KernelCare
unread,May 5, 2020, 6:49:11 AM5/5/20Sign in to reply to author
Sign in to forward
You do not have permission to delete messages in this group
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to kernelcar...@googlegroups.com
Dear Customers,
KernelCare prepared security updates for your system.
Systems with AUTO_UPDATE=True (DEFAULT) in /etc/sysconfig/kcare/kcare.conf will automatically update, and no action is needed for them.
You can manually update the server by running:
/usr/bin/kcarectl --update
Changelog:
rhel7:
CVE-2015-9289: "A vulnerability was found in the Linux kernel\u2019s CX24116 tv-card\
\ driver, where an out of bounds read occurs when checking userspace params in\
\ drivers/media/dvb-frontends/cx24116.c. An attacker could use this flaw to leak\
\ kernel private information to userspace."
CVE-2017-17807: The KEYS subsystem in the Linux kernel omitted an access-control
check when writing a key to the current task's default keyring, allowing a local
user to bypass security checks to the keyring. This compromises the validity of
the keyring for those who rely on it.
CVE-2018-19985: It was discovered that the Option USB High Speed driver in the Linux
kernel did not properly validate metadata received from the device. A physically
proximate attacker could use this to cause a denial of service (system crash).
CVE-2018-20169: It was discovered that the USB subsystem in the Linux kernel did
not properly handle size checks when handling an extra USB descriptor. A physically
proximate attacker could use this to cause a denial of service (system crash).
CVE-2018-7191: A flaw was found in the Linux kernel's implementation of networking
tunnel device ioctl. A local attacker can cause a denial of service (NULL pointer
dereference and panic) via an ioctl (TUNSETIFF) call with a dev name containing
a / character.
CVE-2019-10207: "A flaw was found in the Linux kernel\u2019s Bluetooth implementation\
\ of UART. An attacker with local access and write permissions to the Bluetooth\
\ hardware could use this flaw to issue a specially crafted ioctl function call\
\ and cause the system to crash."
CVE-2019-10639: A flaw was found in the way the Linux kernel derived the IP ID field
from a partial kernel space address returned by a net_hash_mix() function. A remote
user could observe this IP ID field to extract the kernel address bits used to
derive its value, which may result in leaking the hash key and potentially defeating
KASLR.
CVE-2019-11190: A flaw in the load_elf_binary() function in the Linux kernel allows
a local attacker to leak the base address of .text and stack sections for setuid
binaries and bypass ASLR because install_exec_creds() is called too late in this
function.
CVE-2019-11884: It was discovered that the Bluetooth Human Interface Device Protocol
(HIDP) implementation in the Linux kernel did not properly verify strings were
NULL terminated in certain situations. A local attacker could use this to expose
sensitive information (kernel memory).
CVE-2019-12382: "A flaw was found in the Linux kernel\u2019s implementation of Extended\
\ Display Identification Data (EDID) technology. A firmware identifier string\
\ is duplicated with the kstrdup function, and the allocation may fail under very\
\ low memory conditions. An attacker could abuse this flaw by causing a Denial\
\ of Service and crashing the system."
CVE-2019-13233: 'A vulnerability was found in the arch/x86/lib/insn-eval.c function
in the Linux kernel. An attacker could corrupt the memory due to a flaw in use-after-free
access to an LDT entry caused by a race condition between modify_ldt() and a #BR
exception for an MPX bounds violation.'
CVE-2019-13648: A flaw was found in the PowerPc platform, where the kernel will
panic if the transactional memory is disabled. An attacker could use this flaw
to panic the system by constructing a signal context through the transactional
memory MSR bits set.
CVE-2019-14283: "A vulnerability was found in the Linux kernel\u2019s floppy disk\
\ driver implementation. A local attacker with access to the floppy device could\
\ call set_geometry in drivers/block/floppy.c, which does not validate the sect\
\ and head fields, causing an integer overflow and out-of-bounds read. This flaw\
\ may crash the system or allow an attacker to gather information causing subsequent\
\ successful attacks."
CVE-2019-14898: The fix for CVE-2019-11599 was not complete. A local user could
use this flaw to obtain sensitive information, cause a denial of service, or possibly
have other unspecified impacts by triggering a race condition with mmget_not_zero
or get_task_mm calls.
CVE-2019-15221: A NULL pointer dereference flaw was found in the way the LINE6 drivers
in the Linux kernel allocated buffers for USB packets. This flaw allows an attacker
with physical access to the system to crash the system.
CVE-2019-15916: A flaw that allowed an attacker to leak kernel memory was found
in the network subsystem where an attacker with permissions to create tun/tap
devices can create a denial of service and panic the system.
CVE-2019-16746: A flaw in the Linux kernel's WiFi beacon validation code was discovered.
The code does not check the length of the variable length elements in the beacon
head potentially leading to a buffer overflow. System availability, as well as
data confidentiality and integrity, can be impacted by this vulnerability.
CVE-2019-18660: A flaw was found in the way the Linux kernel implemented a software
flush of the Count Cache (indirect branch cache) and Link (Return Address) Stack
on the PowerPC platform. The flushing of these structures helps to prevent SpectreRSB
like attacks which may leak information from one user process to another. An unprivileged
user could use this flaw to cross the syscall or process boundary and read privileged
memory by conducting targeted cache side-channel attacks.
CVE-2019-3901: A race condition in perf_event_open() allows local attackers to leak
sensitive data from setuid programs. As no relevant locks (in particular the cred_guard_mutex)
are held during the ptrace_may_access() call, it is possible for the specified
target task to perform an execve() syscall with setuid execution before perf_event_alloc()
actually attaches to it, allowing an attacker to bypass the ptrace_may_access()
check and the perf_event_exit_task(current) call that is performed in install_exec_creds()
during privileged execve() calls.
CVE-2019-9503: It was discovered that the Broadcom Wifi driver in the Linux kernel
did not properly prevent remote firmware events from being processed for USB Wifi
devices. A physically proximate attacker could use this to send firmware events
to the device.
cvelist: [CVE-2019-14898, CVE-2015-9289, CVE-2017-17807, CVE-2018-7191, CVE-2018-19985,
CVE-2018-20169, CVE-2019-3901, CVE-2019-9503, CVE-2019-10207, CVE-2019-10639,
CVE-2019-11190, CVE-2019-11884, CVE-2019-12382, CVE-2019-13233, CVE-2019-13648,
CVE-2019-14283, CVE-2019-15221, CVE-2019-15916, CVE-2019-16746, CVE-2019-18660]
latest-version: kernel-3.10.0-1127.el7
oel7:
CVE-2015-9289: "A vulnerability was found in the Linux kernel\u2019s CX24116 tv-card\
\ driver, where an out of bounds read occurs when checking userspace params in\
\ drivers/media/dvb-frontends/cx24116.c. An attacker could use this flaw to leak\
\ kernel private information to userspace."
CVE-2017-17807: The KEYS subsystem in the Linux kernel omitted an access-control
check when writing a key to the current task's default keyring, allowing a local
user to bypass security checks to the keyring. This compromises the validity of
the keyring for those who rely on it.
CVE-2018-19985: It was discovered that the Option USB High Speed driver in the Linux
kernel did not properly validate metadata received from the device. A physically
proximate attacker could use this to cause a denial of service (system crash).
CVE-2018-20169: It was discovered that the USB subsystem in the Linux kernel did
not properly handle size checks when handling an extra USB descriptor. A physically
proximate attacker could use this to cause a denial of service (system crash).
CVE-2018-7191: A flaw was found in the Linux kernel's implementation of networking
tunnel device ioctl. A local attacker can cause a denial of service (NULL pointer
dereference and panic) via an ioctl (TUNSETIFF) call with a dev name containing
a / character.
CVE-2019-10207: "A flaw was found in the Linux kernel\u2019s Bluetooth implementation\
\ of UART. An attacker with local access and write permissions to the Bluetooth\
\ hardware could use this flaw to issue a specially crafted ioctl function call\
\ and cause the system to crash."
CVE-2019-10639: A flaw was found in the way the Linux kernel derived the IP ID field
from a partial kernel space address returned by a net_hash_mix() function. A remote
user could observe this IP ID field to extract the kernel address bits used to
derive its value, which may result in leaking the hash key and potentially defeating
KASLR.
CVE-2019-11190: A flaw in the load_elf_binary() function in the Linux kernel allows
a local attacker to leak the base address of .text and stack sections for setuid
binaries and bypass ASLR because install_exec_creds() is called too late in this
function.
CVE-2019-11884: It was discovered that the Bluetooth Human Interface Device Protocol
(HIDP) implementation in the Linux kernel did not properly verify strings were
NULL terminated in certain situations. A local attacker could use this to expose
sensitive information (kernel memory).
CVE-2019-12382: "A flaw was found in the Linux kernel\u2019s implementation of Extended\
\ Display Identification Data (EDID) technology. A firmware identifier string\
\ is duplicated with the kstrdup function, and the allocation may fail under very\
\ low memory conditions. An attacker could abuse this flaw by causing a Denial\
\ of Service and crashing the system."
CVE-2019-13233: 'A vulnerability was found in the arch/x86/lib/insn-eval.c function
in the Linux kernel. An attacker could corrupt the memory due to a flaw in use-after-free
access to an LDT entry caused by a race condition between modify_ldt() and a #BR
exception for an MPX bounds violation.'
CVE-2019-13648: A flaw was found in the PowerPc platform, where the kernel will
panic if the transactional memory is disabled. An attacker could use this flaw
to panic the system by constructing a signal context through the transactional
memory MSR bits set.
CVE-2019-14283: "A vulnerability was found in the Linux kernel\u2019s floppy disk\
\ driver implementation. A local attacker with access to the floppy device could\
\ call set_geometry in drivers/block/floppy.c, which does not validate the sect\
\ and head fields, causing an integer overflow and out-of-bounds read. This flaw\
\ may crash the system or allow an attacker to gather information causing subsequent\
\ successful attacks."
CVE-2019-14898: The fix for CVE-2019-11599 was not complete. A local user could
use this flaw to obtain sensitive information, cause a denial of service, or possibly
have other unspecified impacts by triggering a race condition with mmget_not_zero
or get_task_mm calls.
CVE-2019-15221: A NULL pointer dereference flaw was found in the way the LINE6 drivers
in the Linux kernel allocated buffers for USB packets. This flaw allows an attacker
with physical access to the system to crash the system.
CVE-2019-15916: A flaw that allowed an attacker to leak kernel memory was found
in the network subsystem where an attacker with permissions to create tun/tap
devices can create a denial of service and panic the system.
CVE-2019-16746: A flaw in the Linux kernel's WiFi beacon validation code was discovered.
The code does not check the length of the variable length elements in the beacon
head potentially leading to a buffer overflow. System availability, as well as
data confidentiality and integrity, can be impacted by this vulnerability.
CVE-2019-18660: A flaw was found in the way the Linux kernel implemented a software
flush of the Count Cache (indirect branch cache) and Link (Return Address) Stack
on the PowerPC platform. The flushing of these structures helps to prevent SpectreRSB
like attacks which may leak information from one user process to another. An unprivileged
user could use this flaw to cross the syscall or process boundary and read privileged
memory by conducting targeted cache side-channel attacks.
CVE-2019-3901: A race condition in perf_event_open() allows local attackers to leak
sensitive data from setuid programs. As no relevant locks (in particular the cred_guard_mutex)
are held during the ptrace_may_access() call, it is possible for the specified
target task to perform an execve() syscall with setuid execution before perf_event_alloc()
actually attaches to it, allowing an attacker to bypass the ptrace_may_access()
check and the perf_event_exit_task(current) call that is performed in install_exec_creds()
during privileged execve() calls.
CVE-2019-9503: It was discovered that the Broadcom Wifi driver in the Linux kernel
did not properly prevent remote firmware events from being processed for USB Wifi
devices. A physically proximate attacker could use this to send firmware events
to the device.
cvelist: [CVE-2019-14898, CVE-2015-9289, CVE-2017-17807, CVE-2018-7191, CVE-2018-19985,
CVE-2018-20169, CVE-2019-3901, CVE-2019-9503, CVE-2019-10207, CVE-2019-10639,
CVE-2019-11190, CVE-2019-11884, CVE-2019-12382, CVE-2019-13233, CVE-2019-13648,
CVE-2019-14283, CVE-2019-15221, CVE-2019-15916, CVE-2019-16746, CVE-2019-18660]
latest-version: kernel-3.10.0-1127.el7