First published: Tue Dec 03 2019(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux operating system.<br>Security Fix(es):<br><li> Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900)</li> <li> Kernel: page cache side channel attacks (CVE-2019-5489)</li> <li> Kernel: KVM: nVMX: use-after-free of the hrtimer for emulation of the preemption timer (CVE-2019-7221)</li> <li> kernel: Handling of might_cancel queueing is not properly pretected against race (CVE-2017-10661)</li> <li> kernel: Inifinite loop vulnerability in mm/madvise.c:madvise_willneed() function allows local denial of service (CVE-2017-18208)</li> <li> kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c (CVE-2019-11811)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> [LLNL 7.5 Bug] slab leak causing a crash when using kmem control group (BZ#1748234)</li> <li> kmem, memcg: system crash due to cache destruction race (BZ#1754829)</li> <li> kernel build: parallelize redhat/mod-sign.sh (BZ#1755327)</li> <li> kernel build: speed up module compression step (BZ#1755336)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel-abi-whitelists | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel-debug | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel-debug-debuginfo | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel-debug-devel | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel-debuginfo | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel-devel | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel-doc | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel-headers | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel-tools | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel-tools-debuginfo | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel-tools-libs | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel-tools-libs-devel | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/perf | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/perf-debuginfo | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/python-perf | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/python-perf-debuginfo | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel-bootwrapper | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel-debug | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel-debug-debuginfo | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel-debug-devel | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel-debuginfo | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel-debuginfo-common-ppc64le | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel-devel | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel-headers | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel-tools | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel-tools-debuginfo | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel-tools-libs | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/kernel-tools-libs-devel | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/perf | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/perf-debuginfo | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/python-perf | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
redhat/python-perf-debuginfo | <3.10.0-693.61.1.el7 | 3.10.0-693.61.1.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2019:4058 addresses vulnerabilities including a DoS condition in vhost_net (CVE-2019-3900) and page cache side channel attacks (CVE-2019-5489).
To fix the vulnerabilities in RHSA-2019:4058, you should update your kernel to version 3.10.0-693.61.1.el7 or later.
RHSA-2019:4058 affects systems running the kernel version below 3.10.0-693.61.1.el7 on Red Hat Enterprise Linux.
The severity of RHSA-2019:4058 is classified as important due to the potential denial of service and data exposure risks.
Yes, it is necessary to reboot your system after applying the kernel update specified in RHSA-2019:4058 for the changes to take effect.