ID

VAR-201902-0242


CVE

CVE-2019-6974


TITLE

Linux kernel Resource Management Error Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-201902-612

DESCRIPTION

In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free. 7.5) - ppc64, ppc64le, x86_64 3. Bug Fix(es): * A cluster node has multiple hung "mv" processes that are accessing a gfs2 filesystem. (BZ#1716321) * Growing unreclaimable slab memory (BZ#1741918) * [LLNL 7.5 Bug] slab leak causing a crash when using kmem control group (BZ#1748236) * kernel build: parallelize redhat/mod-sign.sh (BZ#1755328) * kernel build: speed up module compression step (BZ#1755337) 4. Bugs fixed (https://bugzilla.redhat.com/): 1551565 - CVE-2017-18208 kernel: Inifinite loop vulnerability in mm/madvise.c:madvise_willneed() function allows local denial of service 1590720 - CVE-2018-10902 kernel: MIDI driver race condition leads to a double-free 1641878 - CVE-2018-18559 kernel: Use-after-free due to race condition in AF_PACKET implementation 1655904 - CVE-2018-9568 kernel: Memory corruption due to incorrect socket cloning 1664110 - CVE-2019-5489 Kernel: page cache side channel attacks 1671904 - CVE-2019-7221 Kernel: KVM: nVMX: use-after-free of the hrtimer for emulation of the preemption timer 1671913 - CVE-2019-6974 Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() 1698757 - CVE-2019-3900 Kernel: vhost_net: infinite loop while receiving packets leads to DoS 6. ========================================================================== Ubuntu Security Notice USN-3932-2 April 02, 2019 linux-lts-xenial, linux-aws vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 LTS Summary: Several security issues were fixed in the Linux kernel. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 LTS. A local attacker could use this to cause a denial of service. (CVE-2017-18249) Wen Xu discovered that the f2fs file system implementation in the Linux kernel did not properly validate metadata. An attacker could use this to construct a malicious f2fs image that, when mounted, could cause a denial of service (system crash). (CVE-2018-13097, CVE-2018-13099, CVE-2018-13100, CVE-2018-14614, CVE-2018-14616) Wen Xu and Po-Ning Tseng discovered that btrfs file system implementation in the Linux kernel did not properly validate metadata. An attacker could use this to construct a malicious btrfs image that, when mounted, could cause a denial of service (system crash). (CVE-2018-14610, CVE-2018-14611, CVE-2018-14612, CVE-2018-14613) Vasily Averin and Evgenii Shatokhin discovered that a use-after-free vulnerability existed in the NFS41+ subsystem when multiple network namespaces are in use. A local attacker in a container could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-16884) It was discovered that a use-after-free vulnerability existed in the PPP over L2TP implementation in the Linux kernel. A privileged local attacker could use this to possibly execute arbitrary code. (CVE-2018-9517) Shlomi Oberman, Yuli Shapiro, and Ran Menscher discovered an information leak in the Bluetooth implementation of the Linux kernel. An attacker within Bluetooth range could use this to expose sensitive information (kernel memory). (CVE-2019-3459, CVE-2019-3460) Jann Horn discovered that the KVM implementation in the Linux kernel contained a use-after-free vulnerability. An attacker in a guest VM with access to /dev/kvm could use this to cause a denial of service (guest VM crash). (CVE-2019-6974) Jim Mattson and Felix Wilhelm discovered a use-after-free vulnerability in the KVM subsystem of the Linux kernel, when using nested virtual machines. A local attacker in a guest VM could use this to cause a denial of service (system crash) or possibly execute arbitrary code in the host system. (CVE-2019-7221) Felix Wilhelm discovered that an information leak vulnerability existed in the KVM subsystem of the Linux kernel, when nested virtualization is used. A local attacker could use this to expose sensitive information (host system memory to a guest VM). (CVE-2019-7222) Jann Horn discovered that the mmap implementation in the Linux kernel did not properly check for the mmap minimum address in some situations. A local attacker could use this to assist exploiting a kernel NULL pointer dereference vulnerability. (CVE-2019-9213) Muyu Yu discovered that the CAN implementation in the Linux kernel in some situations did not properly restrict the field size when processing outgoing frames. A local attacker with CAP_NET_ADMIN privileges could use this to execute arbitrary code. (CVE-2019-3701) Vladis Dronov discovered that the debug interface for the Linux kernel's HID subsystem did not properly validate passed parameters in some situations. A local privileged attacker could use this to cause a denial of service (infinite loop). (CVE-2019-3819) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 LTS: linux-image-4.4.0-1040-aws 4.4.0-1040.43 linux-image-4.4.0-144-generic 4.4.0-144.170~14.04.1 linux-image-4.4.0-144-generic-lpae 4.4.0-144.170~14.04.1 linux-image-4.4.0-144-lowlatency 4.4.0-144.170~14.04.1 linux-image-4.4.0-144-powerpc-e500mc 4.4.0-144.170~14.04.1 linux-image-4.4.0-144-powerpc-smp 4.4.0-144.170~14.04.1 linux-image-4.4.0-144-powerpc64-emb 4.4.0-144.170~14.04.1 linux-image-4.4.0-144-powerpc64-smp 4.4.0-144.170~14.04.1 linux-image-aws 4.4.0.1040.41 linux-image-generic-lpae-lts-xenial 4.4.0.144.127 linux-image-generic-lts-xenial 4.4.0.144.127 linux-image-lowlatency-lts-xenial 4.4.0.144.127 linux-image-powerpc-e500mc-lts-xenial 4.4.0.144.127 linux-image-powerpc-smp-lts-xenial 4.4.0.144.127 linux-image-powerpc64-emb-lts-xenial 4.4.0.144.127 linux-image-powerpc64-smp-lts-xenial 4.4.0.144.127 linux-image-virtual-lts-xenial 4.4.0.144.127 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. 7) - noarch, x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Bug Fix(es): * VM hangs on RHEL rt-kernel and OSP 13 [rhel-7.6.z] (BZ#1688673) * kernel-rt: update to the RHEL7.6.z batch#4 source tree (BZ#1689417) Users of kernel are advised to upgrade to these updated packages, which fix these bugs. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2019:0818-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:0818 Issue date: 2019-04-23 CVE Names: CVE-2019-6974 CVE-2019-7221 ==================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() (CVE-2019-6974) * Kernel: KVM: nVMX: use-after-free of the hrtimer for emulation of the preemption timer (CVE-2019-7221) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * rbd: avoid corruption on partially completed bios [rhel-7.6.z] (BZ#1672514) * xfs_vm_writepages deadly embrace between kworker and user task. [rhel-7.6.z] (BZ#1673281) * Offload Connections always get vlan priority 0 [rhel-7.6.z] (BZ#1673821) * [NOKIA] RHEL sends flood of Neighbour Solicitations under specific conditions [rhel-7.6.z] (BZ#1677179) * RHEL 7.6 - Host crash occurred on NVMe/IB system while running controller reset [rhel-7.6.z] (BZ#1678214) * [rhel7] raid0 md workqueue deadlock with stacked md devices [rhel-7.6.z] (BZ#1678215) * [PureStorage7.6]nvme disconnect following an unsuccessful Admin queue creation causes kernel panic [rhel-7.6.z] (BZ#1678216) * RFC: Regression with -fstack-check in 'backport upstream large stack guard patch to RHEL6' patch [rhel-7.6.z] (BZ#1678221) * [Hyper-V] [RHEL 7.6]hv_netvsc: Fix a network regression after ifdown/ifup [rhel-7.6.z] (BZ#1679997) * rtc_cmos: probe of 00:01 failed with error -16 [rhel-7.6.z] (BZ#1683078) * ACPI WDAT watchdog update [rhel-7.6.z] (BZ#1683079) * high ovs-vswitchd CPU usage when VRRP over VXLAN tunnel causing qrouter fail-over [rhel-7.6.z] (BZ#1683093) * Openshift node drops outgoing POD traffic due to NAT hashtable race in __ip_conntrack_confirm() [rhel-7.6.z] (BZ#1686766) * [Backport] [v3,2/2] net: igmp: Allow user-space configuration of igmp unsolicited report interval [rhel-7.6.z] (BZ#1686771) * [RHEL7.6]: Intermittently seen FIFO parity error on T6225-SO adapter [rhel-7.6.z] (BZ#1687487) * The number of unsolict report about IGMP is incorrect [rhel-7.6.z] (BZ#1688225) * RDT driver causing failure to boot on AMD Rome system with more than 255 CPUs [rhel-7.6.z] (BZ#1689120) * mpt3sas_cm0: fault_state(0x2100)! [rhel-7.6.z] (BZ#1689379) * rwsem in inconsistent state leading system to hung [rhel-7.6.z] (BZ#1690323) Users of kernel are advised to upgrade to these updated packages, which fix these bugs. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1671904 - CVE-2019-7221 Kernel: KVM: nVMX: use-after-free of the hrtimer for emulation of the preemption timer 1671913 - CVE-2019-6974 Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: kernel-3.10.0-957.12.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-957.12.1.el7.noarch.rpm kernel-doc-3.10.0-957.12.1.el7.noarch.rpm x86_64: bpftool-3.10.0-957.12.1.el7.x86_64.rpm kernel-3.10.0-957.12.1.el7.x86_64.rpm kernel-debug-3.10.0-957.12.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.12.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.12.1.el7.x86_64.rpm kernel-devel-3.10.0-957.12.1.el7.x86_64.rpm kernel-headers-3.10.0-957.12.1.el7.x86_64.rpm kernel-tools-3.10.0-957.12.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.12.1.el7.x86_64.rpm perf-3.10.0-957.12.1.el7.x86_64.rpm perf-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm python-perf-3.10.0-957.12.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.12.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.12.1.el7.x86_64.rpm perf-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: kernel-3.10.0-957.12.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-957.12.1.el7.noarch.rpm kernel-doc-3.10.0-957.12.1.el7.noarch.rpm x86_64: bpftool-3.10.0-957.12.1.el7.x86_64.rpm kernel-3.10.0-957.12.1.el7.x86_64.rpm kernel-debug-3.10.0-957.12.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.12.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.12.1.el7.x86_64.rpm kernel-devel-3.10.0-957.12.1.el7.x86_64.rpm kernel-headers-3.10.0-957.12.1.el7.x86_64.rpm kernel-tools-3.10.0-957.12.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.12.1.el7.x86_64.rpm perf-3.10.0-957.12.1.el7.x86_64.rpm perf-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm python-perf-3.10.0-957.12.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.12.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.12.1.el7.x86_64.rpm perf-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: kernel-3.10.0-957.12.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-957.12.1.el7.noarch.rpm kernel-doc-3.10.0-957.12.1.el7.noarch.rpm ppc64: kernel-3.10.0-957.12.1.el7.ppc64.rpm kernel-bootwrapper-3.10.0-957.12.1.el7.ppc64.rpm kernel-debug-3.10.0-957.12.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-957.12.1.el7.ppc64.rpm kernel-debug-devel-3.10.0-957.12.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-957.12.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-957.12.1.el7.ppc64.rpm kernel-devel-3.10.0-957.12.1.el7.ppc64.rpm kernel-headers-3.10.0-957.12.1.el7.ppc64.rpm kernel-tools-3.10.0-957.12.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-957.12.1.el7.ppc64.rpm kernel-tools-libs-3.10.0-957.12.1.el7.ppc64.rpm perf-3.10.0-957.12.1.el7.ppc64.rpm perf-debuginfo-3.10.0-957.12.1.el7.ppc64.rpm python-perf-3.10.0-957.12.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-957.12.1.el7.ppc64.rpm ppc64le: kernel-3.10.0-957.12.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-957.12.1.el7.ppc64le.rpm kernel-debug-3.10.0-957.12.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-957.12.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-957.12.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-957.12.1.el7.ppc64le.rpm kernel-devel-3.10.0-957.12.1.el7.ppc64le.rpm kernel-headers-3.10.0-957.12.1.el7.ppc64le.rpm kernel-tools-3.10.0-957.12.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-957.12.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-957.12.1.el7.ppc64le.rpm perf-3.10.0-957.12.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-957.12.1.el7.ppc64le.rpm python-perf-3.10.0-957.12.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-957.12.1.el7.ppc64le.rpm s390x: kernel-3.10.0-957.12.1.el7.s390x.rpm kernel-debug-3.10.0-957.12.1.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-957.12.1.el7.s390x.rpm kernel-debug-devel-3.10.0-957.12.1.el7.s390x.rpm kernel-debuginfo-3.10.0-957.12.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-957.12.1.el7.s390x.rpm kernel-devel-3.10.0-957.12.1.el7.s390x.rpm kernel-headers-3.10.0-957.12.1.el7.s390x.rpm kernel-kdump-3.10.0-957.12.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-957.12.1.el7.s390x.rpm kernel-kdump-devel-3.10.0-957.12.1.el7.s390x.rpm perf-3.10.0-957.12.1.el7.s390x.rpm perf-debuginfo-3.10.0-957.12.1.el7.s390x.rpm python-perf-3.10.0-957.12.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-957.12.1.el7.s390x.rpm x86_64: bpftool-3.10.0-957.12.1.el7.x86_64.rpm kernel-3.10.0-957.12.1.el7.x86_64.rpm kernel-debug-3.10.0-957.12.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.12.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.12.1.el7.x86_64.rpm kernel-devel-3.10.0-957.12.1.el7.x86_64.rpm kernel-headers-3.10.0-957.12.1.el7.x86_64.rpm kernel-tools-3.10.0-957.12.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.12.1.el7.x86_64.rpm perf-3.10.0-957.12.1.el7.x86_64.rpm perf-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm python-perf-3.10.0-957.12.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: kernel-debug-debuginfo-3.10.0-957.12.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-957.12.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-957.12.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-957.12.1.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-957.12.1.el7.ppc64.rpm perf-debuginfo-3.10.0-957.12.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-957.12.1.el7.ppc64.rpm ppc64le: kernel-debug-debuginfo-3.10.0-957.12.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-957.12.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-957.12.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-957.12.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-957.12.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-957.12.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-957.12.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-957.12.1.el7.ppc64le.rpm x86_64: kernel-debug-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.12.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.12.1.el7.x86_64.rpm perf-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: kernel-3.10.0-957.12.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-957.12.1.el7.noarch.rpm kernel-doc-3.10.0-957.12.1.el7.noarch.rpm x86_64: bpftool-3.10.0-957.12.1.el7.x86_64.rpm kernel-3.10.0-957.12.1.el7.x86_64.rpm kernel-debug-3.10.0-957.12.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.12.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.12.1.el7.x86_64.rpm kernel-devel-3.10.0-957.12.1.el7.x86_64.rpm kernel-headers-3.10.0-957.12.1.el7.x86_64.rpm kernel-tools-3.10.0-957.12.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.12.1.el7.x86_64.rpm perf-3.10.0-957.12.1.el7.x86_64.rpm perf-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm python-perf-3.10.0-957.12.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.12.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.12.1.el7.x86_64.rpm perf-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.12.1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-6974 https://access.redhat.com/security/cve/CVE-2019-7221 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXL8hr9zjgjWX9erEAQhpRA//SO28D0BzCiZeNMWg7p//rAc9DGgsNxnq CMBTE2lJGOOt0DXTAw9Y3h/p46aA1UUbGmjUtL/Vvu0RUpuuPTOa3hzviavXVGBu PLh+QHRw9E9NBi90T24R2M0CeuUCVDn2UUqIWia7d5bb3VuS6zCjP8cq9bBa7kBN /bpYXeCv38pLGDU2H8P8N7EY4pFJBXp7CpiuLvsMgxNfUlxEZh913BfStDHWJAg2 yi9NdCNtG+3hFB3LhLEedYTGxfZmuNBp8K9D6en1RryideGeyyjGiKKShRGclD+o KOnuXrPuHdS5fO1ci8FzymQapQSzUWjuwYXmqFAaPLLOGesGgb1wiCKgqLN3+3Oy jjlDtD8lkiZDNwDRs27WOkQMzsV/+J0cUAQOoP0KbetSQSJuRLXD0Kkss0c8kpO6 W7YVpwVnMioe0jFtpNu8OtjIgsTRycZ+Z01Mr7U/gH9J7i5Dysvtil+2i2xBPnM5 +vLPIDzreB+pbG5BPrIUgM/CkYh5Yltq4nbiifhWXdSxR/t0a06in60SbDezB6Lt SnQavsmJSZBQ5iEhQABcMNChZPeZj1N5haC4ZFP8XD9gJLZyrNqL1tBLzVr4xhzx +4Trsi6td3ZuQe0wdX2rS07oIk6Tjc2yxNaiGMvM4NPYt4ZOswZvyQYk4QPJ2VRN zd1Qi+4M27U=IoLu -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 7) - aarch64, noarch, ppc64le 3. Bug Fix(es): * [kernel-alt]: BUG: unable to handle kernel NULL pointer IP: crypto_remove_spawns+0x118/0x2e0 (BZ#1536967) * [HPE Apache] update ssif max_xmit_msg_size limit for multi-part messages (BZ#1610534) * RHEL-Alt-7.6 - powerpc/pseries: Fix unitialized timer reset on migration / powerpc/pseries/mobility: Extend start/stop topology update scope (LPM) (BZ#1673613) * RHEL-Alt-7.6 - s390: sha3_generic module fails and triggers panic when in FIPS mode (BZ#1673979) * RHEL-Alt-7.6 - System crashed after oom - During ICP deployment (BZ#1710304) * kernel-alt: Race condition in hashtables [rhel-alt-7.6.z] (BZ#1712127) * RHEL-Alt-7.6 - OP930:PM_Test:cpupower -r command set values for first 3 cores in quad and misses last core. (CORAL) (BZ#1717836) * RHEL-Alt-7.6 - disable runtime NUMA remapping for PRRN/LPM/VPHN (BZ#1717906) * fragmented packets timing out (BZ#1729066) * Backport TCP follow-up for small buffers (BZ#1733617) Enhancement(s): * RHEL-Alt-7.6 - perfevent PMDA cannot create file descriptors for reading nest events using the perf API (pcp/kernel) (CORAL) (BZ#1723036) 4

Trust: 1.89

sources: NVD: CVE-2019-6974 // VULHUB: VHN-158409 // VULMON: CVE-2019-6974 // PACKETSTORM: 152379 // PACKETSTORM: 152369 // PACKETSTORM: 155466 // PACKETSTORM: 152377 // PACKETSTORM: 152375 // PACKETSTORM: 152593 // PACKETSTORM: 152598 // PACKETSTORM: 152380 // PACKETSTORM: 154553

AFFECTED PRODUCTS

vendor:f5model:big-ip webacceleratorscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:15.1.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.10

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.20

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:15.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.6

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.9.156

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:15.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:7.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.10

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:13.1.1

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:13.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:15.1.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.10

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:15.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.6

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:14.0.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:14.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.4

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:14.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.18.136

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:15.1.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.19.21

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:14.0.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:13.0.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.16.64

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:14.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.20.8

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:13.1.1

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:14.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.6

Trust: 1.0

vendor:redhatmodel:openshift container platformscope:eqversion:3.11

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:15.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.4.176

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:15.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.5

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:14.1.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.15

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:14.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:14.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.17

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.14.99

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:15.1.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.5

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:15.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.4

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:14.1.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.19

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:13.1.1

Trust: 1.0

sources: NVD: CVE-2019-6974

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-6974
value: HIGH

Trust: 1.0

CNNVD: CNNVD-201902-612
value: HIGH

Trust: 0.6

VULHUB: VHN-158409
value: MEDIUM

Trust: 0.1

VULMON: CVE-2019-6974
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-6974
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-158409
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-6974
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-158409 // VULMON: CVE-2019-6974 // CNNVD: CNNVD-201902-612 // NVD: CVE-2019-6974

PROBLEMTYPE DATA

problemtype:CWE-362

Trust: 1.1

problemtype:CWE-416

Trust: 1.0

sources: VULHUB: VHN-158409 // NVD: CVE-2019-6974

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201902-612

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201902-612

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-158409 // VULMON: CVE-2019-6974

PATCH

title:Linux kernel Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=89404

Trust: 0.6

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20190818 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel-rt security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20190833 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20200103 - Security Advisory

Trust: 0.1

title:Red Hat: CVE-2019-6974url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2019-6974

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20193967 - Security Advisory

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2019-6974

Trust: 0.1

title:Amazon Linux AMI: ALAS-2019-1165url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2019-1165

Trust: 0.1

title:Amazon Linux 2: ALAS2-2019-1165url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2019-1165

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3933-1

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM QRadar Network Security is affected by Linux kernel vulnerabilities (CVE-2019-7221, CVE-2019-6974, CVE-2018-17972, CVE-2018-9568)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=3834ad0670b59206d9d7424b96a80d4a

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-trusty vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3933-2

Trust: 0.1

title:Ubuntu Security Notice: linux-hwe, linux-aws-hwe, linux-azure, linux-gcp, linux-oracle vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3931-2

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-aws, linux-gcp, linux-kvm, linux-oem, linux-oracle, linux-raspi2 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3931-1

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-raspi2 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3930-1

Trust: 0.1

title:Ubuntu Security Notice: linux-hwe, linux-azure vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3930-2

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - April 2019url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=0cf12ffad0c479958deb0741d0970b4e

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-xenial, linux-aws vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3932-2

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3932-1

Trust: 0.1

title:IBM: IBM Security Bulletin: Vulnerabilities in the Linux Kernel affect PowerKVMurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=3e8fb0a522dbdc0368aab05e3c3fb62c

Trust: 0.1

title:Paper310url:https://github.com/Sec20-Paper310/Paper310

Trust: 0.1

title:cve_diff_checkerurl:https://github.com/lcatro/cve_diff_checker

Trust: 0.1

title: - url:https://github.com/vincent-deng/veracode-container-security-finding-parser

Trust: 0.1

sources: VULMON: CVE-2019-6974 // CNNVD: CNNVD-201902-612

EXTERNAL IDS

db:NVDid:CVE-2019-6974

Trust: 2.7

db:BIDid:107127

Trust: 1.8

db:EXPLOIT-DBid:46388

Trust: 1.8

db:PACKETSTORMid:151690

Trust: 0.7

db:CNNVDid:CNNVD-201902-612

Trust: 0.7

db:PACKETSTORMid:155466

Trust: 0.7

db:PACKETSTORMid:155951

Trust: 0.6

db:AUSCERTid:ESB-2019.0675

Trust: 0.6

db:AUSCERTid:ESB-2019.0927.3

Trust: 0.6

db:AUSCERTid:ESB-2020.0151

Trust: 0.6

db:AUSCERTid:ESB-2019.4349

Trust: 0.6

db:AUSCERTid:ESB-2019.4486

Trust: 0.6

db:PACKETSTORMid:152598

Trust: 0.2

db:PACKETSTORMid:152593

Trust: 0.2

db:VULHUBid:VHN-158409

Trust: 0.1

db:VULMONid:CVE-2019-6974

Trust: 0.1

db:PACKETSTORMid:152379

Trust: 0.1

db:PACKETSTORMid:152369

Trust: 0.1

db:PACKETSTORMid:152377

Trust: 0.1

db:PACKETSTORMid:152375

Trust: 0.1

db:PACKETSTORMid:152380

Trust: 0.1

db:PACKETSTORMid:154553

Trust: 0.1

sources: VULHUB: VHN-158409 // VULMON: CVE-2019-6974 // PACKETSTORM: 152379 // PACKETSTORM: 152369 // PACKETSTORM: 155466 // PACKETSTORM: 152377 // PACKETSTORM: 152375 // PACKETSTORM: 152593 // PACKETSTORM: 152598 // PACKETSTORM: 152380 // PACKETSTORM: 154553 // CNNVD: CNNVD-201902-612 // NVD: CVE-2019-6974

REFERENCES

url:https://access.redhat.com/errata/rhsa-2019:3967

Trust: 2.5

url:http://www.securityfocus.com/bid/107127

Trust: 2.4

url:https://support.f5.com/csp/article/k11186236

Trust: 2.4

url:https://access.redhat.com/errata/rhsa-2020:0103

Trust: 2.4

url:https://access.redhat.com/errata/rhsa-2019:0818

Trust: 2.0

url:https://access.redhat.com/errata/rhsa-2019:0833

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2019:2809

Trust: 1.9

url:https://usn.ubuntu.com/3933-1/

Trust: 1.9

url:https://www.exploit-db.com/exploits/46388/

Trust: 1.8

url:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cfa39381173d5f969daf43582c95ad679189cbc9

Trust: 1.8

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.19.21

Trust: 1.8

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.20.8

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html

Trust: 1.8

url:https://access.redhat.com/errata/rhba-2019:0959

Trust: 1.8

url:https://usn.ubuntu.com/3930-1/

Trust: 1.8

url:https://usn.ubuntu.com/3930-2/

Trust: 1.8

url:https://usn.ubuntu.com/3931-1/

Trust: 1.8

url:https://usn.ubuntu.com/3931-2/

Trust: 1.8

url:https://usn.ubuntu.com/3932-1/

Trust: 1.8

url:https://usn.ubuntu.com/3932-2/

Trust: 1.8

url:https://usn.ubuntu.com/3933-2/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-6974

Trust: 1.5

url:https://bugs.chromium.org/p/project-zero/issues/detail?id=1765

Trust: 1.2

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.14.99

Trust: 1.2

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.9.156

Trust: 1.2

url:https://github.com/torvalds/linux/commit/cfa39381173d5f969daf43582c95ad679189cbc9

Trust: 1.2

url:https://support.f5.com/csp/article/k11186236?utm_source=f5support&amp%3butm_medium=rss

Trust: 1.1

url:https://access.redhat.com/security/cve/cve-2019-6974

Trust: 1.0

url:https://www.exploit-db.com/exploits/46388

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-7221

Trust: 0.6

url:https://support.f5.com/csp/article/k11186236?utm_source=f5support&utm_medium=rss

Trust: 0.6

url:https://github.com/torvalds/linux/commit/cfa39381173d5f969daf43582c95ad679189cbc9exploitpatchthird party advisory

Trust: 0.6

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.9.156vendor advisory

Trust: 0.6

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.20.8vendor advisory

Trust: 0.6

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.19.21vendor advisory

Trust: 0.6

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.14.99vendor advisory

Trust: 0.6

url:https://bugs.chromium.org/p/project-zero/issues/detail?id=1765exploitmailing listpatchthird party advisory

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20190683-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20190541-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0151/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/77542

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4349/

Trust: 0.6

url:https://packetstormsecurity.com/files/155951/red-hat-security-advisory-2020-0103-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/76474

Trust: 0.6

url:https://packetstormsecurity.com/files/151690/linux-kvm/ioctl/create/device-reference-flow-failure.html

Trust: 0.6

url:https://vigilance.fr/vulnerability/linux-kernel-privilege-escalation-via-kvm-ioctl-create-device-28494

Trust: 0.6

url:https://packetstormsecurity.com/files/155466/red-hat-security-advisory-2019-3967-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4486/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-9213

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-7222

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.4

url:https://access.redhat.com/articles/11258

Trust: 0.4

url:https://access.redhat.com/security/team/contact/

Trust: 0.4

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://bugzilla.redhat.com/):

Trust: 0.4

url:https://access.redhat.com/security/team/key/

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2018-19824

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-7221

Trust: 0.3

url:https://usn.ubuntu.com/usn/usn-3933-1

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-18360

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-1000410

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-3460

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-5489

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-5489

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-3459

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-14610

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-3819

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-14616

Trust: 0.2

url:https://usn.ubuntu.com/usn/usn-3932-1

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-18249

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-14614

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-3701

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-14612

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-9517

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-16884

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-14613

Trust: 0.2

url:https://support.f5.com/csp/article/k11186236?utm_source=f5support&amp;amp;utm_medium=rss

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/362.html

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/416.html

Trust: 0.1

url:https://tools.cisco.com/security/center/viewalert.x?alertid=59645

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/sec20-paper310/paper310

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/3.13.0-168.218

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-7308

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/4.18.0-1008.9

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.18.0-1014.14

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-9162

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.18.0-1012.14

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8956

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-9003

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.18.0-17.18

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8912

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8980

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3930-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.18.0-1011.13

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.18.0-1009.9

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18208

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-18559

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10902

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-9568

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10902

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-18559

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-3900

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-18208

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-9568

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-3900

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3932-2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1040.43

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-lts-xenial/4.4.0-144.170~14.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.4.0-145.171

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1106.114

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1043.49

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1079.89

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1110.115

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3933-2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13272

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13272

Trust: 0.1

sources: VULHUB: VHN-158409 // VULMON: CVE-2019-6974 // PACKETSTORM: 152379 // PACKETSTORM: 152369 // PACKETSTORM: 155466 // PACKETSTORM: 152377 // PACKETSTORM: 152375 // PACKETSTORM: 152593 // PACKETSTORM: 152598 // PACKETSTORM: 152380 // PACKETSTORM: 154553 // CNNVD: CNNVD-201902-612 // NVD: CVE-2019-6974

CREDITS

Google Security Research,Red Hat,The vendor reported this issue.,Jann Horn

Trust: 0.6

sources: CNNVD: CNNVD-201902-612

SOURCES

db:VULHUBid:VHN-158409
db:VULMONid:CVE-2019-6974
db:PACKETSTORMid:152379
db:PACKETSTORMid:152369
db:PACKETSTORMid:155466
db:PACKETSTORMid:152377
db:PACKETSTORMid:152375
db:PACKETSTORMid:152593
db:PACKETSTORMid:152598
db:PACKETSTORMid:152380
db:PACKETSTORMid:154553
db:CNNVDid:CNNVD-201902-612
db:NVDid:CVE-2019-6974

LAST UPDATE DATE

2024-11-20T19:25:52.708000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-158409date:2020-10-15T00:00:00
db:VULMONid:CVE-2019-6974date:2023-11-07T00:00:00
db:CNNVDid:CNNVD-201902-612date:2022-04-06T00:00:00
db:NVDid:CVE-2019-6974date:2023-11-07T03:13:16.310

SOURCES RELEASE DATE

db:VULHUBid:VHN-158409date:2019-02-15T00:00:00
db:VULMONid:CVE-2019-6974date:2019-02-15T00:00:00
db:PACKETSTORMid:152379date:2019-04-03T17:17:48
db:PACKETSTORMid:152369date:2019-04-03T17:11:08
db:PACKETSTORMid:155466date:2019-11-26T17:21:57
db:PACKETSTORMid:152377date:2019-04-03T17:16:18
db:PACKETSTORMid:152375date:2019-04-03T17:14:29
db:PACKETSTORMid:152593date:2019-04-23T16:28:16
db:PACKETSTORMid:152598date:2019-04-23T16:28:55
db:PACKETSTORMid:152380date:2019-04-03T17:18:08
db:PACKETSTORMid:154553date:2019-09-20T15:08:09
db:CNNVDid:CNNVD-201902-612date:2019-02-07T00:00:00
db:NVDid:CVE-2019-6974date:2019-02-15T15:29:00.250