First published: Tue May 08 2018(Updated: )
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.<br>Security Fix(es):<br><li> Kernel: KVM: error in exception handling leads to wrong debug stack value (CVE-2018-1087)</li> <li> Kernel: error in exception handling leads to DoS (CVE-2018-8897)</li> <li> Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation (CVE-2017-16939)</li> <li> kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c (CVE-2018-1068)</li> <li> kernel: ptrace() incorrect error handling leads to corruption and DoS (CVE-2018-1000199)</li> For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.<br>Red Hat would like to thank Andy Lutomirski for reporting CVE-2018-1087 and CVE-2018-1000199 and Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897.<br>Bug Fix(es):<br><li> The kernel-rt packages have been upgraded to the 3.10.0-862.2.3 source tree, which provides a number of bug fixes over the previous version. (BZ#1549768)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <3.10.0-862.2.3.rt56.806.el7 | 3.10.0-862.2.3.rt56.806.el7 |
redhat/kernel-rt | <3.10.0-862.2.3.rt56.806.el7 | 3.10.0-862.2.3.rt56.806.el7 |
redhat/kernel-rt-debug | <3.10.0-862.2.3.rt56.806.el7 | 3.10.0-862.2.3.rt56.806.el7 |
redhat/kernel-rt-debug-debuginfo | <3.10.0-862.2.3.rt56.806.el7 | 3.10.0-862.2.3.rt56.806.el7 |
redhat/kernel-rt-debug-devel | <3.10.0-862.2.3.rt56.806.el7 | 3.10.0-862.2.3.rt56.806.el7 |
redhat/kernel-rt-debug-kvm-debuginfo | <3.10.0-862.2.3.rt56.806.el7 | 3.10.0-862.2.3.rt56.806.el7 |
redhat/kernel-rt-debuginfo | <3.10.0-862.2.3.rt56.806.el7 | 3.10.0-862.2.3.rt56.806.el7 |
redhat/kernel-rt-devel | <3.10.0-862.2.3.rt56.806.el7 | 3.10.0-862.2.3.rt56.806.el7 |
redhat/kernel-rt-doc | <3.10.0-862.2.3.rt56.806.el7 | 3.10.0-862.2.3.rt56.806.el7 |
redhat/kernel-rt-kvm-debuginfo | <3.10.0-862.2.3.rt56.806.el7 | 3.10.0-862.2.3.rt56.806.el7 |
redhat/kernel-rt-trace | <3.10.0-862.2.3.rt56.806.el7 | 3.10.0-862.2.3.rt56.806.el7 |
redhat/kernel-rt-trace-debuginfo | <3.10.0-862.2.3.rt56.806.el7 | 3.10.0-862.2.3.rt56.806.el7 |
redhat/kernel-rt-trace-devel | <3.10.0-862.2.3.rt56.806.el7 | 3.10.0-862.2.3.rt56.806.el7 |
redhat/kernel-rt-trace-kvm-debuginfo | <3.10.0-862.2.3.rt56.806.el7 | 3.10.0-862.2.3.rt56.806.el7 |
redhat/kernel-rt-debug-kvm | <3.10.0-862.2.3.rt56.806.el7 | 3.10.0-862.2.3.rt56.806.el7 |
redhat/kernel-rt-kvm | <3.10.0-862.2.3.rt56.806.el7 | 3.10.0-862.2.3.rt56.806.el7 |
redhat/kernel-rt-trace-kvm | <3.10.0-862.2.3.rt56.806.el7 | 3.10.0-862.2.3.rt56.806.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.