RedHat: RHSA-2020-0740:01 Important: kernel-alt security and bug fix update
Summary
The kernel-alt packages provide the Linux kernel version 4.x.
Security Fix(es):
* kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in
the Linux kernel lacks a certain upper-bound check, leading to a buffer
overflow (CVE-2019-17666)
* kernel: nfs: NULL pointer dereference due to an anomalized NFS message
sequence (CVE-2018-16871)
* kernel: Heap address information leak while using L2CAP_GET_CONF_OPT
(CVE-2019-3459)
* kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP
(CVE-2019-3460)
* kernel: sensitive information disclosure from kernel stack memory via
HIDPCONNADD command (CVE-2019-11884)
* kernel: powerpc: local user can read vector registers of other users'
processes via a Facility Unavailable exception (CVE-2019-15030)
* kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c
leads to denial of service (CVE-2019-15916)
* kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c
(CVE-2019-18805)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Bug Fix(es):
* lpfc: NVMe/FC target test machine rhel-storage-62 crashes on boot when
connected to FC switch (BZ#1623205)
* kernel BUG at fs/nfs_common/grace.c:107! (BZ#1637543)
* RHEL-Alt-7.6 - Need a fix for kernel bug cap_inode_getsecurity: use
d_find_any_alias() instead of d_find_alias() (BZ#1711934)
* Backport "fs/dcache.c: add cond_resched() in shrink_dentry_list()"
(32785c0539b7) [rhel-alt-7.6.z] (BZ#1758861)
* [RHEL-ALT-7.6.z][arm64] iommu/iova: Fix tracking of recently failed iova
address (BZ#1780500)
Summary
Solution
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
References
https://access.redhat.com/security/cve/CVE-2018-16871 https://access.redhat.com/security/cve/CVE-2019-3459 https://access.redhat.com/security/cve/CVE-2019-3460 https://access.redhat.com/security/cve/CVE-2019-11884 https://access.redhat.com/security/cve/CVE-2019-15030 https://access.redhat.com/security/cve/CVE-2019-15916 https://access.redhat.com/security/cve/CVE-2019-17666 https://access.redhat.com/security/cve/CVE-2019-18805 https://access.redhat.com/security/updates/classification/#important
Package List
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):
Source:
kernel-alt-4.14.0-115.18.1.el7a.src.rpm
aarch64:
kernel-4.14.0-115.18.1.el7a.aarch64.rpm
kernel-debug-4.14.0-115.18.1.el7a.aarch64.rpm
kernel-debug-debuginfo-4.14.0-115.18.1.el7a.aarch64.rpm
kernel-debug-devel-4.14.0-115.18.1.el7a.aarch64.rpm
kernel-debuginfo-4.14.0-115.18.1.el7a.aarch64.rpm
kernel-debuginfo-common-aarch64-4.14.0-115.18.1.el7a.aarch64.rpm
kernel-devel-4.14.0-115.18.1.el7a.aarch64.rpm
kernel-headers-4.14.0-115.18.1.el7a.aarch64.rpm
kernel-tools-4.14.0-115.18.1.el7a.aarch64.rpm
kernel-tools-debuginfo-4.14.0-115.18.1.el7a.aarch64.rpm
kernel-tools-libs-4.14.0-115.18.1.el7a.aarch64.rpm
perf-4.14.0-115.18.1.el7a.aarch64.rpm
perf-debuginfo-4.14.0-115.18.1.el7a.aarch64.rpm
python-perf-4.14.0-115.18.1.el7a.aarch64.rpm
python-perf-debuginfo-4.14.0-115.18.1.el7a.aarch64.rpm
noarch:
kernel-abi-whitelists-4.14.0-115.18.1.el7a.noarch.rpm
kernel-doc-4.14.0-115.18.1.el7a.noarch.rpm
ppc64le:
kernel-4.14.0-115.18.1.el7a.ppc64le.rpm
kernel-bootwrapper-4.14.0-115.18.1.el7a.ppc64le.rpm
kernel-debug-4.14.0-115.18.1.el7a.ppc64le.rpm
kernel-debug-debuginfo-4.14.0-115.18.1.el7a.ppc64le.rpm
kernel-debuginfo-4.14.0-115.18.1.el7a.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.14.0-115.18.1.el7a.ppc64le.rpm
kernel-devel-4.14.0-115.18.1.el7a.ppc64le.rpm
kernel-headers-4.14.0-115.18.1.el7a.ppc64le.rpm
kernel-tools-4.14.0-115.18.1.el7a.ppc64le.rpm
kernel-tools-debuginfo-4.14.0-115.18.1.el7a.ppc64le.rpm
kernel-tools-libs-4.14.0-115.18.1.el7a.ppc64le.rpm
perf-4.14.0-115.18.1.el7a.ppc64le.rpm
perf-debuginfo-4.14.0-115.18.1.el7a.ppc64le.rpm
python-perf-4.14.0-115.18.1.el7a.ppc64le.rpm
python-perf-debuginfo-4.14.0-115.18.1.el7a.ppc64le.rpm
s390x:
kernel-4.14.0-115.18.1.el7a.s390x.rpm
kernel-debug-4.14.0-115.18.1.el7a.s390x.rpm
kernel-debug-debuginfo-4.14.0-115.18.1.el7a.s390x.rpm
kernel-debug-devel-4.14.0-115.18.1.el7a.s390x.rpm
kernel-debuginfo-4.14.0-115.18.1.el7a.s390x.rpm
kernel-debuginfo-common-s390x-4.14.0-115.18.1.el7a.s390x.rpm
kernel-devel-4.14.0-115.18.1.el7a.s390x.rpm
kernel-headers-4.14.0-115.18.1.el7a.s390x.rpm
kernel-kdump-4.14.0-115.18.1.el7a.s390x.rpm
kernel-kdump-debuginfo-4.14.0-115.18.1.el7a.s390x.rpm
kernel-kdump-devel-4.14.0-115.18.1.el7a.s390x.rpm
perf-4.14.0-115.18.1.el7a.s390x.rpm
perf-debuginfo-4.14.0-115.18.1.el7a.s390x.rpm
python-perf-4.14.0-115.18.1.el7a.s390x.rpm
python-perf-debuginfo-4.14.0-115.18.1.el7a.s390x.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):
aarch64:
kernel-debug-debuginfo-4.14.0-115.18.1.el7a.aarch64.rpm
kernel-debuginfo-4.14.0-115.18.1.el7a.aarch64.rpm
kernel-debuginfo-common-aarch64-4.14.0-115.18.1.el7a.aarch64.rpm
kernel-tools-debuginfo-4.14.0-115.18.1.el7a.aarch64.rpm
kernel-tools-libs-devel-4.14.0-115.18.1.el7a.aarch64.rpm
perf-debuginfo-4.14.0-115.18.1.el7a.aarch64.rpm
python-perf-debuginfo-4.14.0-115.18.1.el7a.aarch64.rpm
noarch:
kernel-doc-4.14.0-115.18.1.el7a.noarch.rpm
ppc64le:
kernel-debug-debuginfo-4.14.0-115.18.1.el7a.ppc64le.rpm
kernel-debug-devel-4.14.0-115.18.1.el7a.ppc64le.rpm
kernel-debuginfo-4.14.0-115.18.1.el7a.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.14.0-115.18.1.el7a.ppc64le.rpm
kernel-tools-debuginfo-4.14.0-115.18.1.el7a.ppc64le.rpm
kernel-tools-libs-devel-4.14.0-115.18.1.el7a.ppc64le.rpm
perf-debuginfo-4.14.0-115.18.1.el7a.ppc64le.rpm
python-perf-debuginfo-4.14.0-115.18.1.el7a.ppc64le.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
An update for kernel-alt is now available for Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, noarch, ppc64le, s390x
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, noarch, ppc64le
Bugs Fixed
1655162 - CVE-2018-16871 kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence
1663176 - CVE-2019-3459 kernel: Heap address information leak while using L2CAP_GET_CONF_OPT
1663179 - CVE-2019-3460 kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP
1709837 - CVE-2019-11884 kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command
1750813 - CVE-2019-15916 kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service
1759313 - CVE-2019-15030 kernel: powerpc: local user can read vector registers of other users' processes via a Facility Unavailable exception
1763690 - CVE-2019-17666 kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow
1771496 - CVE-2019-18805 kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c