First published: Tue Feb 18 2020(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux operating system.<br>Security Fix(es):<br><li> kernel: Use-after-free in __blk_drain_queue() function in block/blk-core.c (CVE-2018-20856)</li> <li> kernel: use-after-free in fs/xfs/xfs_super.c (CVE-2018-20976)</li> <li> kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation (CVE-2019-11085)</li> <li> kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c (CVE-2019-14895)</li> <li> kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c (CVE-2019-17133)</li> <li> kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow (CVE-2019-17666)</li> <li> kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping (CVE-2019-11599)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> [Hyper-V][RHEL7.6]Hyper-V guest waiting indefinitely for RCU callback when removing a mem cgroup (BZ#1783175)</li> Enhancement(s):<br><li> Selective backport: perf: Sync with upstream v4.16 (BZ#1782751)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-abi-whitelists | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-debug | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-debug-debuginfo | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-debug-devel | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-debuginfo | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-devel | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-doc | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-headers | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-tools | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-tools-debuginfo | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-tools-libs | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-tools-libs-devel | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/perf | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/perf-debuginfo | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/python-perf | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/python-perf-debuginfo | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-debug | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-debug-debuginfo | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-debug-devel | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-debuginfo | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-debuginfo-common-s390x | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-devel | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-headers | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-kdump | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-kdump-debuginfo | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-kdump-devel | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/perf | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/perf-debuginfo | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/python-perf | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/python-perf-debuginfo | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-bootwrapper | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-debuginfo-common-ppc64 | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-tools | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-tools-debuginfo | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-tools-libs | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-tools-libs-devel | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-bootwrapper | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-debug | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-debug-debuginfo | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-debug-devel | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-debuginfo | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-debuginfo-common-ppc64le | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-devel | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-headers | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-tools | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-tools-debuginfo | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-tools-libs | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/kernel-tools-libs-devel | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/perf | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/perf-debuginfo | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/python-perf | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
redhat/python-perf-debuginfo | <3.10.0-862.48.1.el7 | 3.10.0-862.48.1.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2020:0543 addresses use-after-free vulnerabilities in the Linux kernel, specifically CVE-2018-20856 and CVE-2018-20976.
Users should upgrade to the kernel version 3.10.0-862.48.1.el7 or later to mitigate the vulnerabilities indicated in RHSA-2020:0543.
The severity rating for RHSA-2020:0543 is typically categorized as important due to the risk of exploitation of the vulnerabilities.
Affected kernel packages include kernel, kernel-debug, kernel-devel, kernel-headers, and other related packages all up to version 3.10.0-862.48.1.el7.
To check for vulnerability under RHSA-2020:0543, verify the installed kernel version and match it against the versions that have been patched.