[RHSA-2019:3835] kernel-rt security update
Severity
Important
Affected Packages
10
CVEs
3
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)
hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)
hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-7 | < 3.10.0-1062.4.2.rt56.1028.el7 |
pkg:rpm/redhat/kernel-rt-trace?arch=x86_64&distro=redhat-7 | < 3.10.0-1062.4.2.rt56.1028.el7 |
pkg:rpm/redhat/kernel-rt-trace-kvm?arch=x86_64&distro=redhat-7 | < 3.10.0-1062.4.2.rt56.1028.el7 |
pkg:rpm/redhat/kernel-rt-trace-devel?arch=x86_64&distro=redhat-7 | < 3.10.0-1062.4.2.rt56.1028.el7 |
pkg:rpm/redhat/kernel-rt-kvm?arch=x86_64&distro=redhat-7 | < 3.10.0-1062.4.2.rt56.1028.el7 |
pkg:rpm/redhat/kernel-rt-doc?distro=redhat-7 | < 3.10.0-1062.4.2.rt56.1028.el7 |
pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-7 | < 3.10.0-1062.4.2.rt56.1028.el7 |
pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-7 | < 3.10.0-1062.4.2.rt56.1028.el7 |
pkg:rpm/redhat/kernel-rt-debug-kvm?arch=x86_64&distro=redhat-7 | < 3.10.0-1062.4.2.rt56.1028.el7 |
pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-7 | < 3.10.0-1062.4.2.rt56.1028.el7 |
- ID
- RHSA-2019:3835
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2019:3835
- Published
-
2019-11-12T00:00:00
(4 years ago) - Modified
-
2019-11-12T00:00:00
(4 years ago) - Rights
- Copyright 2019 Red Hat, Inc.
- Other Advisories
-
- ALAS-2019-1318
- ALAS-2019-1322
- ALAS2-2019-1364
- ALAS2-2019-1366
- ALPINE:CVE-2018-12207
- ALPINE:CVE-2019-11135
- ALSA-2020:0279
- ASA-201911-14
- DSA-4564-1
- DSA-4565-1
- DSA-4602-1
- ELSA-2019-3832
- ELSA-2019-3834
- ELSA-2019-3836
- ELSA-2019-4836
- ELSA-2019-4837
- ELSA-2019-4838
- ELSA-2019-4839
- ELSA-2019-4850
- ELSA-2019-4854
- ELSA-2019-4855
- ELSA-2019-4867
- ELSA-2019-4868
- ELSA-2020-0279
- ELSA-2020-0366
- ELSA-2020-5533
- FEDORA-2019-021c968423
- FEDORA-2019-124a241044
- FEDORA-2019-1689d3fe07
- FEDORA-2019-2e12bd3a9a
- FEDORA-2019-34a75d7e61
- FEDORA-2019-376ec5c107
- FEDORA-2019-39e97683e8
- FEDORA-2019-3d7105bd2a
- FEDORA-2019-68d7f68507
- FEDORA-2019-6aad703290
- FEDORA-2019-7a3fc17778
- FEDORA-2019-8846a1a5a2
- FEDORA-2019-91f6e7bb71
- FEDORA-2019-b737d03b83
- FEDORA-2019-b86a7bdba0
- FEDORA-2019-cbb732f760
- FEDORA-2020-203ffedeb5
- FEDORA-2020-227a4c0530
- FEDORA-2020-2a5cdd665c
- FEDORA-2020-2d9a75fadb
- FEDORA-2020-3cd64d683c
- FEDORA-2020-8490989850
- FEDORA-2020-c2d89d14d0
- FEDORA-2020-e328697628
- FEDORA-2020-f884f9dd7d
- FEDORA-2020-fe00e12580
- FREEBSD:ECB7FDEC-0B82-11EA-874D-0C9D925BBBC0
- FREEBSD:EDC0BF7E-05A1-11EA-9DFA-F8B156AC3FF9
- FREEBSD:FBE10A8A-05A1-11EA-9DFA-F8B156AC3FF9
- GLSA-202003-56
- MS:CVE-2018-12207
- MS:CVE-2019-11135
- openSUSE-SU-2019:2503-1
- openSUSE-SU-2019:2504-1
- openSUSE-SU-2019:2505-1
- openSUSE-SU-2019:2506-1
- openSUSE-SU-2019:2507-1
- openSUSE-SU-2019:2509-1
- openSUSE-SU-2019:2510-1
- openSUSE-SU-2019:2527-1
- openSUSE-SU-2019:2528-1
- openSUSE-SU-2019:2710-1
- RHSA-2019:3832
- RHSA-2019:3833
- RHSA-2019:3834
