Oval Definition:oval:com.redhat.rhsa:def:20180676
Revision Date:2018-04-10Version:639
Title:RHSA-2018:0676: kernel-rt security, bug fix, and enhancement update (Important)
Description:The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: Buffer overflow in firewire driver via crafted incoming packets (CVE-2016-8633, Important)

  • kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824, Important)

  • Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register (CVE-2017-12154, Important)

  • kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166, Important)

  • kernel: media: use-after-free in [tuner-xc2028] media driver (CVE-2016-7913, Moderate)

  • kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl() (CVE-2017-7294, Moderate)

  • kernel: Incorrect type conversion for size during dma allocation (CVE-2017-9725, Moderate)

  • kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190, Moderate)

  • kernel: vfs: BUG in truncate_inode_pages_range() and fuse client (CVE-2017-15121, Moderate)

  • kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c (CVE-2017-15126, Moderate)

  • kernel: net: double-free and memory corruption in get_net_ns_by_id() (CVE-2017-15129, Moderate)

  • kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265, Moderate)

  • kernel: Incorrect handling in arch/x86/include/asm/mmu_context.h:init_new_context function allowing use-after-free (CVE-2017-17053, Moderate)

  • kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure (CVE-2017-17448, Moderate)

  • kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity (CVE-2017-17449, Moderate)

  • kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow (CVE-2017-17558, Moderate)

  • kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c (CVE-2017-18017, Moderate)

  • kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service (CVE-2017-18203, Moderate)

  • kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ (CVE-2017-1000252, Moderate)

  • Kernel: KVM: DoS via write flood to I/O port 0x80 (CVE-2017-1000407, Moderate)

  • kernel: Stack information leak in the EFS element (CVE-2017-1000410, Moderate)

  • kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass (CVE-2018-5750, Moderate)

  • kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004, Moderate)

  • kernel: unlimiting the stack disables ASLR (CVE-2016-3672, Low)

  • kernel: Missing permission check in move_pages system call (CVE-2017-14140, Low)

  • kernel: Null pointer dereference in rngapi_reset function (CVE-2017-15116, Low)

  • kernel: Improper error handling of VM_SHARED hugetlbfs mapping in mm/hugetlb.c (CVE-2017-15127, Low)

  • kernel: Integer overflow in futex.c:futux_requeue can lead to denial of service or unspecified impact (CVE-2018-6927, Low)

    For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

    Red Hat would like to thank Eyal Itkin for reporting CVE-2016-8633; Mohamed Ghannam for reporting CVE-2017-8824; Jim Mattson (Google.com) for reporting CVE-2017-12154; Vitaly Mayatskih for reporting CVE-2017-12190; Andrea Arcangeli (Engineering) for reporting CVE-2017-15126; Kirill Tkhai for reporting CVE-2017-15129; Jan H. Schönherr (Amazon) for reporting CVE-2017-1000252; and Armis Labs for reporting CVE-2017-1000410. The CVE-2017-15121 issue was discovered by Miklos Szeredi (Red Hat) and the CVE-2017-15116 issue was discovered by ChunYu Wang (Red Hat).

    Additional Changes:

    See the Red Hat Enterprise Linux 7.5 Release Notes linked from References.
  • Family:unixClass:patch
    Status:Reference(s):CVE-2016-3672
    CVE-2016-7913
    CVE-2016-8633
    CVE-2017-1000252
    CVE-2017-1000407
    CVE-2017-1000410
    CVE-2017-12154
    CVE-2017-12190
    CVE-2017-13166
    CVE-2017-13305
    CVE-2017-14140
    CVE-2017-15116
    CVE-2017-15121
    CVE-2017-15126
    CVE-2017-15127
    CVE-2017-15129
    CVE-2017-15265
    CVE-2017-15274
    CVE-2017-17448
    CVE-2017-17449
    CVE-2017-17558
    CVE-2017-18017
    CVE-2017-18203
    CVE-2017-7294
    CVE-2017-8824
    CVE-2017-9725
    CVE-2018-1000004
    CVE-2018-5750
    CVE-2018-6927
    RHSA-2018:0676
    RHSA-2018:0676-01
    Platform(s):Red Hat Enterprise Linux 7
    Product(s):
    Definition Synopsis
  • Red Hat Enterprise Linux must be installed
  • OR Package Information
  • Red Hat Enterprise Linux 7 is installed
  • AND
  • kernel-rt earlier than 0:3.10.0-862.rt56.804.el7 is currently running
  • OR kernel-rt earlier than 0:3.10.0-862.rt56.804.el7 is set to boot up on next boot
  • AND
  • kernel-rt is earlier than 0:3.10.0-862.rt56.804.el7
  • AND kernel-rt is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug is earlier than 0:3.10.0-862.rt56.804.el7
  • AND kernel-rt-debug is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug-devel is earlier than 0:3.10.0-862.rt56.804.el7
  • AND kernel-rt-debug-devel is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug-kvm is earlier than 0:3.10.0-862.rt56.804.el7
  • AND kernel-rt-debug-kvm is signed with Red Hat redhatrelease2 key
  • kernel-rt-devel is earlier than 0:3.10.0-862.rt56.804.el7
  • AND kernel-rt-devel is signed with Red Hat redhatrelease2 key
  • kernel-rt-doc is earlier than 0:3.10.0-862.rt56.804.el7
  • AND kernel-rt-doc is signed with Red Hat redhatrelease2 key
  • kernel-rt-kvm is earlier than 0:3.10.0-862.rt56.804.el7
  • AND kernel-rt-kvm is signed with Red Hat redhatrelease2 key
  • kernel-rt-trace is earlier than 0:3.10.0-862.rt56.804.el7
  • AND kernel-rt-trace is signed with Red Hat redhatrelease2 key
  • kernel-rt-trace-devel is earlier than 0:3.10.0-862.rt56.804.el7
  • AND kernel-rt-trace-devel is signed with Red Hat redhatrelease2 key
  • kernel-rt-trace-kvm is earlier than 0:3.10.0-862.rt56.804.el7
  • AND kernel-rt-trace-kvm is signed with Red Hat redhatrelease2 key
  • BACK