First published: Tue Nov 12 2019(Updated: )
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.<br>Security Fix(es):<br><li> hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)</li> <li> hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)</li> <li> hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <3.10.0-693.60.2.rt56.655.el6 | 3.10.0-693.60.2.rt56.655.el6 |
redhat/kernel-rt-debug | <3.10.0-693.60.2.rt56.655.el6 | 3.10.0-693.60.2.rt56.655.el6 |
redhat/kernel-rt-debug-debuginfo | <3.10.0-693.60.2.rt56.655.el6 | 3.10.0-693.60.2.rt56.655.el6 |
redhat/kernel-rt-debug-devel | <3.10.0-693.60.2.rt56.655.el6 | 3.10.0-693.60.2.rt56.655.el6 |
redhat/kernel-rt-debuginfo | <3.10.0-693.60.2.rt56.655.el6 | 3.10.0-693.60.2.rt56.655.el6 |
redhat/kernel-rt-devel | <3.10.0-693.60.2.rt56.655.el6 | 3.10.0-693.60.2.rt56.655.el6 |
redhat/kernel-rt-doc | <3.10.0-693.60.2.rt56.655.el6 | 3.10.0-693.60.2.rt56.655.el6 |
redhat/kernel-rt-firmware | <3.10.0-693.60.2.rt56.655.el6 | 3.10.0-693.60.2.rt56.655.el6 |
redhat/kernel-rt-trace | <3.10.0-693.60.2.rt56.655.el6 | 3.10.0-693.60.2.rt56.655.el6 |
redhat/kernel-rt-trace-debuginfo | <3.10.0-693.60.2.rt56.655.el6 | 3.10.0-693.60.2.rt56.655.el6 |
redhat/kernel-rt-trace-devel | <3.10.0-693.60.2.rt56.655.el6 | 3.10.0-693.60.2.rt56.655.el6 |
redhat/kernel-rt-vanilla | <3.10.0-693.60.2.rt56.655.el6 | 3.10.0-693.60.2.rt56.655.el6 |
redhat/kernel-rt-vanilla-debuginfo | <3.10.0-693.60.2.rt56.655.el6 | 3.10.0-693.60.2.rt56.655.el6 |
redhat/kernel-rt-vanilla-devel | <3.10.0-693.60.2.rt56.655.el6 | 3.10.0-693.60.2.rt56.655.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2019:3844 is classified as important due to the potential impact on system stability and security.
To fix RHSA-2019:3844, you should update the kernel-rt packages to version 3.10.0-693.60.2.rt56.655.el6 or later.
RHSA-2019:3844 addresses vulnerabilities including CVE-2018-12207 related to hardware machine check errors.
Affected packages include kernel-rt, kernel-rt-debug, kernel-rt-devel, and several other kernel-rt variants.
Yes, a system reboot is generally required to apply changes after updating the kernel-rt packages for RHSA-2019:3844.