- RHSA-2019:3836
- RHSA-2019:3936
- RHSA-2020:0028
- RHSA-2020:0279
- RHSA-2020:0366
- RLSA-2020:0279
- SSA:2019-320-01
- SUSE-SU-2019:2946-1
- SUSE-SU-2019:2947-1
- SUSE-SU-2019:2948-1
- SUSE-SU-2019:2949-1
- SUSE-SU-2019:2950-1
- SUSE-SU-2019:2951-1
- SUSE-SU-2019:2952-1
- SUSE-SU-2019:2953-1
- SUSE-SU-2019:2954-1
- SUSE-SU-2019:2955-1
- SUSE-SU-2019:2956-1
- SUSE-SU-2019:2957-1
- SUSE-SU-2019:2958-1
- SUSE-SU-2019:2959-1
- SUSE-SU-2019:2960-1
- SUSE-SU-2019:2961-1
- SUSE-SU-2019:2962-1
- SUSE-SU-2019:2984-1
- SUSE-SU-2019:2986-1
- SUSE-SU-2019:2987-1
- SUSE-SU-2019:2988-1
- SUSE-SU-2019:3091-1
- SUSE-SU-2019:3200-1
- SUSE-SU-2019:3289-1
- SUSE-SU-2019:3294-1
- SUSE-SU-2019:3295-1
- SUSE-SU-2019:3297-1
- SUSE-SU-2019:3316-1
- SUSE-SU-2019:3317-1
- SUSE-SU-2019:3340-1
- SUSE-SU-2019:3348-1
- SUSE-SU-2019:3372-1
- SUSE-SU-2020:0093-1
- SUSE-SU-2020:0334-1
- SUSE-SU-2020:0388-1
- USN-4182-1
- USN-4182-2
- USN-4183-1
- USN-4184-1
- USN-4185-1
- USN-4185-2
- USN-4186-1
- USN-4186-2
- USN-4187-1
- USN-4188-1
- VMSA-2019-0020
- XSA-304
- XSA-305
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 1646768 | https://bugzilla.redhat.com/1646768 | |
Bugzilla | 1724393 | https://bugzilla.redhat.com/1724393 | |
Bugzilla | 1753062 | https://bugzilla.redhat.com/1753062 | |
RHSA | RHSA-2019:3835 | https://access.redhat.com/errata/RHSA-2019:3835 | |
CVE | CVE-2018-12207 | https://access.redhat.com/security/cve/CVE-2018-12207 | |
CVE | CVE-2019-0154 | https://access.redhat.com/security/cve/CVE-2019-0154 | |
CVE | CVE-2019-11135 | https://access.redhat.com/security/cve/CVE-2019-11135 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-7 | redhat | kernel-rt | < 3.10.0-1062.4.2.rt56.1028.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-trace?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-trace | < 3.10.0-1062.4.2.rt56.1028.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-trace-kvm?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-trace-kvm | < 3.10.0-1062.4.2.rt56.1028.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-trace-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-trace-devel | < 3.10.0-1062.4.2.rt56.1028.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-kvm?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-kvm | < 3.10.0-1062.4.2.rt56.1028.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-doc?distro=redhat-7 | redhat | kernel-rt-doc | < 3.10.0-1062.4.2.rt56.1028.el7 | redhat-7 | ||
Affected | pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-devel | < 3.10.0-1062.4.2.rt56.1028.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-debug | < 3.10.0-1062.4.2.rt56.1028.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-kvm?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-debug-kvm | < 3.10.0-1062.4.2.rt56.1028.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-debug-devel | < 3.10.0-1062.4.2.rt56.1028.el7 | redhat-7 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |