[RHSA-2020:4686] kernel-rt security update
Severity
Important
Affected Packages
12
CVEs
3
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
kernel: net: bluetooth: heap buffer overflow when processing extended advertising report events (CVE-2020-24490)
kernel: Red Hat only CVE-2020-12351 regression (CVE-2020-25661)
kernel: Red Hat only CVE-2020-12352 regression (CVE-2020-25662)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- ID
- RHSA-2020:4686
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2020:4686
- Published
-
2020-11-04T00:00:00
(3 years ago) - Modified
-
2020-11-04T00:00:00
(3 years ago) - Rights
- Copyright 2020 Red Hat, Inc.
- Other Advisories
-
- ALAS-2020-1446
- ALAS2-2020-1556
- ASA-202010-2
- ASA-202010-3
- ASA-202010-4
- ASA-202010-9
- ELSA-2020-4685
- openSUSE-SU-2020:1698-1
- openSUSE-SU-2020:2112-1
- openSUSE-SU-2021:0242-1
- RHSA-2020:4685
- SSA:2020-295-01
- SUSE-SU-2020:2980-1
- SUSE-SU-2020:3389-1
- SUSE-SU-2020:3491-1
- SUSE-SU-2020:3522-1
- USN-4592-1
- USN-4752-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 1888449 | https://bugzilla.redhat.com/1888449 | |
Bugzilla | 1891483 | https://bugzilla.redhat.com/1891483 | |
Bugzilla | 1891484 | https://bugzilla.redhat.com/1891484 | |
RHSA | RHSA-2020:4686 | https://access.redhat.com/errata/RHSA-2020:4686 | |
CVE | CVE-2020-24490 | https://access.redhat.com/security/cve/CVE-2020-24490 | |
CVE | CVE-2020-25661 | https://access.redhat.com/security/cve/CVE-2020-25661 | |
CVE | CVE-2020-25662 | https://access.redhat.com/security/cve/CVE-2020-25662 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-8.3 | redhat | kernel-rt | < 4.18.0-240.1.1.rt7.55.el8_3 | redhat-8.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-modules?arch=x86_64&distro=redhat-8.3 | redhat | kernel-rt-modules | < 4.18.0-240.1.1.rt7.55.el8_3 | redhat-8.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-modules-extra?arch=x86_64&distro=redhat-8.3 | redhat | kernel-rt-modules-extra | < 4.18.0-240.1.1.rt7.55.el8_3 | redhat-8.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-kvm?arch=x86_64&distro=redhat-8.3 | redhat | kernel-rt-kvm | < 4.18.0-240.1.1.rt7.55.el8_3 | redhat-8.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-8.3 | redhat | kernel-rt-devel | < 4.18.0-240.1.1.rt7.55.el8_3 | redhat-8.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-8.3 | redhat | kernel-rt-debug | < 4.18.0-240.1.1.rt7.55.el8_3 | redhat-8.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-modules?arch=x86_64&distro=redhat-8.3 | redhat | kernel-rt-debug-modules | < 4.18.0-240.1.1.rt7.55.el8_3 | redhat-8.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-modules-extra?arch=x86_64&distro=redhat-8.3 | redhat | kernel-rt-debug-modules-extra | < 4.18.0-240.1.1.rt7.55.el8_3 | redhat-8.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-kvm?arch=x86_64&distro=redhat-8.3 | redhat | kernel-rt-debug-kvm | < 4.18.0-240.1.1.rt7.55.el8_3 | redhat-8.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-8.3 | redhat | kernel-rt-debug-devel | < 4.18.0-240.1.1.rt7.55.el8_3 | redhat-8.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-core?arch=x86_64&distro=redhat-8.3 | redhat | kernel-rt-debug-core | < 4.18.0-240.1.1.rt7.55.el8_3 | redhat-8.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-core?arch=x86_64&distro=redhat-8.3 | redhat | kernel-rt-core | < 4.18.0-240.1.1.rt7.55.el8_3 | redhat-8.3 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |