[RHSA-2018:3666] kernel-rt security and bug fix update
Severity
Moderate
Affected Packages
10
CVEs
2
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
kernel: stack-based buffer overflow in chap_server_compute_md5() in iscsi target (CVE-2018-14633)
kernel: NULL pointer dereference in af_netlink.c:__netlink_ns_capable() allows for denial of service (CVE-2018-14646)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Vincent Pelletier for reporting CVE-2018-14633 and Christian Brauner for reporting CVE-2018-14646.
Bug Fix(es):
- The kernel-rt packages have been upgraded to the 3.10.0-957.1.2 source tree, which provides a number of bug fixes over the previous version. (BZ#1632386)
Package | Affected Version |
---|---|
pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-7 | < 3.10.0-957.1.3.rt56.913.el7 |
pkg:rpm/redhat/kernel-rt-trace?arch=x86_64&distro=redhat-7 | < 3.10.0-957.1.3.rt56.913.el7 |
pkg:rpm/redhat/kernel-rt-trace-kvm?arch=x86_64&distro=redhat-7 | < 3.10.0-957.1.3.rt56.913.el7 |
pkg:rpm/redhat/kernel-rt-trace-devel?arch=x86_64&distro=redhat-7 | < 3.10.0-957.1.3.rt56.913.el7 |
pkg:rpm/redhat/kernel-rt-kvm?arch=x86_64&distro=redhat-7 | < 3.10.0-957.1.3.rt56.913.el7 |
pkg:rpm/redhat/kernel-rt-doc?distro=redhat-7 | < 3.10.0-957.1.3.rt56.913.el7 |
pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-7 | < 3.10.0-957.1.3.rt56.913.el7 |
pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-7 | < 3.10.0-957.1.3.rt56.913.el7 |
pkg:rpm/redhat/kernel-rt-debug-kvm?arch=x86_64&distro=redhat-7 | < 3.10.0-957.1.3.rt56.913.el7 |
pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-7 | < 3.10.0-957.1.3.rt56.913.el7 |
- ID
- RHSA-2018:3666
- Severity
- moderate
- URL
- https://access.redhat.com/errata/RHSA-2018:3666
- Published
-
2018-11-27T00:00:00
(5 years ago) - Modified
-
2018-11-27T00:00:00
(5 years ago) - Rights
- Copyright 2018 Red Hat, Inc.
- Other Advisories
-
- ALAS-2018-1086
- ALAS2-2018-1086
- DSA-4308-1
- ELSA-2018-3651
- ELSA-2019-4670
- FEDORA-2018-0edb45d9db
- FEDORA-2018-1621b2204a
- FEDORA-2018-2ee3411cb8
- FEDORA-2018-3857a8b41a
- FEDORA-2018-5453baa4af
- FEDORA-2018-6e8c330d50
- FEDORA-2018-94315e9a6b
- FEDORA-2018-9f4381d8c4
- FEDORA-2018-a0914af224
- FEDORA-2018-b68776e5b0
- FEDORA-2018-c0a1284064
- FEDORA-2018-ddbaca855e
- FEDORA-2019-16de0047d4
- FEDORA-2019-196ab64d65
- FEDORA-2019-1b986880ea
- FEDORA-2019-20a89ca9af
- FEDORA-2019-337484d88b
- FEDORA-2019-3da64f3e61
- FEDORA-2019-4002b91800
- FEDORA-2019-509c133845
- FEDORA-2019-65c6d11eba
- FEDORA-2019-7d3500d712
- FEDORA-2019-a6cd583a8d
- FEDORA-2019-c36afa818c
- FEDORA-2019-ce2933b003
- RHSA-2018:3651
- SSA:2019-030-01
- SUSE-SU-2018:3158-1
- SUSE-SU-2018:3159-1
- SUSE-SU-2018:3164-1
- SUSE-SU-2018:3171-1
- SUSE-SU-2018:3172-1
- SUSE-SU-2018:3173-1
- SUSE-SU-2018:3238-1
- SUSE-SU-2018:3265-1
- SUSE-SU-2018:3268-1
- SUSE-SU-2018:3272-1
- SUSE-SU-2018:3328-1
- SUSE-SU-2018:3331-1
- SUSE-SU-2018:3470-1
- SUSE-SU-2018:3618-1
- SUSE-SU-2018:3659-1
- SUSE-SU-2018:3688-1
- SUSE-SU-2018:3689-1
- SUSE-SU-2018:3746-1
- SUSE-SU-2018:3773-1
- SUSE-SU-2018:3789-1
- SUSE-SU-2018:3867-1
- SUSE-SU-2018:3869-1
- SUSE-SU-2018:3961-1
- SUSE-SU-2019:0095-1
- SUSE-SU-2019:0828-1
- SUSE-SU-2019:1289-1
- USN-3775-1
- USN-3775-2
- USN-3776-1
- USN-3776-2
- USN-3777-1
- USN-3777-2
- USN-3777-3
- USN-3779-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 1626035 | https://bugzilla.redhat.com/1626035 | |
Bugzilla | 1630124 | https://bugzilla.redhat.com/1630124 | |
RHSA | RHSA-2018:3666 | https://access.redhat.com/errata/RHSA-2018:3666 | |
CVE | CVE-2018-14633 | https://access.redhat.com/security/cve/CVE-2018-14633 | |
CVE | CVE-2018-14646 | https://access.redhat.com/security/cve/CVE-2018-14646 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-7 | redhat | kernel-rt | < 3.10.0-957.1.3.rt56.913.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-trace?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-trace | < 3.10.0-957.1.3.rt56.913.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-trace-kvm?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-trace-kvm | < 3.10.0-957.1.3.rt56.913.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-trace-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-trace-devel | < 3.10.0-957.1.3.rt56.913.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-kvm?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-kvm | < 3.10.0-957.1.3.rt56.913.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-doc?distro=redhat-7 | redhat | kernel-rt-doc | < 3.10.0-957.1.3.rt56.913.el7 | redhat-7 | ||
Affected | pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-devel | < 3.10.0-957.1.3.rt56.913.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-debug | < 3.10.0-957.1.3.rt56.913.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-kvm?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-debug-kvm | < 3.10.0-957.1.3.rt56.913.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-debug-devel | < 3.10.0-957.1.3.rt56.913.el7 | redhat-7 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |