[RHSA-2020:3016] kernel-rt security and bug fix update

Severity Important
Affected Packages 12
CVEs 9

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: use-after-free in sound/core/timer.c (CVE-2019-19807)

  • kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)

  • kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)

  • kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)

  • kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)

  • kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)

  • kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)

  • Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)

  • kernel: kvm: Information leak within a KVM guest (CVE-2019-3016)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • kernel-rt: update RT source tree to the RHEL-8.2.z2 source tree (BZ#1829582)
ID
RHSA-2020:3016
Severity
important
URL
https://access.redhat.com/errata/RHSA-2020:3016
Published
2020-07-21T00:00:00
(4 years ago)
Modified
2020-07-21T00:00:00
(4 years ago)
Rights
Copyright 2020 Red Hat, Inc.
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-8.2 redhat kernel-rt < 4.18.0-193.13.2.rt13.65.el8_2 redhat-8.2 x86_64
Affected pkg:rpm/redhat/kernel-rt-modules?arch=x86_64&distro=redhat-8.2 redhat kernel-rt-modules < 4.18.0-193.13.2.rt13.65.el8_2 redhat-8.2 x86_64
Affected pkg:rpm/redhat/kernel-rt-modules-extra?arch=x86_64&distro=redhat-8.2 redhat kernel-rt-modules-extra < 4.18.0-193.13.2.rt13.65.el8_2 redhat-8.2 x86_64
Affected pkg:rpm/redhat/kernel-rt-kvm?arch=x86_64&distro=redhat-8.2 redhat kernel-rt-kvm < 4.18.0-193.13.2.rt13.65.el8_2 redhat-8.2 x86_64
Affected pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-8.2 redhat kernel-rt-devel < 4.18.0-193.13.2.rt13.65.el8_2 redhat-8.2 x86_64
Affected pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-8.2 redhat kernel-rt-debug < 4.18.0-193.13.2.rt13.65.el8_2 redhat-8.2 x86_64
Affected pkg:rpm/redhat/kernel-rt-debug-modules?arch=x86_64&distro=redhat-8.2 redhat kernel-rt-debug-modules < 4.18.0-193.13.2.rt13.65.el8_2 redhat-8.2 x86_64
Affected pkg:rpm/redhat/kernel-rt-debug-modules-extra?arch=x86_64&distro=redhat-8.2 redhat kernel-rt-debug-modules-extra < 4.18.0-193.13.2.rt13.65.el8_2 redhat-8.2 x86_64
Affected pkg:rpm/redhat/kernel-rt-debug-kvm?arch=x86_64&distro=redhat-8.2 redhat kernel-rt-debug-kvm < 4.18.0-193.13.2.rt13.65.el8_2 redhat-8.2 x86_64
Affected pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-8.2 redhat kernel-rt-debug-devel < 4.18.0-193.13.2.rt13.65.el8_2 redhat-8.2 x86_64
Affected pkg:rpm/redhat/kernel-rt-debug-core?arch=x86_64&distro=redhat-8.2 redhat kernel-rt-debug-core < 4.18.0-193.13.2.rt13.65.el8_2 redhat-8.2 x86_64
Affected pkg:rpm/redhat/kernel-rt-core?arch=x86_64&distro=redhat-8.2 redhat kernel-rt-core < 4.18.0-193.13.2.rt13.65.el8_2 redhat-8.2 x86_64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...