RHEL 7 : kernel-rt (RHSA-2018:0676)

critical Nessus Plugin ID 108984

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2018:0676 advisory.

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: Buffer overflow in firewire driver via crafted incoming packets (CVE-2016-8633, Important)

* kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824, Important)

* Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register (CVE-2017-12154, Important)

* kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166, Important)

* kernel: media: use-after-free in [tuner-xc2028] media driver (CVE-2016-7913, Moderate)

* kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl() (CVE-2017-7294, Moderate)

* kernel: Incorrect type conversion for size during dma allocation (CVE-2017-9725, Moderate)

* kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190, Moderate)

* kernel: vfs: BUG in truncate_inode_pages_range() and fuse client (CVE-2017-15121, Moderate)

* kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c (CVE-2017-15126, Moderate)

* kernel: net: double-free and memory corruption in get_net_ns_by_id() (CVE-2017-15129, Moderate)

* kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265, Moderate)

* kernel: Incorrect handling in arch/x86/include/asm/mmu_context.h:init_new_context function allowing use- after-free (CVE-2017-17053, Moderate)

* kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure (CVE-2017-17448, Moderate)

* kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity (CVE-2017-17449, Moderate)

* kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow (CVE-2017-17558, Moderate)

* kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c (CVE-2017-18017, Moderate)

* kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service (CVE-2017-18203, Moderate)

* kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ (CVE-2017-1000252, Moderate)

* Kernel: KVM: DoS via write flood to I/O port 0x80 (CVE-2017-1000407, Moderate)

* kernel: Stack information leak in the EFS element (CVE-2017-1000410, Moderate)

* kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass (CVE-2018-5750, Moderate)

* kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004, Moderate)

* kernel: unlimiting the stack disables ASLR (CVE-2016-3672, Low)

* kernel: Missing permission check in move_pages system call (CVE-2017-14140, Low)

* kernel: Null pointer dereference in rngapi_reset function (CVE-2017-15116, Low)

* kernel: Improper error handling of VM_SHARED hugetlbfs mapping in mm/hugetlb.c (CVE-2017-15127, Low)

* kernel: Integer overflow in futex.c:futux_requeue can lead to denial of service or unspecified impact (CVE-2018-6927, Low)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Red Hat would like to thank Eyal Itkin for reporting CVE-2016-8633; Mohamed Ghannam for reporting CVE-2017-8824; Jim Mattson (Google.com) for reporting CVE-2017-12154; Vitaly Mayatskih for reporting CVE-2017-12190; Andrea Arcangeli (Engineering) for reporting CVE-2017-15126; Kirill Tkhai for reporting CVE-2017-15129; Jan H. Schnherr (Amazon) for reporting CVE-2017-1000252; and Armis Labs for reporting CVE-2017-1000410. The CVE-2017-15121 issue was discovered by Miklos Szeredi (Red Hat) and the CVE-2017-15116 issue was discovered by ChunYu Wang (Red Hat).

Additional Changes:

See the Red Hat Enterprise Linux 7.5 Release Notes linked from References.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?07deb9e7

http://www.nessus.org/u?74dc8666

https://access.redhat.com/errata/RHSA-2018:0676

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=1292927

https://bugzilla.redhat.com/show_bug.cgi?id=1324749

https://bugzilla.redhat.com/show_bug.cgi?id=1391490

https://bugzilla.redhat.com/show_bug.cgi?id=1401061

https://bugzilla.redhat.com/show_bug.cgi?id=1402885

https://bugzilla.redhat.com/show_bug.cgi?id=1430418

https://bugzilla.redhat.com/show_bug.cgi?id=1436798

https://bugzilla.redhat.com/show_bug.cgi?id=1448770

https://bugzilla.redhat.com/show_bug.cgi?id=1452589

https://bugzilla.redhat.com/show_bug.cgi?id=1462329

https://bugzilla.redhat.com/show_bug.cgi?id=1488329

https://bugzilla.redhat.com/show_bug.cgi?id=1489088

https://bugzilla.redhat.com/show_bug.cgi?id=1490781

https://bugzilla.redhat.com/show_bug.cgi?id=1491224

https://bugzilla.redhat.com/show_bug.cgi?id=1495089

https://bugzilla.redhat.com/show_bug.cgi?id=1500894

https://bugzilla.redhat.com/show_bug.cgi?id=1501878

https://bugzilla.redhat.com/show_bug.cgi?id=1503749

https://bugzilla.redhat.com/show_bug.cgi?id=1506255

https://bugzilla.redhat.com/show_bug.cgi?id=1507270

https://bugzilla.redhat.com/show_bug.cgi?id=1509264

https://bugzilla.redhat.com/show_bug.cgi?id=1514609

https://bugzilla.redhat.com/show_bug.cgi?id=1518274

https://bugzilla.redhat.com/show_bug.cgi?id=1518638

https://bugzilla.redhat.com/show_bug.cgi?id=1519160

https://bugzilla.redhat.com/show_bug.cgi?id=1519591

https://bugzilla.redhat.com/show_bug.cgi?id=1520328

https://bugzilla.redhat.com/show_bug.cgi?id=1520893

https://bugzilla.redhat.com/show_bug.cgi?id=1523481

https://bugzilla.redhat.com/show_bug.cgi?id=1525218

https://bugzilla.redhat.com/show_bug.cgi?id=1525474

https://bugzilla.redhat.com/show_bug.cgi?id=1525762

https://bugzilla.redhat.com/show_bug.cgi?id=1525768

https://bugzilla.redhat.com/show_bug.cgi?id=1531135

https://bugzilla.redhat.com/show_bug.cgi?id=1531174

https://bugzilla.redhat.com/show_bug.cgi?id=1535315

https://bugzilla.redhat.com/show_bug.cgi?id=1539706

https://bugzilla.redhat.com/show_bug.cgi?id=1544612

https://bugzilla.redhat.com/show_bug.cgi?id=1548412

https://bugzilla.redhat.com/show_bug.cgi?id=1550811

Plugin Details

Severity: Critical

ID: 108984

File Name: redhat-RHSA-2018-0676.nasl

Version: 1.15

Type: local

Agent: unix

Published: 4/11/2018

Updated: 11/5/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2017-18017

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:kernel-rt, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-devel, p-cpe:/a:redhat:enterprise_linux:kernel-rt-doc, p-cpe:/a:redhat:enterprise_linux:kernel-rt-devel, p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-kvm, p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-devel, p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/10/2018

Vulnerability Publication Date: 4/27/2016

Reference Information

CVE: CVE-2016-3672, CVE-2016-7913, CVE-2016-8633, CVE-2017-1000252, CVE-2017-1000407, CVE-2017-1000410, CVE-2017-12154, CVE-2017-12190, CVE-2017-13166, CVE-2017-13305, CVE-2017-14140, CVE-2017-15116, CVE-2017-15121, CVE-2017-15126, CVE-2017-15127, CVE-2017-15129, CVE-2017-15265, CVE-2017-15274, CVE-2017-17448, CVE-2017-17449, CVE-2017-17558, CVE-2017-18017, CVE-2017-18203, CVE-2017-7294, CVE-2017-8824, CVE-2017-9725, CVE-2018-1000004, CVE-2018-5750, CVE-2018-6927

CWE: 119, 125, 190, 20, 200, 248, 266, 284, 341, 362, 400, 416, 460, 476, 617, 681, 787, 863

RHSA: 2018:0676