[RHSA-2019:0415] kernel security and bug fix update
Severity
Important
Affected Packages
34
CVEs
1
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: MIDI driver race condition leads to a double-free (CVE-2018-10902)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- Previously backported upstream patch caused a change in the behavior of page fault handler. As a consequence, applications compiled through GNU Compiler Collection (GCC) version 4.4.7 sometimes generated stack access exceeding the 64K limit. Running such applications subsequently triggered a segmentation fault. With this update, the 64k limit check in the page fault handler has been removed. As a result, running the affected applications no longer triggers the segmentation fault in the described scenario.
Note that removing the limit check does not impact the integrity of the kernel itself. (BZ#1644401)
- ID
- RHSA-2019:0415
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2019:0415
- Published
-
2019-02-26T00:00:00
(5 years ago) - Modified
-
2019-02-26T00:00:00
(5 years ago) - Rights
- Copyright 2019 Red Hat, Inc.
- Other Advisories
-
- DSA-4308-1
- ELSA-2018-3083
- ELSA-2018-4299
- ELSA-2018-4300
- ELSA-2019-0415
- ELSA-2019-4316
- RHSA-2018:3083
- RHSA-2018:3096
- SUSE-SU-2018:2538-1
- SUSE-SU-2018:2539-1
- SUSE-SU-2018:2775-1
- SUSE-SU-2018:2776-1
- SUSE-SU-2018:2787-1
- SUSE-SU-2018:2858-1
- SUSE-SU-2018:2860-1
- SUSE-SU-2018:2862-1
- SUSE-SU-2018:2864-1
- SUSE-SU-2018:2879-1
- SUSE-SU-2018:2907-1
- SUSE-SU-2018:2908-1
- SUSE-SU-2018:2908-2
- SUSE-SU-2018:2940-1
- SUSE-SU-2018:2960-1
- SUSE-SU-2018:2961-1
- SUSE-SU-2018:2962-1
- SUSE-SU-2018:2963-1
- SUSE-SU-2018:3029-1
- SUSE-SU-2018:3083-1
- SUSE-SU-2018:3084-1
- SUSE-SU-2018:3088-1
- SUSE-SU-2018:3961-1
- SUSE-SU-2021:0452-1
- USN-3776-1
- USN-3776-2
- USN-3847-1
- USN-3847-2
- USN-3847-3
- USN-3849-1
- USN-3849-2
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 1590720 | https://bugzilla.redhat.com/1590720 | |
RHSA | RHSA-2019:0415 | https://access.redhat.com/errata/RHSA-2019:0415 | |
CVE | CVE-2018-10902 | https://access.redhat.com/security/cve/CVE-2018-10902 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/python-perf?arch=x86_64&distro=redhat-6 | redhat | python-perf | < 2.6.32-754.11.1.el6 | redhat-6 | x86_64 | |
Affected | pkg:rpm/redhat/python-perf?arch=s390x&distro=redhat-6 | redhat | python-perf | < 2.6.32-754.11.1.el6 | redhat-6 | s390x | |
Affected | pkg:rpm/redhat/python-perf?arch=ppc64&distro=redhat-6 | redhat | python-perf | < 2.6.32-754.11.1.el6 | redhat-6 | ppc64 | |
Affected | pkg:rpm/redhat/python-perf?arch=i686&distro=redhat-6 | redhat | python-perf | < 2.6.32-754.11.1.el6 | redhat-6 | i686 | |
Affected | pkg:rpm/redhat/perf?arch=x86_64&distro=redhat-6 | redhat | perf | < 2.6.32-754.11.1.el6 | redhat-6 | x86_64 | |
Affected | pkg:rpm/redhat/perf?arch=s390x&distro=redhat-6 | redhat | perf | < 2.6.32-754.11.1.el6 | redhat-6 | s390x | |
Affected | pkg:rpm/redhat/perf?arch=ppc64&distro=redhat-6 | redhat | perf | < 2.6.32-754.11.1.el6 | redhat-6 | ppc64 | |
Affected | pkg:rpm/redhat/perf?arch=i686&distro=redhat-6 | redhat | perf | < 2.6.32-754.11.1.el6 | redhat-6 | i686 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-6 | redhat | kernel | < 2.6.32-754.11.1.el6 | redhat-6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=s390x&distro=redhat-6 | redhat | kernel | < 2.6.32-754.11.1.el6 | redhat-6 | s390x | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64&distro=redhat-6 | redhat | kernel | < 2.6.32-754.11.1.el6 | redhat-6 | ppc64 | |
Affected | pkg:rpm/redhat/kernel?arch=i686&distro=redhat-6 | redhat | kernel | < 2.6.32-754.11.1.el6 | redhat-6 | i686 | |
Affected | pkg:rpm/redhat/kernel-kdump?arch=s390x&distro=redhat-6 | redhat | kernel-kdump | < 2.6.32-754.11.1.el6 | redhat-6 | s390x | |
Affected | pkg:rpm/redhat/kernel-kdump-devel?arch=s390x&distro=redhat-6 | redhat | kernel-kdump-devel | < 2.6.32-754.11.1.el6 | redhat-6 | s390x | |
Affected | pkg:rpm/redhat/kernel-headers?arch=x86_64&distro=redhat-6 | redhat | kernel-headers | < 2.6.32-754.11.1.el6 | redhat-6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-headers?arch=s390x&distro=redhat-6 | redhat | kernel-headers | < 2.6.32-754.11.1.el6 | redhat-6 | s390x | |
Affected | pkg:rpm/redhat/kernel-headers?arch=ppc64&distro=redhat-6 | redhat | kernel-headers | < 2.6.32-754.11.1.el6 | redhat-6 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-headers?arch=i686&distro=redhat-6 | redhat | kernel-headers | < 2.6.32-754.11.1.el6 | redhat-6 | i686 | |
Affected | pkg:rpm/redhat/kernel-firmware?distro=redhat-6 | redhat | kernel-firmware | < 2.6.32-754.11.1.el6 | redhat-6 | ||
Affected | pkg:rpm/redhat/kernel-doc?distro=redhat-6 | redhat | kernel-doc | < 2.6.32-754.11.1.el6 | redhat-6 | ||
Affected | pkg:rpm/redhat/kernel-devel?arch=x86_64&distro=redhat-6 | redhat | kernel-devel | < 2.6.32-754.11.1.el6 | redhat-6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-devel?arch=s390x&distro=redhat-6 | redhat | kernel-devel | < 2.6.32-754.11.1.el6 | redhat-6 | s390x | |
Affected | pkg:rpm/redhat/kernel-devel?arch=ppc64&distro=redhat-6 | redhat | kernel-devel | < 2.6.32-754.11.1.el6 | redhat-6 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-devel?arch=i686&distro=redhat-6 | redhat | kernel-devel | < 2.6.32-754.11.1.el6 | redhat-6 | i686 | |
Affected | pkg:rpm/redhat/kernel-debug?arch=x86_64&distro=redhat-6 | redhat | kernel-debug | < 2.6.32-754.11.1.el6 | redhat-6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug?arch=s390x&distro=redhat-6 | redhat | kernel-debug | < 2.6.32-754.11.1.el6 | redhat-6 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug?arch=ppc64&distro=redhat-6 | redhat | kernel-debug | < 2.6.32-754.11.1.el6 | redhat-6 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-debug?arch=i686&distro=redhat-6 | redhat | kernel-debug | < 2.6.32-754.11.1.el6 | redhat-6 | i686 | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=x86_64&distro=redhat-6 | redhat | kernel-debug-devel | < 2.6.32-754.11.1.el6 | redhat-6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=s390x&distro=redhat-6 | redhat | kernel-debug-devel | < 2.6.32-754.11.1.el6 | redhat-6 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=ppc64&distro=redhat-6 | redhat | kernel-debug-devel | < 2.6.32-754.11.1.el6 | redhat-6 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=i686&distro=redhat-6 | redhat | kernel-debug-devel | < 2.6.32-754.11.1.el6 | redhat-6 | i686 | |
Affected | pkg:rpm/redhat/kernel-bootwrapper?arch=ppc64&distro=redhat-6 | redhat | kernel-bootwrapper | < 2.6.32-754.11.1.el6 | redhat-6 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-abi-whitelists?distro=redhat-6 | redhat | kernel-abi-whitelists | < 2.6.32-754.11.1.el6 | redhat-6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |