SCIENTIFIC-LINUX-ERRATA Archives

August 2018

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Wed, 15 Aug 2018 13:45:58 -0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (81 lines)
Synopsis:          Important: kernel security and bug fix update
Advisory ID: SLSA-2018:2384-1
Issue Date: 2018-08-14
CVE Numbers: CVE-2018-10675
                   CVE-2018-7566
                   CVE-2018-3693
                   CVE-2018-3646
                   CVE-2017-13215
                   CVE-2018-5390
--

Security Fix(es):

* Modern operating systems implement virtualization of physical memory to
efficiently use available system resources and provide inter-domain
protection through access control and isolation. The L1TF issue was found
in the way the x86 microprocessor designs have implemented speculative
execution of instructions (a commonly used performance optimisation) in
combination with handling of page-faults caused by terminated virtual to
physical address resolving process. As a result, an unprivileged attacker
could use this flaw to read privileged memory of the kernel or other
processes and/or cross guest/host boundaries to read host memory by
conducting targeted cache side-channel attacks. (CVE-2018-3620,
CVE-2018-3646)

* An industry-wide issue was found in the way many modern microprocessor
designs have implemented speculative execution of instructions past bounds
check. The flaw relies on the presence of a precisely-defined instruction
sequence in the privileged code and the fact that memory writes occur to
an address which depends on the untrusted value. Such writes cause an
update into the microprocessor's data cache even for speculatively
executed instructions that never actually commit (retire). As a result, an
unprivileged attacker could use this flaw to influence speculative
execution and/or read privileged memory by conducting targeted cache side-
channel attacks. (CVE-2018-3693)

* A flaw named SegmentSmack was found in the way the Linux kernel handled
specially crafted TCP packets. A remote attacker could use this flaw to
trigger time and calculation expensive calls to tcp_collapse_ofo_queue()
and tcp_prune_ofo_queue() functions by sending specially modified packets
within ongoing TCP sessions which could lead to a CPU saturation and hence
a denial of service on the system. Maintaining the denial of service
condition requires continuous two-way TCP sessions to a reachable open
port, thus the attacks cannot be performed using spoofed IP addresses.
(CVE-2018-5390)

* kernel: crypto: privilege escalation in skcipher_recvmsg function
(CVE-2017-13215)

* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS
or other unspecified impact (CVE-2018-10675)

* kernel: race condition in snd_seq_write() may lead to UAF or OOB access
(CVE-2018-7566)
--

SL7
  x86_64
    kernel-3.10.0-862.11.6.el7.x86_64.rpm
    kernel-debug-3.10.0-862.11.6.el7.x86_64.rpm
    kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm
    kernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm
    kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm
    kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm
    kernel-devel-3.10.0-862.11.6.el7.x86_64.rpm
    kernel-headers-3.10.0-862.11.6.el7.x86_64.rpm
    kernel-tools-3.10.0-862.11.6.el7.x86_64.rpm
    kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm
    kernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm
    perf-3.10.0-862.11.6.el7.x86_64.rpm
    perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm
    python-perf-3.10.0-862.11.6.el7.x86_64.rpm
    python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm
    kernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm
    kernel-3.10.0-862.11.6.el7.src.rpm
  noarch
    kernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm
    kernel-doc-3.10.0-862.11.6.el7.noarch.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2