First published: Tue Mar 26 2019(Updated: )
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.<br>Security Fix(es):<br><li> kernel: MIDI driver race condition leads to a double-free (CVE-2018-10902)</li> <li> kernel: net/rxrpc: overflow in decoding of krb5 principal (CVE-2017-7482)</li> <li> kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service (CVE-2018-5803)</li> <li> kernel: use-after-free in ntfs_read_locked_inode in the ntfs.ko (CVE-2018-12929)</li> <li> kernel: stack-based out-of-bounds write in ntfs_end_buffer_async_read in the ntfs.ko (CVE-2018-12930)</li> <li> kernel: stack-based out-of-bounds write in ntfs_attr_find in the ntfs.ko (CVE-2018-12931)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> Remove the NTFS module from the MRG 2.5.x realtime kernel (BZ#1674523)</li> <li> update the MRG 2.5.z 3.10 kernel-rt sources (BZ#1674935)</li> Users of kernel-rt are advised to upgrade to these updated packages, which fix these bugs.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <3.10.0-693.46.1.rt56.639.el6 | 3.10.0-693.46.1.rt56.639.el6 |
redhat/kernel-rt-debug | <3.10.0-693.46.1.rt56.639.el6 | 3.10.0-693.46.1.rt56.639.el6 |
redhat/kernel-rt-debug-debuginfo | <3.10.0-693.46.1.rt56.639.el6 | 3.10.0-693.46.1.rt56.639.el6 |
redhat/kernel-rt-debug-devel | <3.10.0-693.46.1.rt56.639.el6 | 3.10.0-693.46.1.rt56.639.el6 |
redhat/kernel-rt-debuginfo | <3.10.0-693.46.1.rt56.639.el6 | 3.10.0-693.46.1.rt56.639.el6 |
redhat/kernel-rt-devel | <3.10.0-693.46.1.rt56.639.el6 | 3.10.0-693.46.1.rt56.639.el6 |
redhat/kernel-rt-doc | <3.10.0-693.46.1.rt56.639.el6 | 3.10.0-693.46.1.rt56.639.el6 |
redhat/kernel-rt-firmware | <3.10.0-693.46.1.rt56.639.el6 | 3.10.0-693.46.1.rt56.639.el6 |
redhat/kernel-rt-trace | <3.10.0-693.46.1.rt56.639.el6 | 3.10.0-693.46.1.rt56.639.el6 |
redhat/kernel-rt-trace-debuginfo | <3.10.0-693.46.1.rt56.639.el6 | 3.10.0-693.46.1.rt56.639.el6 |
redhat/kernel-rt-trace-devel | <3.10.0-693.46.1.rt56.639.el6 | 3.10.0-693.46.1.rt56.639.el6 |
redhat/kernel-rt-vanilla | <3.10.0-693.46.1.rt56.639.el6 | 3.10.0-693.46.1.rt56.639.el6 |
redhat/kernel-rt-vanilla-debuginfo | <3.10.0-693.46.1.rt56.639.el6 | 3.10.0-693.46.1.rt56.639.el6 |
redhat/kernel-rt-vanilla-devel | <3.10.0-693.46.1.rt56.639.el6 | 3.10.0-693.46.1.rt56.639.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2019:0641 is considered moderate due to the potential for a race condition leading to a double-free issue.
To fix RHSA-2019:0641, upgrade to the latest kernel-rt packages provided by Red Hat, specifically version 3.10.0-693.46.1.rt56.639.el6.
RHSA-2019:0641 affects systems running Red Hat Enterprise Linux with kernel-rt versions prior to 3.10.0-693.46.1.rt56.639.el6.
RHSA-2019:0641 addresses a race condition in the MIDI driver (CVE-2018-10902) among other security issues.
Yes, a reboot is typically required to ensure the new kernel-rt packages take effect after applying the fix for RHSA-2019:0641.