[RHSA-2019:1891] kernel-rt security and bug fix update
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884)
kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation (CVE-2019-11085)
kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)
kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c (CVE-2019-11811)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- kernel-rt: update to the RHEL7.6.z batch#6 source tree (BZ#1718400)
Package | Affected Version |
---|---|
pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-7 | < 3.10.0-957.27.2.rt56.940.el7 |
pkg:rpm/redhat/kernel-rt-trace?arch=x86_64&distro=redhat-7 | < 3.10.0-957.27.2.rt56.940.el7 |
pkg:rpm/redhat/kernel-rt-trace-kvm?arch=x86_64&distro=redhat-7 | < 3.10.0-957.27.2.rt56.940.el7 |
pkg:rpm/redhat/kernel-rt-trace-devel?arch=x86_64&distro=redhat-7 | < 3.10.0-957.27.2.rt56.940.el7 |
pkg:rpm/redhat/kernel-rt-kvm?arch=x86_64&distro=redhat-7 | < 3.10.0-957.27.2.rt56.940.el7 |
pkg:rpm/redhat/kernel-rt-doc?distro=redhat-7 | < 3.10.0-957.27.2.rt56.940.el7 |
pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-7 | < 3.10.0-957.27.2.rt56.940.el7 |
pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-7 | < 3.10.0-957.27.2.rt56.940.el7 |
pkg:rpm/redhat/kernel-rt-debug-kvm?arch=x86_64&distro=redhat-7 | < 3.10.0-957.27.2.rt56.940.el7 |
pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-7 | < 3.10.0-957.27.2.rt56.940.el7 |
- ID
- RHSA-2019:1891
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2019:1891
- Published
-
2019-07-29T00:00:00
(5 years ago) - Modified
-
2019-07-29T00:00:00
(5 years ago) - Rights
- Copyright 2019 Red Hat, Inc.
- Other Advisories
-
- ALAS-2019-1149
- ALAS2-2019-1149
- ELSA-2019-1873
- ELSA-2019-1959
- ELSA-2019-3517
- ELSA-2019-4746
- ELSA-2020-1769
- ELSA-2020-5841
- ELSA-2020-5845
- ELSA-2020-5866
- FEDORA-2019-20a89ca9af
- openSUSE-SU-2019:0065-1
- openSUSE-SU-2019:1479-1
- openSUSE-SU-2019:1579-1
- openSUSE-SU-2019:1716-1
- openSUSE-SU-2019:1757-1
- RHSA-2019:1873
- RHSA-2019:1959
- RHSA-2019:1971
- RHSA-2019:3309
- RHSA-2019:3517
- RHSA-2020:1567
- RHSA-2020:1769
- SSA:2019-030-01
- SUSE-SU-2019:0148-1
- SUSE-SU-2019:0150-1
- SUSE-SU-2019:0196-1
- SUSE-SU-2019:0222-1
- SUSE-SU-2019:0224-1
- SUSE-SU-2019:0236-1
- SUSE-SU-2019:0298-1
- SUSE-SU-2019:0320-1
- SUSE-SU-2019:0326-1
- SUSE-SU-2019:0356-1
- SUSE-SU-2019:0439-1
- SUSE-SU-2019:0541-1
- SUSE-SU-2019:1289-1
- SUSE-SU-2019:1529-1
- SUSE-SU-2019:1530-1
- SUSE-SU-2019:1535-1
- SUSE-SU-2019:1536-1
- SUSE-SU-2019:1550-1
- SUSE-SU-2019:1581-1
- SUSE-SU-2019:1674-1
- SUSE-SU-2019:1744-1
- SUSE-SU-2019:1829-1
- SUSE-SU-2019:1851-1
- SUSE-SU-2019:1855-1
- SUSE-SU-2019:2069-1
- SUSE-SU-2019:2430-1
- SUSE-SU-2019:2450-1
- SUSE-SU-2019:3223-1
- SUSE-SU-2019:3246-1
- SUSE-SU-2019:3252-1
- USN-3932-1
- USN-3932-2
- USN-3980-1
- USN-3980-2
- USN-3981-1
- USN-3981-2
- USN-4068-1
- USN-4068-2
- USN-4118-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 1655162 | https://bugzilla.redhat.com/1655162 | |
Bugzilla | 1660375 | https://bugzilla.redhat.com/1660375 | |
Bugzilla | 1709180 | https://bugzilla.redhat.com/1709180 | |
Bugzilla | 1710405 | https://bugzilla.redhat.com/1710405 | |
RHSA | RHSA-2019:1891 | https://access.redhat.com/errata/RHSA-2019:1891 | |
CVE | CVE-2018-16871 | https://access.redhat.com/security/cve/CVE-2018-16871 | |
CVE | CVE-2018-16884 | https://access.redhat.com/security/cve/CVE-2018-16884 | |
CVE | CVE-2019-11085 | https://access.redhat.com/security/cve/CVE-2019-11085 | |
CVE | CVE-2019-11811 | https://access.redhat.com/security/cve/CVE-2019-11811 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-7 | redhat | kernel-rt | < 3.10.0-957.27.2.rt56.940.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-trace?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-trace | < 3.10.0-957.27.2.rt56.940.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-trace-kvm?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-trace-kvm | < 3.10.0-957.27.2.rt56.940.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-trace-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-trace-devel | < 3.10.0-957.27.2.rt56.940.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-kvm?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-kvm | < 3.10.0-957.27.2.rt56.940.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-doc?distro=redhat-7 | redhat | kernel-rt-doc | < 3.10.0-957.27.2.rt56.940.el7 | redhat-7 | ||
Affected | pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-devel | < 3.10.0-957.27.2.rt56.940.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-debug | < 3.10.0-957.27.2.rt56.940.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-kvm?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-debug-kvm | < 3.10.0-957.27.2.rt56.940.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-debug-devel | < 3.10.0-957.27.2.rt56.940.el7 | redhat-7 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |