Variant 2 of the Spectre
Vulnerability for numerous processors including Broadwell, Haswell, Skylake,
Kaby Lake, Ivybridge, and Sandybridge processors. Intel has now identified
the root cause of these issues and determined that these microcodes may
introduce reboots and other unpredictable system behavior. Due to the
severity of the potential issues that may occur when using these microcodes,
Intel is now recommending that customers discontinue their use. Additional
information is available from Intels Security Exploit Newsroom here:
<https://newsroom.intel.com/press-kits/security-exploits-intel-products/> .
HPE is in alignment with Intel in our recommendation that customers
discontinue use of System ROMs including impacted microcodes and revert to
earlier System ROM versions.
All System ROMs including impacted microcodes have been removed from the HPE
Support Site. This impacts HPE ProLiant and Synergy Gen10, Gen9, and Gen8 v2
servers as well as HPE Superdome servers for which updated System ROMs had
previously been made available. Intel is working on updated microcodes to
address these issues, and HPE will validate updated System ROMs including
these microcodes and make them available to our customers in the coming
weeks.
Mitigations for Variant 1 (Spectre) and Variant 3 (Meltdown) vulnerabilities
require only OS updates and are not impacted.
* HPE has provided a customer bulletin
<https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00039267en_us>
with specific instructions to obtain the udpated sytem ROM
- Note:
+ CVE-2017-5715 (Variant 2) requires that the System ROM be updated and a
vendor supplied operating system update be applied as well.
+ For CVE-2017-5753, CVE-2017-5754 (Variants 1 and 3) require only
updates of a vendor supplied operating system.
+ HPE will continue to add additional products to the list.
HISTORY
Version:1 (rev.1) - 4 January 2018 Initial release
Version:2 (rev.2) - 5 January 2018 Added additional impacted products
Version:3 (rev.3) - 10 January 2018 Added more impacted products
Version:4 (rev.4) - 9 January 2018 Fixed product ID
Version:5 (rev.5) - 18 January 2018 Added additional impacted products
Version:6 (rev.6) - 19 January 2018 updated impacted product list
Version:7 (rev.7) - 23 January 2018 Marked impacted products with TBD for
System ROM updates per Intel's guidance on microcode issues
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported
product:
Web form: https://www.hpe.com/info/report-security-vulnerability
Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well
| VAR-201801-1063 | CVE-2018-0114 | Cisco node-jose Vulnerability related to key management errors in open source libraries |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the Cisco node-jose open source library before 0.11.0 could allow an unauthenticated, remote attacker to re-sign tokens using a key that is embedded within the token. The vulnerability is due to node-jose following the JSON Web Signature (JWS) standard for JSON Web Tokens (JWTs). This standard specifies that a JSON Web Key (JWK) representing a public key can be embedded within the header of a JWS. This public key is then trusted for verification. An attacker could exploit this by forging valid JWS objects by removing the original signature, adding a new public key to the header, and then signing the object using the (attacker-owned) private key associated with the public key embedded in that JWS header. Cisco Node-jose Library is prone to a remote security-bypass vulnerability.
Attackers can exploit this issue to bypass certain security restrictions to gain unauthorized access. This may aid in further attacks
| VAR-201801-1055 | CVE-2018-0104 | Cisco WebEx Network Recording Player Input validation vulnerability |
CVSS V2: 9.3 CVSS V3: 9.6 Severity: CRITICAL |
A vulnerability in Cisco WebEx Network Recording Player for Advanced Recording Format (ARF) files could allow a remote attacker to execute arbitrary code on the system of a targeted user. The attacker could exploit this vulnerability by sending the user a link or email attachment with a malicious ARF file and persuading the user to follow the link or launch the file. Successful exploitation could allow the attacker to execute arbitrary code on the user's system. This vulnerability affects Cisco WebEx Business Suite meeting sites, Cisco WebEx Meetings sites, Cisco WebEx Meetings Server, and Cisco WebEx ARF players. Cisco Bug IDs: CSCvg78853, CSCvg78856, CSCvg78857. Vendors have confirmed this vulnerability Bug ID CSCvg78853 , CSCvg78856 ,and CSCvg78857 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. While opening an ARF file, WebEx Network Recording Player loads a DLL from an unqualified path
| VAR-201801-0212 | CVE-2017-1612 | IBM WebSphere MQ Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
IBM WebSphere MQ 7.0, 7.1, 7.5, 8.0, and 9.0 service trace module could be used to execute untrusted code under 'mqm' user. IBM X-Force ID: 132953. Vendors have confirmed this vulnerability IBM X-Force ID: 132953 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. IBM WebSphere MQ is prone to a local privilege-escalation vulnerability.
Successfully exploiting this issue may allow an attacker to execute arbitrary code with elevated privileges
| VAR-201801-0296 | CVE-2017-1000471 | EmbedThis GoAhead Webserver In NULL Pointer dereference vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
EmbedThis GoAhead Webserver version 4.0.0 is vulnerable to a NULL pointer dereference in the CGI handler resulting in memory corruption or denial of service. Embedthis Goahead Webserver is a small and exquisite embedded Web server of American Embedthis Software Company, which supports embedding in various devices and applications. CGI handler is one of the CGI handlers
| VAR-201801-1054 | CVE-2018-0103 | Cisco WebEx Network Recording Player Buffer error vulnerability |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
A Buffer Overflow vulnerability in Cisco WebEx Network Recording Player for Advanced Recording Format (ARF) files could allow a local attacker to execute arbitrary code on the system of a user. The attacker could exploit this vulnerability by sending the user a link or email attachment with a malicious ARF file and persuading the user to follow the link or launch the file. Successful exploitation could allow the attacker to execute arbitrary code on the user's system. This vulnerability affects Cisco WebEx Business Suite meeting sites, Cisco WebEx Meetings sites, Cisco WebEx Meetings Server, and Cisco WebEx ARF players. Cisco Bug IDs: CSCvg78835, CSCvg78837, CSCvg78839. Vendors have confirmed this vulnerability Bug ID CSCvg78835 , CSCvg78837 ,and CSCvg78839 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Crafted data in an ARF file can trigger an overflow of a heap-based buffer.
Attackers can exploit this issue to cause a denial-of-service condition. WebEx ARF player is one of the media players mainly used to play WebEx recording files in ARF format
| VAR-201801-0826 | CVE-2017-5715 | CPU hardware utilizing speculative execution may be vulnerable to cache side-channel attacks |
CVSS V2: 1.9 CVSS V3: 5.6 Severity: MEDIUM |
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. Two vulnerabilities are identified, known as "Variant 3a" and "Variant 4". Has speculative execution function and out-of-order execution function CPU Several researchers have reported methods of performing side-channel attacks against Has speculative execution function and out-of-order execution function CPU side-channel attack method against (Spectre and Meltdown) has been reported. For more information, Google Project Zero blog post in ("Reading privileged memory with a side-channel") or Graz University of Technology (TU Graz) information from researchers in ("Meltdown and Spectre") Please refer to. "Reading privileged memory with a side-channel"https://googleprojectzero.blogspot.jp/2018/01/reading-privileged-memory-with-side.html"Meltdown and Spectre"https://meltdownattack.com/Sensitive information can be obtained from processes running with user privileges. Spectre As for the attack, crafted Javascript by the code Javascript cannot be obtained from web It has been reported that data can be obtained during the browser process. CPUhardware is a set of firmware that runs in the CPU (Central Processing Unit) for managing and controlling the CPU. The Meltdown vulnerability exists in the CPU processor core, which \"melts\" the security boundary implemented by hardware, allowing low-privileged user-level applications to \"cross-border\" access to system-level memory, causing data leakage. Multiple CPU Hardware are prone to an information-disclosure vulnerability.
Attackers can exploit this issue to obtain sensitive information that may aid in further attacks. The following products and versions are affected: ARM Cortex-R7; Cortex-R8; Cortex-A8; Cortex-A9; Cortex-A12; Intel Xeon CPU E5-1650 v3, v2, v4 versions; Xeon E3-1265l v2, v3, v4 Version; Xeon E3-1245 v2, v3, v5, v6 versions; Xeon X7542, etc. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4188-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
May 01, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : linux
CVE ID : CVE-2017-5715 CVE-2017-5753 CVE-2017-17975 CVE-2017-18193
CVE-2017-18216 CVE-2017-18218 CVE-2017-18222 CVE-2017-18224
CVE-2017-18241 CVE-2017-18257 CVE-2018-1065 CVE-2018-1066
CVE-2018-1068 CVE-2018-1092 CVE-2018-1093 CVE-2018-1108
CVE-2018-5803 CVE-2018-7480 CVE-2018-7566 CVE-2018-7740
CVE-2018-7757 CVE-2018-7995 CVE-2018-8087 CVE-2018-8781
CVE-2018-8822 CVE-2018-10323 CVE-2018-1000199
Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.
CVE-2017-5715
Multiple researchers have discovered a vulnerability in various
processors supporting speculative execution, enabling an attacker
controlling an unprivileged process to read memory from arbitrary
addresses, including from the kernel and all other processes
running on the system.
This specific attack has been named Spectre variant 2 (branch
target injection) and is mitigated for the x86 architecture (amd64
and i386) by using the "retpoline" compiler feature which allows
indirect branches to be isolated from speculative execution.
CVE-2017-5753
Multiple researchers have discovered a vulnerability in various
processors supporting speculative execution, enabling an attacker
controlling an unprivileged process to read memory from arbitrary
addresses, including from the kernel and all other processes
running on the system.
This specific attack has been named Spectre variant 1
(bounds-check bypass) and is mitigated by identifying vulnerable
code sections (array bounds checking followed by array access) and
replacing the array access with the speculation-safe
array_index_nospec() function.
More use sites will be added over time.
CVE-2017-17975
Tuba Yavuz reported a use-after-free flaw in the USBTV007
audio-video grabber driver. A local user could use this for denial
of service by triggering failure of audio registration.
CVE-2017-18193
Yunlei He reported that the f2fs implementation does not properly
handle extent trees, allowing a local user to cause a denial of
service via an application with multiple threads.
CVE-2017-18216
Alex Chen reported that the OCFS2 filesystem failed to hold a
necessary lock during nodemanager sysfs file operations,
potentially leading to a null pointer dereference. A local user
could use this for denial of service.
CVE-2017-18218
Jun He reported a user-after-free flaw in the Hisilicon HNS ethernet
driver. A local user could use this for denial of service.
CVE-2017-18222
It was reported that the Hisilicon Network Subsystem (HNS) driver
implementation does not properly handle ethtool private flags. A
local user could use this for denial of service or possibly have
other impact.
CVE-2017-18224
Alex Chen reported that the OCFS2 filesystem omits the use of a
semaphore and consequently has a race condition for access to the
extent tree during read operations in DIRECT mode. A local user
could use this for denial of service.
CVE-2017-18241
Yunlei He reported that the f2fs implementation does not properly
initialise its state if the "noflush_merge" mount option is used.
A local user with access to a filesystem mounted with this option
could use this to cause a denial of service.
CVE-2017-18257
It was reported that the f2fs implementation is prone to an infinite
loop caused by an integer overflow in the __get_data_block()
function. A local user can use this for denial of service via
crafted use of the open and fallocate system calls with an
FS_IOC_FIEMAP ioctl.
CVE-2018-1065
The syzkaller tool found a NULL pointer dereference flaw in the
netfilter subsystem when handling certain malformed iptables
rulesets. A local user with the CAP_NET_RAW or CAP_NET_ADMIN
capability (in any user namespace) could use this to cause a denial
of service. Debian disables unprivileged user namespaces by default.
CVE-2018-1066
Dan Aloni reported to Red Hat that the CIFS client implementation
would dereference a null pointer if the server sent an invalid
response during NTLMSSP setup negotiation. This could be used
by a malicious server for denial of service.
CVE-2018-1068
The syzkaller tool found that the 32-bit compatibility layer of
ebtables did not sufficiently validate offset values. On a 64-bit
kernel, a local user with the CAP_NET_ADMIN capability (in any user
namespace) could use this to overwrite kernel memory, possibly
leading to privilege escalation. Debian disables unprivileged user
namespaces by default.
CVE-2018-1092
Wen Xu reported that a crafted ext4 filesystem image would
trigger a null dereference when mounted. A local user able
to mount arbitrary filesystems could use this for denial of
service.
CVE-2018-1093
Wen Xu reported that a crafted ext4 filesystem image could trigger
an out-of-bounds read in the ext4_valid_block_bitmap() function. A
local user able to mount arbitrary filesystems could use this for
denial of service.
CVE-2018-1108
Jann Horn reported that crng_ready() does not properly handle the
crng_init variable states and the RNG could be treated as
cryptographically safe too early after system boot.
CVE-2018-5803
Alexey Kodanev reported that the SCTP protocol did not range-check
the length of chunks to be created. A local or remote user could
use this to cause a denial of service.
CVE-2018-7480
Hou Tao discovered a double-free flaw in the blkcg_init_queue()
function in block/blk-cgroup.c. A local user could use this to cause
a denial of service or have other impact.
CVE-2018-7566
Fan LongFei reported a race condition in the ALSA (sound)
sequencer core, between write and ioctl operations. This could
lead to an out-of-bounds access or use-after-free. A local user
with access to a sequencer device could use this for denial of
service or possibly for privilege escalation.
CVE-2018-7740
Nic Losby reported that the hugetlbfs filesystem's mmap operation
did not properly range-check the file offset. A local user with
access to files on a hugetlbfs filesystem could use this to cause
a denial of service.
CVE-2018-7757
Jason Yan reported a memory leak in the SAS (Serial-Attached
SCSI) subsystem. A local user on a system with SAS devices
could use this to cause a denial of service.
CVE-2018-7995
Seunghun Han reported a race condition in the x86 MCE
(Machine Check Exception) driver. This is unlikely to have
any security impact.
CVE-2018-8087
A memory leak flaw was found in the hwsim_new_radio_nl() function in
the simulated radio testing tool driver for mac80211, allowing a
local user to cause a denial of service.
CVE-2018-8781
Eyal Itkin reported that the udl (DisplayLink) driver's mmap
operation did not properly range-check the file offset. A local
user with access to a udl framebuffer device could exploit this to
overwrite kernel memory, leading to privilege escalation.
CVE-2018-8822
Dr Silvio Cesare of InfoSect reported that the ncpfs client
implementation did not validate reply lengths from the server. An
ncpfs server could use this to cause a denial of service or
remote code execution in the client.
CVE-2018-10323
Wen Xu reported a NULL pointer dereference flaw in the
xfs_bmapi_write() function triggered when mounting and operating a
crafted xfs filesystem image. A local user able to mount arbitrary
filesystems could use this for denial of service.
CVE-2018-1000199
Andy Lutomirski discovered that the ptrace subsystem did not
sufficiently validate hardware breakpoint settings. Local users
can use this to cause a denial of service, or possibly for
privilege escalation, on x86 (amd64 and i386) and possibly other
architectures.
For the stable distribution (stretch), these problems have been fixed in
version 4.9.88-1.
We recommend that you upgrade your linux packages.
For the detailed security status of linux please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/linux
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAlron7dfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0Se0xAAmR31jrqeEkJhgh7qvKplrko9N27l7FCCrrqsR0cBjKtIpwBkIdm6UxP2
8HBxqK5oy3sUP/ViHBtTUqFlRbLq4fC2DsuJGGqtBk46yML4QOEV2CXA1gyhfSzG
ux5Z5nNkLDbzD7jPazbTwMusbQrDItojj6K5aoDVoRjjOpRHRViHv81kRU3KJytX
62f/vnEjxX0xkSOqLKXcUNDczLjcP2VxuKFb3si6w7YyCXq6XYhvoDch92QLJZfD
qtDUCKs1sEgWLzhktcYyhck3NGujSfLZuSLGnZowqGqaAvx/lq0sTOliKuPpnG+I
HztPR0iYQCuzsDgHbLlwGyuUnf446VRG+u/AP69qk0HqyWwCXqsTJ0rwMX04fXtR
7dR8Y1jbbXaH0+ai9V6c3zdz4UKH5rZOkpIIYSjCxVHUpE2cU4lFXYiWL/qJRBGV
150TtSgyAPBBBJa6cWgApXrHgriGEkZNscH2nmJfg2OBnDwnLJ4CvwNfij7daR8n
RlGOlvgKYCI1Ob54kKqvvxQhDrhTiBhti8T64wd2MzsrKLIRdlyTpSrsqK8VIJyg
ux1Y01sgA3JqS2XKL52ZTgCJhGkoX68+/se73P+jeRBP/tbNcXB2t2cE6gxIkiTX
eZEUmnS5IeoEcr7cYKm3M9GZvBBrVeTaFra3vSgeGDUr0XL2Yu4=
=uZGQ
-----END PGP SIGNATURE-----
. 6.4) - x86_64
3. Description:
Kernel-based Virtual Machine (KVM) is a full virtualization solution for
Linux on a variety of architectures. The qemu-kvm package provides the
user-space component for running virtual machines that use KVM. (CVE-2017-5715)
Note: This is the qemu-kvm side of the CVE-2017-5715 mitigation. Once
all virtual machines have shut down, start them again for this update to
take effect. Relevant releases/architectures:
Image Updates for RHV-H - noarch
3. These
packages include redhat-release-virtualization-host, ovirt-node, and
rhev-hypervisor. RHVH features a Cockpit user interface for
monitoring the host's resources and performing administrative tasks.
Security Fix(es):
An industry-wide issue was found in the way many modern microprocessor
designs have implemented speculative execution of instructions (a commonly
used performance optimization). There are three primary variants of the
issue which differ in the way the speculative execution can be exploited.
Note: This issue is present in hardware and cannot be fully fixed via
software update. Please
refer to References section for further information about this issue and
the performance impact.
Variant CVE-2017-5753 triggers the speculative execution by performing a
bounds-check bypass. It relies on the presence of a precisely-defined
instruction sequence in the privileged code as well as the fact that memory
accesses may cause allocation into the microprocessor's data cache even for
speculatively executed instructions that never actually commit (retire). As
a result, an unprivileged attacker could use this flaw to cross the syscall
boundary and read privileged memory by conducting targeted cache
side-channel attacks. It relies on the presence of a precisely-defined
instruction sequence in the privileged code as well as the fact that memory
accesses may cause allocation into the microprocessor's data cache even for
speculatively executed instructions that never actually commit (retire). As
a result, an unprivileged attacker could use this flaw to cross the syscall
and guest/host boundaries and read privileged memory by conducting targeted
cache side-channel attacks. (CVE-2017-5715, Important)
Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors,
during speculative execution of instruction permission faults, exception
generation triggered by a faulting access is suppressed until the
retirement of the whole instruction block. In a combination with the fact
that memory accesses may populate the cache even when the block is being
dropped and never committed (executed), an unprivileged local attacker
could use this flaw to read privileged (kernel space) memory by conducting
targeted cache side-channel attacks. (CVE-2017-5754, Important)
Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64
microprocessors are not affected by this issue.
Red Hat would like to thank Google Project Zero for reporting these issues. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit this to obtain sensitive information from other
domains, bypassing same-origin restrictions. Summary:
An update for linux-firmware is now available for Red Hat Enterprise Linux
7, Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise
Linux 7.2 Telco Extended Update Support, Red Hat Enterprise Linux 7.2
Update Services for SAP Solutions, and Red Hat Enterprise Linux 7.3
Extended Update Support.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - noarch
Red Hat Enterprise Linux ComputeNode (v. 7) - noarch
Red Hat Enterprise Linux ComputeNode EUS (v. 7.3) - noarch
Red Hat Enterprise Linux Server (v. 7) - noarch
Red Hat Enterprise Linux Server AUS (v. 7.2) - noarch
Red Hat Enterprise Linux Server E4S (v. 7.2) - noarch
Red Hat Enterprise Linux Server EUS (v. 7.3) - noarch
Red Hat Enterprise Linux Server TUS (v. 7.2) - noarch
Red Hat Enterprise Linux Workstation (v. 7) - noarch
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - noarch
3. Description:
The linux-firmware packages contain all of the firmware files that are
required by various devices to operate.
This update supersedes microcode provided by Red Hat with the CVE-2017-5715
(aSpectrea) CPU branch injection vulnerability mitigation. (Historically,
Red Hat has provided updated microcode, developed by our microprocessor
partners, as a customer convenience.) Further testing has uncovered
problems with the microcode provided along with the aSpectrea mitigation
that could lead to system instabilities. As a result, Red Hat is providing
an microcode update that reverts to the last known good microcode version
dated before 03 January 2018. Red Hat strongly recommends that customers
contact their hardware provider for the latest microcode updates.
IMPORTANT: Customers using Intel Skylake-, Broadwell-, and Haswell-based
platforms must obtain and install updated microcode from their hardware
vendor immediately. The "Spectre" mitigation requires both an updated
kernel from Red Hat and updated microcode from your hardware vendor.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1519780 - CVE-2017-5715 hw: cpu: speculative execution branch target injection
6. Package List:
Red Hat Enterprise Linux Client (v. 7):
Source:
linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm
noarch:
iwl100-firmware-39.31.5.1-58.el7_4.noarch.rpm
iwl1000-firmware-39.31.5.1-58.el7_4.noarch.rpm
iwl105-firmware-18.168.6.1-58.el7_4.noarch.rpm
iwl135-firmware-18.168.6.1-58.el7_4.noarch.rpm
iwl2000-firmware-18.168.6.1-58.el7_4.noarch.rpm
iwl2030-firmware-18.168.6.1-58.el7_4.noarch.rpm
iwl3160-firmware-22.0.7.0-58.el7_4.noarch.rpm
iwl3945-firmware-15.32.2.9-58.el7_4.noarch.rpm
iwl4965-firmware-228.61.2.24-58.el7_4.noarch.rpm
iwl5000-firmware-8.83.5.1_1-58.el7_4.noarch.rpm
iwl5150-firmware-8.24.2.2-58.el7_4.noarch.rpm
iwl6000-firmware-9.221.4.1-58.el7_4.noarch.rpm
iwl6000g2a-firmware-17.168.5.3-58.el7_4.noarch.rpm
iwl6000g2b-firmware-17.168.5.2-58.el7_4.noarch.rpm
iwl6050-firmware-41.28.5.1-58.el7_4.noarch.rpm
iwl7260-firmware-22.0.7.0-58.el7_4.noarch.rpm
iwl7265-firmware-22.0.7.0-58.el7_4.noarch.rpm
linux-firmware-20170606-58.gitc990aae.el7_4.noarch.rpm
Red Hat Enterprise Linux ComputeNode EUS (v. 7.3):
Source:
linux-firmware-20160830-51.git7534e19.el7_3.src.rpm
noarch:
iwl100-firmware-39.31.5.1-51.el7_3.noarch.rpm
iwl1000-firmware-39.31.5.1-51.el7_3.noarch.rpm
iwl105-firmware-18.168.6.1-51.el7_3.noarch.rpm
iwl135-firmware-18.168.6.1-51.el7_3.noarch.rpm
iwl2000-firmware-18.168.6.1-51.el7_3.noarch.rpm
iwl2030-firmware-18.168.6.1-51.el7_3.noarch.rpm
iwl3160-firmware-22.0.7.0-51.el7_3.noarch.rpm
iwl3945-firmware-15.32.2.9-51.el7_3.noarch.rpm
iwl4965-firmware-228.61.2.24-51.el7_3.noarch.rpm
iwl5000-firmware-8.83.5.1_1-51.el7_3.noarch.rpm
iwl5150-firmware-8.24.2.2-51.el7_3.noarch.rpm
iwl6000-firmware-9.221.4.1-51.el7_3.noarch.rpm
iwl6000g2a-firmware-17.168.5.3-51.el7_3.noarch.rpm
iwl6000g2b-firmware-17.168.5.2-51.el7_3.noarch.rpm
iwl6050-firmware-41.28.5.1-51.el7_3.noarch.rpm
iwl7260-firmware-22.0.7.0-51.el7_3.noarch.rpm
iwl7265-firmware-22.0.7.0-51.el7_3.noarch.rpm
linux-firmware-20160830-51.git7534e19.el7_3.noarch.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm
noarch:
iwl100-firmware-39.31.5.1-58.el7_4.noarch.rpm
iwl1000-firmware-39.31.5.1-58.el7_4.noarch.rpm
iwl105-firmware-18.168.6.1-58.el7_4.noarch.rpm
iwl135-firmware-18.168.6.1-58.el7_4.noarch.rpm
iwl2000-firmware-18.168.6.1-58.el7_4.noarch.rpm
iwl2030-firmware-18.168.6.1-58.el7_4.noarch.rpm
iwl3160-firmware-22.0.7.0-58.el7_4.noarch.rpm
iwl3945-firmware-15.32.2.9-58.el7_4.noarch.rpm
iwl4965-firmware-228.61.2.24-58.el7_4.noarch.rpm
iwl5000-firmware-8.83.5.1_1-58.el7_4.noarch.rpm
iwl5150-firmware-8.24.2.2-58.el7_4.noarch.rpm
iwl6000-firmware-9.221.4.1-58.el7_4.noarch.rpm
iwl6000g2a-firmware-17.168.5.3-58.el7_4.noarch.rpm
iwl6000g2b-firmware-17.168.5.2-58.el7_4.noarch.rpm
iwl6050-firmware-41.28.5.1-58.el7_4.noarch.rpm
iwl7260-firmware-22.0.7.0-58.el7_4.noarch.rpm
iwl7265-firmware-22.0.7.0-58.el7_4.noarch.rpm
linux-firmware-20170606-58.gitc990aae.el7_4.noarch.rpm
Red Hat Enterprise Linux Server AUS (v. 7.2):
Source:
linux-firmware-20150904-45.git6ebf5d5.el7_2.src.rpm
noarch:
iwl100-firmware-39.31.5.1-45.el7_2.noarch.rpm
iwl1000-firmware-39.31.5.1-45.el7_2.noarch.rpm
iwl105-firmware-18.168.6.1-45.el7_2.noarch.rpm
iwl135-firmware-18.168.6.1-45.el7_2.noarch.rpm
iwl2000-firmware-18.168.6.1-45.el7_2.noarch.rpm
iwl2030-firmware-18.168.6.1-45.el7_2.noarch.rpm
iwl3160-firmware-22.0.7.0-45.el7_2.noarch.rpm
iwl3945-firmware-15.32.2.9-45.el7_2.noarch.rpm
iwl4965-firmware-228.61.2.24-45.el7_2.noarch.rpm
iwl5000-firmware-8.83.5.1_1-45.el7_2.noarch.rpm
iwl5150-firmware-8.24.2.2-45.el7_2.noarch.rpm
iwl6000-firmware-9.221.4.1-45.el7_2.noarch.rpm
iwl6000g2a-firmware-17.168.5.3-45.el7_2.noarch.rpm
iwl6000g2b-firmware-17.168.5.2-45.el7_2.noarch.rpm
iwl6050-firmware-41.28.5.1-45.el7_2.noarch.rpm
iwl7260-firmware-22.0.7.0-45.el7_2.noarch.rpm
iwl7265-firmware-22.0.7.0-45.el7_2.noarch.rpm
linux-firmware-20150904-45.git6ebf5d5.el7_2.noarch.rpm
Red Hat Enterprise Linux Server E4S (v. 7.2):
Source:
linux-firmware-20150904-45.git6ebf5d5.el7_2.src.rpm
noarch:
iwl100-firmware-39.31.5.1-45.el7_2.noarch.rpm
iwl1000-firmware-39.31.5.1-45.el7_2.noarch.rpm
iwl105-firmware-18.168.6.1-45.el7_2.noarch.rpm
iwl135-firmware-18.168.6.1-45.el7_2.noarch.rpm
iwl2000-firmware-18.168.6.1-45.el7_2.noarch.rpm
iwl2030-firmware-18.168.6.1-45.el7_2.noarch.rpm
iwl3160-firmware-22.0.7.0-45.el7_2.noarch.rpm
iwl3945-firmware-15.32.2.9-45.el7_2.noarch.rpm
iwl4965-firmware-228.61.2.24-45.el7_2.noarch.rpm
iwl5000-firmware-8.83.5.1_1-45.el7_2.noarch.rpm
iwl5150-firmware-8.24.2.2-45.el7_2.noarch.rpm
iwl6000-firmware-9.221.4.1-45.el7_2.noarch.rpm
iwl6000g2a-firmware-17.168.5.3-45.el7_2.noarch.rpm
iwl6000g2b-firmware-17.168.5.2-45.el7_2.noarch.rpm
iwl6050-firmware-41.28.5.1-45.el7_2.noarch.rpm
iwl7260-firmware-22.0.7.0-45.el7_2.noarch.rpm
iwl7265-firmware-22.0.7.0-45.el7_2.noarch.rpm
linux-firmware-20150904-45.git6ebf5d5.el7_2.noarch.rpm
Red Hat Enterprise Linux Server TUS (v. 7.2):
Source:
linux-firmware-20150904-45.git6ebf5d5.el7_2.src.rpm
noarch:
iwl100-firmware-39.31.5.1-45.el7_2.noarch.rpm
iwl1000-firmware-39.31.5.1-45.el7_2.noarch.rpm
iwl105-firmware-18.168.6.1-45.el7_2.noarch.rpm
iwl135-firmware-18.168.6.1-45.el7_2.noarch.rpm
iwl2000-firmware-18.168.6.1-45.el7_2.noarch.rpm
iwl2030-firmware-18.168.6.1-45.el7_2.noarch.rpm
iwl3160-firmware-22.0.7.0-45.el7_2.noarch.rpm
iwl3945-firmware-15.32.2.9-45.el7_2.noarch.rpm
iwl4965-firmware-228.61.2.24-45.el7_2.noarch.rpm
iwl5000-firmware-8.83.5.1_1-45.el7_2.noarch.rpm
iwl5150-firmware-8.24.2.2-45.el7_2.noarch.rpm
iwl6000-firmware-9.221.4.1-45.el7_2.noarch.rpm
iwl6000g2a-firmware-17.168.5.3-45.el7_2.noarch.rpm
iwl6000g2b-firmware-17.168.5.2-45.el7_2.noarch.rpm
iwl6050-firmware-41.28.5.1-45.el7_2.noarch.rpm
iwl7260-firmware-22.0.7.0-45.el7_2.noarch.rpm
iwl7265-firmware-22.0.7.0-45.el7_2.noarch.rpm
linux-firmware-20150904-45.git6ebf5d5.el7_2.noarch.rpm
Red Hat Enterprise Linux Server EUS (v. 7.3):
Source:
linux-firmware-20160830-51.git7534e19.el7_3.src.rpm
noarch:
iwl100-firmware-39.31.5.1-51.el7_3.noarch.rpm
iwl1000-firmware-39.31.5.1-51.el7_3.noarch.rpm
iwl105-firmware-18.168.6.1-51.el7_3.noarch.rpm
iwl135-firmware-18.168.6.1-51.el7_3.noarch.rpm
iwl2000-firmware-18.168.6.1-51.el7_3.noarch.rpm
iwl2030-firmware-18.168.6.1-51.el7_3.noarch.rpm
iwl3160-firmware-22.0.7.0-51.el7_3.noarch.rpm
iwl3945-firmware-15.32.2.9-51.el7_3.noarch.rpm
iwl4965-firmware-228.61.2.24-51.el7_3.noarch.rpm
iwl5000-firmware-8.83.5.1_1-51.el7_3.noarch.rpm
iwl5150-firmware-8.24.2.2-51.el7_3.noarch.rpm
iwl6000-firmware-9.221.4.1-51.el7_3.noarch.rpm
iwl6000g2a-firmware-17.168.5.3-51.el7_3.noarch.rpm
iwl6000g2b-firmware-17.168.5.2-51.el7_3.noarch.rpm
iwl6050-firmware-41.28.5.1-51.el7_3.noarch.rpm
iwl7260-firmware-22.0.7.0-51.el7_3.noarch.rpm
iwl7265-firmware-22.0.7.0-51.el7_3.noarch.rpm
linux-firmware-20160830-51.git7534e19.el7_3.noarch.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm
noarch:
iwl100-firmware-39.31.5.1-58.el7_4.noarch.rpm
iwl1000-firmware-39.31.5.1-58.el7_4.noarch.rpm
iwl105-firmware-18.168.6.1-58.el7_4.noarch.rpm
iwl135-firmware-18.168.6.1-58.el7_4.noarch.rpm
iwl2000-firmware-18.168.6.1-58.el7_4.noarch.rpm
iwl2030-firmware-18.168.6.1-58.el7_4.noarch.rpm
iwl3160-firmware-22.0.7.0-58.el7_4.noarch.rpm
iwl3945-firmware-15.32.2.9-58.el7_4.noarch.rpm
iwl4965-firmware-228.61.2.24-58.el7_4.noarch.rpm
iwl5000-firmware-8.83.5.1_1-58.el7_4.noarch.rpm
iwl5150-firmware-8.24.2.2-58.el7_4.noarch.rpm
iwl6000-firmware-9.221.4.1-58.el7_4.noarch.rpm
iwl6000g2a-firmware-17.168.5.3-58.el7_4.noarch.rpm
iwl6000g2b-firmware-17.168.5.2-58.el7_4.noarch.rpm
iwl6050-firmware-41.28.5.1-58.el7_4.noarch.rpm
iwl7260-firmware-22.0.7.0-58.el7_4.noarch.rpm
iwl7265-firmware-22.0.7.0-58.el7_4.noarch.rpm
linux-firmware-20170606-58.gitc990aae.el7_4.noarch.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):
Source:
linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm
noarch:
iwl100-firmware-39.31.5.1-58.el7_4.noarch.rpm
iwl1000-firmware-39.31.5.1-58.el7_4.noarch.rpm
iwl105-firmware-18.168.6.1-58.el7_4.noarch.rpm
iwl135-firmware-18.168.6.1-58.el7_4.noarch.rpm
iwl2000-firmware-18.168.6.1-58.el7_4.noarch.rpm
iwl2030-firmware-18.168.6.1-58.el7_4.noarch.rpm
iwl3160-firmware-22.0.7.0-58.el7_4.noarch.rpm
iwl3945-firmware-15.32.2.9-58.el7_4.noarch.rpm
iwl4965-firmware-228.61.2.24-58.el7_4.noarch.rpm
iwl5000-firmware-8.83.5.1_1-58.el7_4.noarch.rpm
iwl5150-firmware-8.24.2.2-58.el7_4.noarch.rpm
iwl6000-firmware-9.221.4.1-58.el7_4.noarch.rpm
iwl6000g2a-firmware-17.168.5.3-58.el7_4.noarch.rpm
iwl6000g2b-firmware-17.168.5.2-58.el7_4.noarch.rpm
iwl6050-firmware-41.28.5.1-58.el7_4.noarch.rpm
iwl7260-firmware-22.0.7.0-58.el7_4.noarch.rpm
iwl7265-firmware-22.0.7.0-58.el7_4.noarch.rpm
linux-firmware-20170606-58.gitc990aae.el7_4.noarch.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm
noarch:
iwl100-firmware-39.31.5.1-58.el7_4.noarch.rpm
iwl1000-firmware-39.31.5.1-58.el7_4.noarch.rpm
iwl105-firmware-18.168.6.1-58.el7_4.noarch.rpm
iwl135-firmware-18.168.6.1-58.el7_4.noarch.rpm
iwl2000-firmware-18.168.6.1-58.el7_4.noarch.rpm
iwl2030-firmware-18.168.6.1-58.el7_4.noarch.rpm
iwl3160-firmware-22.0.7.0-58.el7_4.noarch.rpm
iwl3945-firmware-15.32.2.9-58.el7_4.noarch.rpm
iwl4965-firmware-228.61.2.24-58.el7_4.noarch.rpm
iwl5000-firmware-8.83.5.1_1-58.el7_4.noarch.rpm
iwl5150-firmware-8.24.2.2-58.el7_4.noarch.rpm
iwl6000-firmware-9.221.4.1-58.el7_4.noarch.rpm
iwl6000g2a-firmware-17.168.5.3-58.el7_4.noarch.rpm
iwl6000g2b-firmware-17.168.5.2-58.el7_4.noarch.rpm
iwl6050-firmware-41.28.5.1-58.el7_4.noarch.rpm
iwl7260-firmware-22.0.7.0-58.el7_4.noarch.rpm
iwl7265-firmware-22.0.7.0-58.el7_4.noarch.rpm
linux-firmware-20170606-58.gitc990aae.el7_4.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/speculativeexecution
https://access.redhat.com/security/cve/CVE-2017-5715
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFaXncBXlSAg2UNWIIRAtYfAKCfEHxjgLYls9QYIF/FrJPQWAu5mgCgkwVp
auhGTN4XjBc6+TS+7HEUZvA=
=zRtn
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: hpesbhf03805en_us
Version: 4
HPESBHF03805 rev.4 - Certain HPE products using Microprocessors from Intel,
AMD, and ARM, with Speculative Execution, Elevation of Privilege and
Information Disclosure.
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2018-01-10
Last Updated: 2018-01-09
Potential Security Impact: Local: Disclosure of Information, Elevation of
Privilege
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
On January 3 2018, side-channel security vulnerabilities involving
speculative execution were publicly disclosed. These vulnerabilities may
impact the listed HPE products, potentially leading to information disclosure
and elevation of privilege. Mitigation and resolution of these
vulnerabilities may call for both an operating system update, provided by the
OS vendor, and a system ROM update from HPE.
**Note:**
* This issue takes advantage of techniques commonly used in many modern
processor architectures.
* For further information, microprocessor vendors have provided security
advisories:
- Intel:
<https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00088&langu
geid=en-fr>
- AMD: <http://www.amd.com/en/corporate/speculative-execution>
- ARM: <https://developer.arm.com/support/security-update>
References:
- PSRT110634
- PSRT110633
- PSRT110632
- CVE-2017-5715 - aka Spectre, branch target injection
- CVE-2017-5753 - aka Spectre, bounds check bypass
- CVE-2017-5754 - aka Meltdown, rogue data cache load, memory access
permission check performed after kernel memory read
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HPE ProLiant DL380 Gen10 Server prior to v1.28
- HPE ProLiant DL180 Gen10 Server prior to v1.28
- HPE ProLiant DL160 Gen10 Server prior to v1.28
- HPE ProLiant DL360 Gen10 Server prior to v1.28
- HPE ProLiant ML110 Gen10 Server prior to v1.28
- HPE ProLiant DL580 Gen10 Server prior to v1.28
- HPE ProLiant DL560 Gen10 Server prior to v1.28
- HPE ProLiant DL120 Gen10 Server prior to v1.28
- HPE ProLiant ML350 Gen10 Server prior to v1.28
- HPE ProLiant XL450 Gen10 Server prior to v1.28
- HPE ProLiant XL170r Gen10 Server prior to v1.28
- HPE ProLiant BL460c Gen10 Server Blade prior to v1.28
- HPE ProLiant XL230a Gen9 Server prior to v2.54
- HPE ProLiant XL230k Gen10 Server prior to v1.28
- HPE ProLiant XL730f Gen9 Server prior to v2.54
- HPE ProLiant XL740f Gen9 Server prior to v2.54
- HPE ProLiant XL750f Gen9 Server prior to v2.54
- HPE ProLiant XL170r Gen9 Server prior to v2.54
- HP ProLiant DL60 Gen9 Server prior to v2.54
- HPE ProLiant XL450 Gen9 Server prior to v2.54
- HP ProLiant DL160 Gen9 Server prior to v2.54
- HPE Apollo 4200 Gen9 Server prior to v2.54
- HP ProLiant BL460c Gen9 Server Blade prior to v2.54
- HP ProLiant ML110 Gen9 Server prior to v2.54
- HP ProLiant ML150 Gen9 Server prior to v2.54
- HPE ProLiant ML350 Gen9 Server prior to v2.54
- HP ProLiant DL380 Gen9 Server prior to v2.54
- HP ProLiant DL120 Gen9 Server prior to v2.54
- HPE ProLiant DL560 Gen9 Server prior to v2.54
- HPE ProLiant XL270d Gen9 Special Server prior to v2.54
- HP ProLiant BL660c Gen9 Server prior to v2.54
- HPE ProLiant m710x Server Cartridge prior to v1.60
- HPE ProLiant DL20 Gen9 Server prior to v2.52
- HPE ProLiant DL385 Gen10 Server prior to v1.04
- HPE Synergy 660 Gen9 Compute Module prior to v2.54
- HPE Synergy 480 Gen10 Compute Module prior to v1.28
- HPE Synergy 480 Gen9 Compute Module prior to v2.54
- HPE ProLiant ML30 Gen9 Server prior to v2.52
- HPE ProLiant XL190r Gen10 Server prior to v1.28
- HPE ProLiant XL250a Gen9 Server prior to v2.54
- HPE ProLiant XL190r Gen9 Server prior to v2.54
- HP ProLiant DL80 Gen9 Server prior to v2.54
- HPE ProLiant DL180 Gen9 Server prior to v2.54
- HPE ProLiant XL270d Gen9 Accelerator Tray 2U Configure-to-order Server
prior to v2.54
- HPE ProLiant WS460c Gen9 Workstation prior to v2.54
- HPE ProLiant DL580 Gen9 Special Server prior to v2.54
- HPE Synergy 680 Gen9 Compute Modules prior to v2.54
- HPE ProLiant XL260a Gen9 Server prior to 1/22/2018
- HPE ProLiant m510 Server Cartridge prior to 1/22/2018
- HPE ProLiant m710p Server Cartridge prior to 12/12/2017
- HP ProLiant m350 Server Cartridge prior to 12/12/2017
- HP ProLiant m300 Server Cartridge prior to 12/12/2017
- HP ProLiant ML350e Gen8 Server prior to 12/12/2017
- HPE ProLiant ML350e Gen8 v2 Server prior to 12/12/2017
- HP ProLiant BL460c Gen8 Server prior to 12/12/2017
- HP ProLiant BL660c Gen8 Server prior to 12/12/2017
- HPE ProLiant SL4540 Gen8 1 Node Server prior to 12/12/2017
- HP ProLiant DL380e Gen8 Server prior to 12/12/2017
- HP ProLiant DL360e Gen8 Server prior to 12/12/2017
- HP ProLiant ML350p Gen8 Server prior to 12/12/2017
- HP ProLiant DL360p Gen8 Server prior to 12/12/2017
- HP ProLiant DL380p Gen8 Server prior to 12/12/2017
- HP ProLiant DL320e Gen8 Server prior to 12/12/2017
- HPE ProLiant DL320e Gen8 v2 Server prior to 12/12/2017
- HP ProLiant ML310e Gen8 Server prior to 12/12/2017
- HPE ProLiant ML310e Gen8 v2 Server prior to 12/12/2017
- HP ProLiant DL160 Gen8 Server prior to 12/12/2017
- HP ProLiant SL270s Gen8 Server prior to 12/12/2017
- HP ProLiant SL250s Gen8 Server prior to 12/12/2017
- HP ProLiant SL230s Gen8 Server prior to 12/12/2017
- HP ProLiant DL560 Gen8 Server prior to 12/12/2017
- HPE ProLiant SL210t Gen8 Server prior to 12/12/2017
- HP ProLiant DL580 Gen8 Server prior to 12/12/2017 (v1.98)
- HP ProLiant ML10 Server prior to 12/12/2017
- HP ProLiant m710 Server Cartridge prior to 12/12/2017 (v1.60)
- HPE Synergy Composer prior to 12/12/2017
- HPE Integrity Superdome X with BL920s Blades prior to 8.8.6
- HPE Superdome Flex Server prior to 2.3.110
- HP ProLiant DL360 Gen9 Server prior to v2.54
- HPE Synergy 620 Gen9 Compute Module prior to v2.54
- HPE ProLiant Thin Micro TM200 Server prior to 1/16/2017
- HPE ProLiant ML350 Gen10 Server prior to v1.28
- HP ProLiant BL420c Gen8 Server prior to 12/12/2017
- HPE ProLiant ML10 v2 Server prior to 12/12/2017
- HPE ProLiant MicroServer Gen8 prior to 12/12/2017
- HPE Synergy 660 Gen10 Compute Module prior to v1.28
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2017-5715
8.2 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
6.8 (AV:A/AC:L/Au:N/C:C/I:P/A:N)
CVE-2017-5753
5.0 CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L
5.4 (AV:A/AC:M/Au:N/C:P/I:P/A:P)
CVE-2017-5754
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has made the following system ROM updates which include an updated
microcode to resolve the vulnerability:
* HPE has provided a customer bulletin
<https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00039267en_us>
with specific instructions to obtain the udpated sytem ROM
- Note:
+ CVE-2017-5715 requires that the System ROM be updated and a vendor
supplied operating system update be applied as well.
+ For CVE-2017-5753, CVE-2017-5754 require only updates of a vendor
supplied operating system.
+ HPE will continue to add additional products to the list. Not all
listed products have updated system ROMs yet. Impacted products awaiting
system ROM updates are marked TBS (to be supplied).
HISTORY
Version:1 (rev.1) - 4 January 2018 Initial release
Version:2 (rev.2) - 5 January 2018 Added additional impacted products
Version:3 (rev.3) - 10 January 2018 Added more impacted products
Version:4 (rev.4) - 9 January 2018 Fixed product ID
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported
product:
Web form: https://www.hpe.com/info/report-security-vulnerability
Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners. ==========================================================================
Ubuntu Security Notice USN-3531-2
January 22, 2018
intel-microcode regression
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
USN-3531-1 introduced regressions in intel-microcode. At the request of Intel, we have
reverted to the previous packaged microcode version, the 20170707 release. This flaw is known as Spectre. (CVE-2017-5715)
This update provides the microcode updates required for the corresponding
Linux kernel updates.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.10:
intel-microcode 3.20180108.0+really20170707ubuntu17.10.1
Ubuntu 16.04 LTS:
intel-microcode 3.20180108.0+really20170707ubuntu16.04.1
Ubuntu 14.04 LTS:
intel-microcode 3.20180108.0+really20170707ubuntu14.04.1
After a standard system update you need to reboot your computer to make
all the necessary changes
| VAR-201801-1708 | CVE-2017-18017 | Linux Kernel Uses freed memory vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action. Linux Kernel Contains a vulnerability in the use of freed memory.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Linux Kernel is prone to a denial-of-service vulnerability.
An attacker can exploit this issue to cause a denial-of-service condition.
Linux kernel versions prior to 4.11, and 4.9.x prior to 4.9.36 are vulnerable. 6) - i386, x86_64
3.
Red Hat would like to thank Google Project Zero for reporting
CVE-2017-5754; Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for
reporting CVE-2018-8897; Mohamed Ghannam for reporting CVE-2017-8824; and
Armis Labs for reporting CVE-2017-1000410.
Bug Fix(es):
These updated kernel packages include also numerous bug fixes. Space
precludes documenting all of these bug fixes in this advisory. See the bug
fix descriptions in the related Knowledge Article:
https://access.redhat.com/articles/3431591
4.
Security Fix(es):
* An industry-wide issue was found in the way many modern microprocessor
designs have implemented speculative execution of Load & Store instructions
(a commonly used performance optimization). It relies on the presence of a
precisely-defined instruction sequence in the privileged code as well as
the fact that memory read from address to which a recent memory write has
occurred may see an older value and subsequently cause an update into the
microprocessor's data cache even for speculatively executed instructions
that never actually commit (retire). As a result, an unprivileged attacker
could use this flaw to read privileged memory by conducting targeted cache
side-channel attacks. (CVE-2018-3639)
Note: This issue is present in hardware and cannot be fully fixed via
software update. To be fully functional, up-to-date CPU
microcode applied on the system might be required. Bugs fixed (https://bugzilla.redhat.com/):
1531135 - CVE-2017-18017 kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c
1566890 - CVE-2018-3639 hw: cpu: speculative store bypass
6. 7) - noarch, x86_64
3. Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables
fine-tuning for systems with extremely high determinism requirements. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4187-1 security@debian.org
https://www.debian.org/security/ Ben Hutchings
May 01, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : linux
CVE ID : CVE-2015-9016 CVE-2017-0861 CVE-2017-5715 CVE-2017-5753
CVE-2017-13166 CVE-2017-13220 CVE-2017-16526 CVE-2017-16911
CVE-2017-16912 CVE-2017-16913 CVE-2017-16914 CVE-2017-18017
CVE-2017-18203 CVE-2017-18216 CVE-2017-18232 CVE-2017-18241
CVE-2018-1066 CVE-2018-1068 CVE-2018-1092 CVE-2018-5332
CVE-2018-5333 CVE-2018-5750 CVE-2018-5803 CVE-2018-6927
CVE-2018-7492 CVE-2018-7566 CVE-2018-7740 CVE-2018-7757
CVE-2018-7995 CVE-2018-8781 CVE-2018-8822 CVE-2018-1000004
CVE-2018-1000199
Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.
CVE-2015-9016
Ming Lei reported a race condition in the multiqueue block layer
(blk-mq). On a system with a driver using blk-mq (mtip32xx,
null_blk, or virtio_blk), a local user might be able to use this
for denial of service or possibly for privilege escalation.
CVE-2017-0861
Robb Glasser reported a potential use-after-free in the ALSA (sound)
PCM core. We believe this was not possible in practice.
CVE-2017-5715
Multiple researchers have discovered a vulnerability in various
processors supporting speculative execution, enabling an attacker
controlling an unprivileged process to read memory from arbitrary
addresses, including from the kernel and all other processes
running on the system.
This specific attack has been named Spectre variant 2 (branch
target injection) and is mitigated for the x86 architecture (amd64
and i386) by using the "retpoline" compiler feature which allows
indirect branches to be isolated from speculative execution.
CVE-2017-5753
Multiple researchers have discovered a vulnerability in various
processors supporting speculative execution, enabling an attacker
controlling an unprivileged process to read memory from arbitrary
addresses, including from the kernel and all other processes
running on the system.
This specific attack has been named Spectre variant 1
(bounds-check bypass) and is mitigated by identifying vulnerable
code sections (array bounds checking followed by array access) and
replacing the array access with the speculation-safe
array_index_nospec() function.
More use sites will be added over time.
CVE-2017-13166
A bug in the 32-bit compatibility layer of the v4l2 ioctl handling
code has been found. Memory protections ensuring user-provided
buffers always point to userland memory were disabled, allowing
destination addresses to be in kernel space. On a 64-bit kernel a
local user with access to a suitable video device can exploit this
to overwrite kernel memory, leading to privilege escalation.
CVE-2017-13220
Al Viro reported that the Bluetooth HIDP implementation could
dereference a pointer before performing the necessary type check.
A local user could use this to cause a denial of service.
CVE-2017-16526
Andrey Konovalov reported that the UWB subsystem may dereference
an invalid pointer in an error case. A local user might be able
to use this for denial of service.
CVE-2017-16911
Secunia Research reported that the USB/IP vhci_hcd driver exposed
kernel heap addresses to local users. This information could aid the
exploitation of other vulnerabilities.
CVE-2017-16912
Secunia Research reported that the USB/IP stub driver failed to
perform a range check on a received packet header field, leading
to an out-of-bounds read. A remote user able to connect to the
USB/IP server could use this for denial of service.
CVE-2017-16913
Secunia Research reported that the USB/IP stub driver failed to
perform a range check on a received packet header field, leading
to excessive memory allocation. A remote user able to connect to
the USB/IP server could use this for denial of service.
CVE-2017-16914
Secunia Research reported that the USB/IP stub driver failed to
check for an invalid combination of fields in a received packet,
leading to a null pointer dereference. A remote user able to
connect to the USB/IP server could use this for denial of service.
CVE-2017-18017
Denys Fedoryshchenko reported that the netfilter xt_TCPMSS module
failed to validate TCP header lengths, potentially leading to a
use-after-free. If this module is loaded, it could be used by a
remote attacker for denial of service or possibly for code
execution.
CVE-2017-18203
Hou Tao reported that there was a race condition in creation and
deletion of device-mapper (DM) devices. A local user could
potentially use this for denial of service.
CVE-2017-18216
Alex Chen reported that the OCFS2 filesystem failed to hold a
necessary lock during nodemanager sysfs file operations,
potentially leading to a null pointer dereference. A local user
could use this for denial of service.
CVE-2017-18232
Jason Yan reported a race condition in the SAS (Serial-Attached
SCSI) subsystem, between probing and destroying a port. This
could lead to a deadlock.
CVE-2017-18241
Yunlei He reported that the f2fs implementation does not properly
initialise its state if the "noflush_merge" mount option is used.
A local user with access to a filesystem mounted with this option
could use this to cause a denial of service.
CVE-2018-1066
Dan Aloni reported to Red Hat that the CIFS client implementation
would dereference a null pointer if the server sent an invalid
response during NTLMSSP setup negotiation. This could be used
by a malicious server for denial of service.
CVE-2018-1068
The syzkaller tool found that the 32-bit compatibility layer of
ebtables did not sufficiently validate offset values. On a 64-bit
kernel, a local user with the CAP_NET_ADMIN capability (in any user
namespace) could use this to overwrite kernel memory, possibly
leading to privilege escalation. Debian disables unprivileged user
namespaces by default.
CVE-2018-1092
Wen Xu reported that a crafted ext4 filesystem image would
trigger a null dereference when mounted. A local user able
to mount arbitrary filesystems could use this for denial of
service.
CVE-2018-5332
Mohamed Ghannam reported that the RDS protocol did not
sufficiently validate RDMA requests, leading to an out-of-bounds
write. A local attacker on a system with the rds module loaded
could use this for denial of service or possibly for privilege
escalation.
CVE-2018-5333
Mohamed Ghannam reported that the RDS protocol did not properly
handle an error case, leading to a null pointer dereference. A
local attacker on a system with the rds module loaded could
possibly use this for denial of service.
CVE-2018-5750
Wang Qize reported that the ACPI sbshc driver logged a kernel heap
address. This information could aid the exploitation of other
vulnerabilities.
CVE-2018-5803
Alexey Kodanev reported that the SCTP protocol did not range-check
the length of chunks to be created. A local or remote user could
use this to cause a denial of service.
CVE-2018-6927
Li Jinyue reported that the FUTEX_REQUEUE operation on futexes did
not check for negative parameter values, which might lead to a
denial of service or other security impact.
CVE-2018-7492
The syzkaller tool found that the RDS protocol was lacking a null
pointer check. A local attacker on a system with the rds module
loaded could use this for denial of service.
CVE-2018-7566
Fan LongFei reported a race condition in the ALSA (sound)
sequencer core, between write and ioctl operations. This could
lead to an out-of-bounds access or use-after-free. A local user
with access to a sequencer device could use this for denial of
service or possibly for privilege escalation.
CVE-2018-7740
Nic Losby reported that the hugetlbfs filesystem's mmap operation
did not properly range-check the file offset. A local user with
access to files on a hugetlbfs filesystem could use this to cause
a denial of service.
CVE-2018-7757
Jason Yan reported a memory leak in the SAS (Serial-Attached
SCSI) subsystem. A local user on a system with SAS devices
could use this to cause a denial of service.
CVE-2018-7995
Seunghun Han reported a race condition in the x86 MCE
(Machine Check Exception) driver. This is unlikely to have
any security impact.
CVE-2018-8781
Eyal Itkin reported that the udl (DisplayLink) driver's mmap
operation did not properly range-check the file offset. A local
user with access to a udl framebuffer device could exploit this to
overwrite kernel memory, leading to privilege escalation.
CVE-2018-8822
Dr Silvio Cesare of InfoSect reported that the ncpfs client
implementation did not validate reply lengths from the server. An
ncpfs server could use this to cause a denial of service or
remote code execution in the client.
CVE-2018-1000004
Luo Quan reported a race condition in the ALSA (sound) sequencer
core, between multiple ioctl operations. This could lead to a
deadlock or use-after-free. A local user with access to a
sequencer device could use this for denial of service or possibly
for privilege escalation.
CVE-2018-1000199
Andy Lutomirski discovered that the ptrace subsystem did not
sufficiently validate hardware breakpoint settings. Local users
can use this to cause a denial of service, or possibly for
privilege escalation, on x86 (amd64 and i386) and possibly other
architectures.
For the oldstable distribution (jessie), these problems have been fixed
in version 3.16.56-1.
We recommend that you upgrade your linux packages.
For the detailed security status of linux please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/linux
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=wNQS
-----END PGP SIGNATURE-----
. Summary:
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
3.
Security Fix(es):
* hw: cpu: speculative execution permission faults handling (CVE-2017-5754,
Important, KVM for Power)
* kernel: Buffer overflow in firewire driver via crafted incoming packets
(CVE-2016-8633, Important)
* kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824,
Important)
* Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register
(CVE-2017-12154, Important)
* kernel: v4l2: disabled memory access protection mechanism allowing
privilege escalation (CVE-2017-13166, Important)
* kernel: media: use-after-free in [tuner-xc2028] media driver
(CVE-2016-7913, Moderate)
* kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()
(CVE-2017-7294, Moderate)
* kernel: Incorrect type conversion for size during dma allocation
(CVE-2017-9725, Moderate)
* kernel: memory leak when merging buffers in SCSI IO vectors
(CVE-2017-12190, Moderate)
* kernel: vfs: BUG in truncate_inode_pages_range() and fuse client
(CVE-2017-15121, Moderate)
* kernel: Use-after-free in userfaultfd_event_wait_completion function in
userfaultfd.c (CVE-2017-15126, Moderate)
* kernel: net: double-free and memory corruption in get_net_ns_by_id()
(CVE-2017-15129, Moderate)
* kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265,
Moderate)
* kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c
allows for unprivileged access to systemwide nfnl_cthelper_list structure
(CVE-2017-17448, Moderate)
* kernel: Missing namespace check in net/netlink/af_netlink.c allows for
network monitors to observe systemwide activity (CVE-2017-17449, Moderate)
* kernel: Unallocated memory access by malicious USB device via
bNumInterfaces overflow (CVE-2017-17558, Moderate)
* kernel: netfilter: use-after-free in tcpmss_mangle_packet function in
net/netfilter/xt_TCPMSS.c (CVE-2017-18017, Moderate)
* kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows
local users to cause a denial of service (CVE-2017-18203, Moderate)
* kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ
(CVE-2017-1000252, Moderate)
* Kernel: KVM: DoS via write flood to I/O port 0x80 (CVE-2017-1000407,
Moderate)
* kernel: Stack information leak in the EFS element (CVE-2017-1000410,
Moderate)
* kernel: Kernel address information leak in
drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing
KASLR bypass (CVE-2018-5750, Moderate)
* kernel: Race condition in sound system can lead to denial of service
(CVE-2018-1000004, Moderate)
* kernel: multiple Low security impact security issues (CVE-2016-3672,
CVE-2017-14140, CVE-2017-15116, CVE-2017-15127, CVE-2018-6927, Low)
Red Hat would like to thank Eyal Itkin for reporting CVE-2016-8633; Google
Project Zero for reporting CVE-2017-5754; Mohamed Ghannam for reporting
CVE-2017-8824; Jim Mattson (Google.com) for reporting CVE-2017-12154;
Vitaly Mayatskih for reporting CVE-2017-12190; Andrea Arcangeli
(Engineering) for reporting CVE-2017-15126; Kirill Tkhai for reporting
CVE-2017-15129; Jan H. SchAPnherr (Amazon) for reporting CVE-2017-1000252;
and Armis Labs for reporting CVE-2017-1000410. The CVE-2017-15121 issue was
discovered by Miklos Szeredi (Red Hat) and the CVE-2017-15116 issue was
discovered by ChunYu Wang (Red Hat).
For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.5 Release Notes linked from the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1132610 - nfsd does not release free space of a file created with dd oflag=direct where there was no space left on device even after manual deletion
1324749 - CVE-2016-3672 kernel: unlimiting the stack disables ASLR
1334439 - Unable to disable IPv6 DAD or Optimistic DAD for all interfaces
1372079 - ixgbe nic is falsely advertising MII support
1391490 - CVE-2016-8633 kernel: Buffer overflow in firewire driver via crafted incoming packets
1402885 - CVE-2016-7913 kernel: media: use-after-free in [tuner-xc2028] media driver
1436798 - CVE-2017-7294 kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()
1450205 - Gratuitous ARP updates received in span of 2-3 seconds time frame are all ignored
1458032 - [Intel 7.5 Bug] KVMGT: Bogus PCI BAR emulation
1460213 - cls_matchall: kernel panic when used with classful qdiscs
1461282 - kernel: ICMP rate limiting is too aggressive on loopback
1471875 - soft lockups during unmount when dentry cache is very large
1488329 - CVE-2017-14140 kernel: Missing permission check in move_pages system call
1489088 - CVE-2017-9725 kernel: Incorrect type conversion for size during dma allocation
1489542 - Behavior change in autofs expiry timer when a path walk is done following commit from BZ 1413523
1490673 - Kernel Panic always happen immediately whenever make "debug.panic_on_rcu_stall=1" set on RHEL7.4
1490781 - CVE-2017-1000252 kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ
1491224 - CVE-2017-12154 Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register
1493125 - [RFE] Kernel address space layout randomization [KASLR] qemu support (kernel)
1495089 - CVE-2017-12190 kernel: memory leak when merging buffers in SCSI IO vectors
1496836 - [RH 7.5 bug] Request for upstream commit 3664847d95e6 to be merged into RHEL 7.5/7.4
1501878 - CVE-2017-15265 kernel: Use-after-free in snd_seq_ioctl_create_port()
1502601 - [Hyper-V][RHEL7.4] hang when thaw on microsoft hyper-v
1506382 - deadlock in nfs v4 client init
1507025 - [ESXi][RHEL7.5]x86/vmware: Skip timer_irq_works() check on VMware
1507026 - [ESXi][RHEL7.5]x86/vmware: Skip lapic calibration on VMware.
1514609 - CVE-2017-15116 kernel: Null pointer dereference in rngapi_reset function
1519160 - CVE-2017-1000410 kernel: Stack information leak in the EFS element
1519591 - CVE-2017-8824 kernel: Use-after-free vulnerability in DCCP socket
1519781 - CVE-2017-5754 hw: cpu: speculative execution permission faults handling
1520328 - CVE-2017-1000407 Kernel: KVM: DoS via write flood to I/O port 0x80
1520893 - CVE-2017-15121 kernel: vfs: BUG in truncate_inode_pages_range() and fuse client
1523481 - CVE-2017-15126 kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c
1525218 - CVE-2017-15127 kernel: Improper error handling of VM_SHARED hugetlbfs mapping in mm/hugetlb.c
1525474 - CVE-2017-17558 kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow
1525762 - CVE-2017-17449 kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity
1525768 - CVE-2017-17448 kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure
1531135 - CVE-2017-18017 kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c
1531174 - CVE-2017-15129 kernel: net: double-free and memory corruption in get_net_ns_by_id()
1534272 - md: raid0 device creation prints blank line to journalctl
1535315 - CVE-2018-1000004 kernel: Race condition in sound system can lead to denial of service
1539706 - CVE-2018-5750 kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass
1542013 - RHEL-7.5: Cannot set port mirroring onto two interface
1544612 - CVE-2018-6927 kernel: Integer overflow in futex.c:futux_requeue can lead to denial of service or unspecified impact
1548412 - CVE-2017-13166 kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation
1550811 - CVE-2017-18203 kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service
6. Package List:
Red Hat Enterprise Linux Client (v. 7):
Source:
kernel-3.10.0-862.el7.src.rpm
noarch:
kernel-abi-whitelists-3.10.0-862.el7.noarch.rpm
kernel-doc-3.10.0-862.el7.noarch.rpm
x86_64:
kernel-3.10.0-862.el7.x86_64.rpm
kernel-debug-3.10.0-862.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-debug-devel-3.10.0-862.el7.x86_64.rpm
kernel-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-862.el7.x86_64.rpm
kernel-devel-3.10.0-862.el7.x86_64.rpm
kernel-headers-3.10.0-862.el7.x86_64.rpm
kernel-tools-3.10.0-862.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-tools-libs-3.10.0-862.el7.x86_64.rpm
perf-3.10.0-862.el7.x86_64.rpm
perf-debuginfo-3.10.0-862.el7.x86_64.rpm
python-perf-3.10.0-862.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-862.el7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64:
kernel-debug-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-862.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-862.el7.x86_64.rpm
perf-debuginfo-3.10.0-862.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-862.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
kernel-3.10.0-862.el7.src.rpm
noarch:
kernel-abi-whitelists-3.10.0-862.el7.noarch.rpm
kernel-doc-3.10.0-862.el7.noarch.rpm
x86_64:
kernel-3.10.0-862.el7.x86_64.rpm
kernel-debug-3.10.0-862.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-debug-devel-3.10.0-862.el7.x86_64.rpm
kernel-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-862.el7.x86_64.rpm
kernel-devel-3.10.0-862.el7.x86_64.rpm
kernel-headers-3.10.0-862.el7.x86_64.rpm
kernel-tools-3.10.0-862.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-tools-libs-3.10.0-862.el7.x86_64.rpm
perf-3.10.0-862.el7.x86_64.rpm
perf-debuginfo-3.10.0-862.el7.x86_64.rpm
python-perf-3.10.0-862.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-862.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64:
kernel-debug-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-862.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-862.el7.x86_64.rpm
perf-debuginfo-3.10.0-862.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-862.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
kernel-3.10.0-862.el7.src.rpm
noarch:
kernel-abi-whitelists-3.10.0-862.el7.noarch.rpm
kernel-doc-3.10.0-862.el7.noarch.rpm
ppc64:
kernel-3.10.0-862.el7.ppc64.rpm
kernel-bootwrapper-3.10.0-862.el7.ppc64.rpm
kernel-debug-3.10.0-862.el7.ppc64.rpm
kernel-debug-debuginfo-3.10.0-862.el7.ppc64.rpm
kernel-debug-devel-3.10.0-862.el7.ppc64.rpm
kernel-debuginfo-3.10.0-862.el7.ppc64.rpm
kernel-debuginfo-common-ppc64-3.10.0-862.el7.ppc64.rpm
kernel-devel-3.10.0-862.el7.ppc64.rpm
kernel-headers-3.10.0-862.el7.ppc64.rpm
kernel-tools-3.10.0-862.el7.ppc64.rpm
kernel-tools-debuginfo-3.10.0-862.el7.ppc64.rpm
kernel-tools-libs-3.10.0-862.el7.ppc64.rpm
perf-3.10.0-862.el7.ppc64.rpm
perf-debuginfo-3.10.0-862.el7.ppc64.rpm
python-perf-3.10.0-862.el7.ppc64.rpm
python-perf-debuginfo-3.10.0-862.el7.ppc64.rpm
ppc64le:
kernel-3.10.0-862.el7.ppc64le.rpm
kernel-bootwrapper-3.10.0-862.el7.ppc64le.rpm
kernel-debug-3.10.0-862.el7.ppc64le.rpm
kernel-debug-debuginfo-3.10.0-862.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-862.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-862.el7.ppc64le.rpm
kernel-devel-3.10.0-862.el7.ppc64le.rpm
kernel-headers-3.10.0-862.el7.ppc64le.rpm
kernel-tools-3.10.0-862.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-862.el7.ppc64le.rpm
kernel-tools-libs-3.10.0-862.el7.ppc64le.rpm
perf-3.10.0-862.el7.ppc64le.rpm
perf-debuginfo-3.10.0-862.el7.ppc64le.rpm
python-perf-3.10.0-862.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-862.el7.ppc64le.rpm
s390x:
kernel-3.10.0-862.el7.s390x.rpm
kernel-debug-3.10.0-862.el7.s390x.rpm
kernel-debug-debuginfo-3.10.0-862.el7.s390x.rpm
kernel-debug-devel-3.10.0-862.el7.s390x.rpm
kernel-debuginfo-3.10.0-862.el7.s390x.rpm
kernel-debuginfo-common-s390x-3.10.0-862.el7.s390x.rpm
kernel-devel-3.10.0-862.el7.s390x.rpm
kernel-headers-3.10.0-862.el7.s390x.rpm
kernel-kdump-3.10.0-862.el7.s390x.rpm
kernel-kdump-debuginfo-3.10.0-862.el7.s390x.rpm
kernel-kdump-devel-3.10.0-862.el7.s390x.rpm
perf-3.10.0-862.el7.s390x.rpm
perf-debuginfo-3.10.0-862.el7.s390x.rpm
python-perf-3.10.0-862.el7.s390x.rpm
python-perf-debuginfo-3.10.0-862.el7.s390x.rpm
x86_64:
kernel-3.10.0-862.el7.x86_64.rpm
kernel-debug-3.10.0-862.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-debug-devel-3.10.0-862.el7.x86_64.rpm
kernel-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-862.el7.x86_64.rpm
kernel-devel-3.10.0-862.el7.x86_64.rpm
kernel-headers-3.10.0-862.el7.x86_64.rpm
kernel-tools-3.10.0-862.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-tools-libs-3.10.0-862.el7.x86_64.rpm
perf-3.10.0-862.el7.x86_64.rpm
perf-debuginfo-3.10.0-862.el7.x86_64.rpm
python-perf-3.10.0-862.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-862.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64:
kernel-debug-debuginfo-3.10.0-862.el7.ppc64.rpm
kernel-debuginfo-3.10.0-862.el7.ppc64.rpm
kernel-debuginfo-common-ppc64-3.10.0-862.el7.ppc64.rpm
kernel-tools-debuginfo-3.10.0-862.el7.ppc64.rpm
kernel-tools-libs-devel-3.10.0-862.el7.ppc64.rpm
perf-debuginfo-3.10.0-862.el7.ppc64.rpm
python-perf-debuginfo-3.10.0-862.el7.ppc64.rpm
ppc64le:
kernel-debug-debuginfo-3.10.0-862.el7.ppc64le.rpm
kernel-debug-devel-3.10.0-862.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-862.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-862.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-862.el7.ppc64le.rpm
kernel-tools-libs-devel-3.10.0-862.el7.ppc64le.rpm
perf-debuginfo-3.10.0-862.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-862.el7.ppc64le.rpm
x86_64:
kernel-debug-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-862.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-862.el7.x86_64.rpm
perf-debuginfo-3.10.0-862.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-862.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
kernel-3.10.0-862.el7.src.rpm
noarch:
kernel-abi-whitelists-3.10.0-862.el7.noarch.rpm
kernel-doc-3.10.0-862.el7.noarch.rpm
x86_64:
kernel-3.10.0-862.el7.x86_64.rpm
kernel-debug-3.10.0-862.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-debug-devel-3.10.0-862.el7.x86_64.rpm
kernel-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-862.el7.x86_64.rpm
kernel-devel-3.10.0-862.el7.x86_64.rpm
kernel-headers-3.10.0-862.el7.x86_64.rpm
kernel-tools-3.10.0-862.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-tools-libs-3.10.0-862.el7.x86_64.rpm
perf-3.10.0-862.el7.x86_64.rpm
perf-debuginfo-3.10.0-862.el7.x86_64.rpm
python-perf-3.10.0-862.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-862.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
kernel-debug-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-862.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-862.el7.x86_64.rpm
perf-debuginfo-3.10.0-862.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-862.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFazIO0XlSAg2UNWIIRAsrvAKC6oeVVzqbL2khLh037fNiseMvX+QCfS3iv
EDnvsFcBpZQPFqATi/MtziA=
=lsfK
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. ==========================================================================
Ubuntu Security Notice USN-3583-1
February 23, 2018
linux vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
(CVE-2017-0750)
It was discovered that a race condition leading to a use-after-free
vulnerability existed in the ALSA PCM subsystem of the Linux kernel. (CVE-2017-0861)
It was discovered that the KVM implementation in the Linux kernel allowed
passthrough of the diagnostic I/O port 0x80.
(CVE-2017-1000407)
Bo Zhang discovered that the netlink wireless configuration interface in
the Linux kernel did not properly validate attributes when handling certain
requests. (CVE-2017-12153)
Vitaly Mayatskikh discovered that the SCSI subsystem in the Linux kernel
did not properly track reference counts when merging buffers.
(CVE-2017-12190)
It was discovered that the key management subsystem in the Linux kernel did
not properly restrict key reads on negatively instantiated keys.
(CVE-2017-12192)
It was discovered that an integer overflow existed in the sysfs interface
for the QLogic 24xx+ series SCSI driver in the Linux kernel. (CVE-2017-14051)
Otto Ebeling discovered that the memory manager in the Linux kernel did not
properly check the effective UID in some situations. (CVE-2017-14140)
It was discovered that the ATI Radeon framebuffer driver in the Linux
kernel did not properly initialize a data structure returned to user space. (CVE-2017-14156)
ChunYu Wang discovered that the iSCSI transport implementation in the Linux
kernel did not properly validate data structures. (CVE-2017-14489)
James Patrick-Evans discovered a race condition in the LEGO USB Infrared
Tower driver in the Linux kernel. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code, (CVE-2017-15115)
It was discovered that the key management subsystem in the Linux kernel did
not properly handle NULL payloads with non-zero length values.
(CVE-2017-15274)
It was discovered that the Bluebooth Network Encapsulation Protocol (BNEP)
implementation in the Linux kernel did not validate the type of socket
passed in the BNEPCONNADD ioctl(). (CVE-2017-16525)
It was discovered that the netfilter passive OS fingerprinting (xt_osf)
module did not properly perform access control checks. A local attacker
could improperly modify the systemwide OS fingerprint list.
(CVE-2017-17450)
It was discovered that the HMAC implementation did not validate the state
of the underlying cryptographic hash algorithm. (CVE-2017-18017)
Gareth Evans discovered that the shm IPC subsystem in the Linux kernel did
not properly restrict mapping page zero. (CVE-2017-5669)
It was discovered that an integer overflow vulnerability existing in the
IPv6 implementation in the Linux kernel. (CVE-2017-7542)
Tommi Rantala and Brad Spengler discovered that the memory manager in the
Linux kernel did not properly enforce the CONFIG_STRICT_DEVMEM protection
mechanism.
(CVE-2018-5333)
ee3/4ePS discovered that a race condition existed in loop block device
implementation in the Linux kernel. (CVE-2018-5344)
USN-3524-1 mitigated CVE-2017-5754 (Meltdown) for the amd64
architecture in Ubuntu 14.04 LTS. This update provides the
corresponding mitigations for the ppc64el architecture. Original
advisory details:
Jann Horn discovered that microprocessors utilizing speculative execution
and indirect branch prediction may allow unauthorized memory reads via
sidechannel attacks. This flaw is known as Meltdown.
(CVE-2017-5754)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
linux-image-3.13.0-142-generic 3.13.0-142.191
linux-image-3.13.0-142-generic-lpae 3.13.0-142.191
linux-image-3.13.0-142-lowlatency 3.13.0-142.191
linux-image-3.13.0-142-powerpc-e500 3.13.0-142.191
linux-image-3.13.0-142-powerpc-e500mc 3.13.0-142.191
linux-image-3.13.0-142-powerpc-smp 3.13.0-142.191
linux-image-3.13.0-142-powerpc64-emb 3.13.0-142.191
linux-image-3.13.0-142-powerpc64-smp 3.13.0-142.191
linux-image-generic 3.13.0.142.152
linux-image-generic-lpae 3.13.0.142.152
linux-image-lowlatency 3.13.0.142.152
linux-image-powerpc-e500 3.13.0.142.152
linux-image-powerpc-e500mc 3.13.0.142.152
linux-image-powerpc-smp 3.13.0.142.152
linux-image-powerpc64-emb 3.13.0.142.152
linux-image-powerpc64-smp 3.13.0.142.152
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://usn.ubuntu.com/usn/usn-3583-1
CVE-2017-0750, CVE-2017-0861, CVE-2017-1000407, CVE-2017-12153,
CVE-2017-12190, CVE-2017-12192, CVE-2017-14051, CVE-2017-14140,
CVE-2017-14156, CVE-2017-14489, CVE-2017-15102, CVE-2017-15115,
CVE-2017-15274, CVE-2017-15868, CVE-2017-16525, CVE-2017-17450,
CVE-2017-17806, CVE-2017-18017, CVE-2017-5669, CVE-2017-5754,
CVE-2017-7542, CVE-2017-7889, CVE-2017-8824, CVE-2018-5333,
CVE-2018-5344
Package Information:
https://launchpad.net/ubuntu/+source/linux/3.13.0-142.191
| VAR-201801-0385 | CVE-2017-1557 | IBM WebSphere MQ Access control vulnerability |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
IBM WebSphere MQ 8.0 and 9.0 could allow an authenticated user with authority to send a specially crafted request that could cause a channel process to cease processing further requests. IBM X-Force ID: 131547. IBM WebSphere MQ Contains an access control vulnerability. Vendors have confirmed this vulnerability IBM X-Force ID: 131547 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state.
An attacker can exploit this issue to cause a denial-of-service condition
| VAR-201801-1340 | CVE-2018-3813 | FLIR Brickstream 2300 Information disclosure vulnerability in devices |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
getConfigExportFile.cgi on FLIR Brickstream 2300 devices 2.0 4.1.53.166 has Incorrect Access Control, as demonstrated by reading the AVI_USER_ID and AVI_USER_PASSWORD fields via a direct request. FLIR Brickstream 2300 The device contains an information disclosure vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. FLIR Brickstream 2300 is a customer flow analysis and statistics equipment of Canada FLIR company. An access control error vulnerability exists in the getConfigExportFile.cgi file in FLIR Brickstream 2300 version 2.0 4.1.53.166. An attacker could exploit this vulnerability to obtain information
| VAR-201712-0555 | CVE-2017-18001 | Trustwave Secure Web Gateway Vulnerabilities related to key management errors |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Trustwave Secure Web Gateway (SWG) through 11.8.0.27 allows remote attackers to append an arbitrary public key to the device's SSH Authorized Keys data, and consequently obtain remote root access, via the publicKey parameter to the /sendKey URI. Trustwave Secure Web Gateway (SWG) Contains a vulnerability related to key management errors.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. TrustwaveSecureWebGateway (SWG) is a Web security gateway product from Trustwave Corporation of the United States. Security vulnerabilities existed in TrustwaveSWG 11.8.0.27 and earlier
| VAR-201712-0537 | CVE-2017-17974 | BA SYSTEMS BAS920 Device and ISC2000 Vulnerabilities related to certificate and password management in devices |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
BA SYSTEMS BAS Web on BAS920 devices (with Firmware 01.01.00*, HTTPserv 00002, and Script 02.*) and ISC2000 devices allows remote attackers to obtain sensitive information via a request for isc/get_sid_js.aspx or isc/get_sid.aspx, as demonstrated by obtaining administrative access by subsequently using the credential information for the Supervisor/Administrator account. BA SYSTEMS BAS920 Device and ISC2000 The device contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The BAS920 and ISC2000 devices are programmable intelligent controller products from BA SYSTEMS, Denmark. BA SYSTEMS BAS Web is a building automation system running in it. A remote attacker can exploit this vulnerability to obtain sensitive information by sending a request to the isc/get_sid_js.aspx or isc/get_sid.aspx file
| VAR-201712-0583 | CVE-2017-17910 | Hoermann BiSecur Device cryptographic vulnerability |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
On Hoermann BiSecur devices before 2018, a vulnerability can be exploited by recording a single radio transmission. An attacker can intercept an arbitrary radio frame exchanged between a BiSecur transmitter and a receiver to obtain the encrypted packet and the 32-bit serial number. The interception of the one-time pairing process is specifically not required. Due to use of AES-128 with an initial static random value and static data vector (all of this static information is the same across different customers' installations), the attacker can easily derive the utilized encryption key and decrypt the intercepted packet. The key can be verified by decrypting the intercepted packet and checking for known plaintext. Subsequently, an attacker can create arbitrary radio frames with the correct encryption key to control BiSecur garage and entrance gate operators and possibly other BiSecur systems as well ("wireless cloning"). To conduct the attack, a low cost Software Defined Radio (SDR) is sufficient. This affects Hoermann Hand Transmitter HS5-868-BS, HSE1-868-BS, and HSE2-868-BS devices. Hoermann BiSecur The device contains a cryptographic vulnerability.Denial of service (DoS) May be in a state. HoermannBiSecurdevices is a security door remote control device from Hoermann, Germany. A security vulnerability exists in previous versions of HoermannBiSecur device 2018
| VAR-201803-1048 | CVE-2017-17215 |
Huawei HG532 Input validation vulnerability
Related entries in the VARIoT exploits database: VAR-E-201712-0098 |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
Huawei HG532 with some customized versions has a remote code execution vulnerability. An authenticated attacker could send malicious packets to port 37215 to launch attacks. Successful exploit could lead to the remote execution of arbitrary code. Huawei HG532 Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The HuaweiHG532 series router is a wireless router product for home and small office users. Huawei HG532 is prone to a remote code-execution vulnerability. Failed exploit attempts will likely cause a denial-of-service condition
| VAR-201712-0564 | CVE-2017-17888 | Anti-Web In OS Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
cgi-bin/write.cgi in Anti-Web through 3.8.7, as used on NetBiter / HMS, Ouman EH-net, Alliance System WS100 --> AWU 500, Sauter ERW100F001, Carlo Gavazzi SIU-DLG, AEDILIS SMART-1, SYXTHSENSE WebBiter, ABB SREA, and ASCON DY WebServer devices, allows remote authenticated users to execute arbitrary OS commands via crafted multipart/form-data content, a different vulnerability than CVE-2017-9097. Anti-Web Is OS A command injection vulnerability exists. This vulnerability CVE-2017-9097 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. NetBiter/HMS, etc. are gateway devices produced by different companies. Anti-Web is an anti-virus component used in it. Security vulnerabilities exist in Anti-Web 3.8.7 and previous versions of cgi-bin/write.cgi files in various products
| VAR-201803-0204 | CVE-2017-17326 | Huawei Mate 9 Pro Smartphone software access control vulnerability |
CVSS V2: 2.1 CVSS V3: 4.6 Severity: MEDIUM |
Huawei Mate 9 Pro Smartphones with software of LON-AL00BC00B139D; LON-AL00BC00B229 have an activation lock bypass vulnerability. The smartphone is supposed to be activated by the former account after reset if find my phone function is on. The software does not have a sufficient protection of activation lock. Successful exploit could allow an attacker to bypass the activation lock and activate the smartphone by a new account after a series of operation. HuaweiMate9Pro is a smartphone from China's Huawei company. Multiple Huawei Smartphones are prone to a local security-bypass vulnerability.
Attackers can exploit this issue to bypass certain security restrictions to perform unauthorized actions. This may aid in further attacks
| VAR-201803-1031 | CVE-2017-17199 | plural Huawei Product out-of-bounds vulnerability |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
Huawei DP300 V500R002C00; RP200 V500R002C00; V600R006C00; TE30 V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C10; V500R002C00; V600R006C00 have an out-of-bounds read vulnerability due to the improper processing of malformed H323 messages. A remote attacker that controls a server could exploit this vulnerability by sending malformed H323 reply messages to a target device. Successful exploit could make the device read out of bounds and probably make a service unavailable. plural Huawei The product contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei DP300 and other products are all products of China Huawei. The DP300 is a video conferencing terminal. The RP200 is a video conferencing machine. The following products and versions are affected: Huawei DP300 V500R002C00 Version, RP200 V500R002C00 Version, V600R006C00 Version; TE30 V100R001C10 Version, V500R002C00 Version, V600R006C00 Version; TE40 V500R002C00 Version, V600R006C00 Version; TE50 V500R002C00 Version, V600R006C00 Version; TE60 V100R001C10 Version, V500R002C00 Version, Version V600R006C00