RedHat: RHSA-2018-3822:01 Important: kernel security and bug fix update
Summary
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security Fix(es):
* kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824)
* kernel: Use-after-free in sys_mq_notify() (CVE-2017-11176)
* kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265)
For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.
Red Hat would like to thank Mohamed Ghannam for reporting CVE-2017-8824.
Bug Fix(es):
* Previously, on certain Intel 64 systems, the microcode contained a new
model-specific register (MSR) that was not present in the older microcode
running on CPUs that had not been updated yet. As a consequence, the system
crashed due to a general protection fault on a CPU running the older
microcode. This update fixes the bug by having the kernel use MSR access
routines that handle the general protection fault. As a result, the system
no longer crashes in the described scenario. (BZ#1651481)
Summary
Solution
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
References
https://access.redhat.com/security/cve/CVE-2017-8824 https://access.redhat.com/security/cve/CVE-2017-11176 https://access.redhat.com/security/cve/CVE-2017-15265 https://access.redhat.com/security/updates/classification/#important
Package List
Red Hat Enterprise Linux Server (v. 5 ELS):
Source:
kernel-2.6.18-436.el5.src.rpm
i386:
kernel-2.6.18-436.el5.i686.rpm
kernel-PAE-2.6.18-436.el5.i686.rpm
kernel-PAE-debuginfo-2.6.18-436.el5.i686.rpm
kernel-PAE-devel-2.6.18-436.el5.i686.rpm
kernel-debug-2.6.18-436.el5.i686.rpm
kernel-debug-debuginfo-2.6.18-436.el5.i686.rpm
kernel-debug-devel-2.6.18-436.el5.i686.rpm
kernel-debuginfo-2.6.18-436.el5.i686.rpm
kernel-debuginfo-common-2.6.18-436.el5.i686.rpm
kernel-devel-2.6.18-436.el5.i686.rpm
kernel-headers-2.6.18-436.el5.i386.rpm
kernel-xen-2.6.18-436.el5.i686.rpm
kernel-xen-debuginfo-2.6.18-436.el5.i686.rpm
kernel-xen-devel-2.6.18-436.el5.i686.rpm
noarch:
kernel-doc-2.6.18-436.el5.noarch.rpm
s390x:
kernel-2.6.18-436.el5.s390x.rpm
kernel-debug-2.6.18-436.el5.s390x.rpm
kernel-debug-debuginfo-2.6.18-436.el5.s390x.rpm
kernel-debug-devel-2.6.18-436.el5.s390x.rpm
kernel-debuginfo-2.6.18-436.el5.s390x.rpm
kernel-debuginfo-common-2.6.18-436.el5.s390x.rpm
kernel-devel-2.6.18-436.el5.s390x.rpm
kernel-headers-2.6.18-436.el5.s390x.rpm
kernel-kdump-2.6.18-436.el5.s390x.rpm
kernel-kdump-debuginfo-2.6.18-436.el5.s390x.rpm
kernel-kdump-devel-2.6.18-436.el5.s390x.rpm
x86_64:
kernel-2.6.18-436.el5.x86_64.rpm
kernel-debug-2.6.18-436.el5.x86_64.rpm
kernel-debug-debuginfo-2.6.18-436.el5.x86_64.rpm
kernel-debug-devel-2.6.18-436.el5.x86_64.rpm
kernel-debuginfo-2.6.18-436.el5.x86_64.rpm
kernel-debuginfo-common-2.6.18-436.el5.x86_64.rpm
kernel-devel-2.6.18-436.el5.x86_64.rpm
kernel-headers-2.6.18-436.el5.x86_64.rpm
kernel-xen-2.6.18-436.el5.x86_64.rpm
kernel-xen-debuginfo-2.6.18-436.el5.x86_64.rpm
kernel-xen-devel-2.6.18-436.el5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
An update for kernel is now available for Red Hat Enterprise Linux 5Extended Lifecycle Support.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Red Hat Enterprise Linux Server (v. 5 ELS) - i386, noarch, s390x, x86_64
Bugs Fixed
1470659 - CVE-2017-11176 kernel: Use-after-free in sys_mq_notify()
1501878 - CVE-2017-15265 kernel: Use-after-free in snd_seq_ioctl_create_port()
1519591 - CVE-2017-8824 kernel: Use-after-free vulnerability in DCCP socket