First published: Tue Apr 28 2020(Updated: )
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.<br>Security Fix(es):<br><li> kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768)</li> <li> kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)</li> <li> kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service (CVE-2019-8980)</li> <li> kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol. (CVE-2019-17053)</li> <li> kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol. (CVE-2019-17055)</li> <li> kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c (CVE-2019-18805)</li> <li> kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (CVE-2019-19534)</li> <li> kernel: some ipv6 protocols not encrypted over ipsec tunnel. (CVE-2020-1749)</li> <li> Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR (CVE-2019-10639)</li> <li> kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure (CVE-2019-15090)</li> <li> kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash (CVE-2019-15099)</li> <li> kernel: Null pointer dereference in the sound/usb/line6/pcm.c (CVE-2019-15221)</li> <li> kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS (CVE-2019-19057)</li> <li> kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS) (CVE-2019-19073)</li> <li> kernel: a memory leak in the ath9k management function in allows local DoS (CVE-2019-19074)</li> <li> kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications (CVE-2019-19922)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> RT: update RT source tree to the RHEL-8.2 tree (BZ#1708716)</li> <li> KVM-RT guest fails boot with emulatorsched (BZ#1712781)</li> <li> 8 vCPU guest need max latency < 20 us with stress [RT-8.2] (BZ#1757165)</li> <li> Request nx_huge_pages=N as default value to avoid kvm-rt guest large latency spike [rt-8] (BZ#1788352)</li> <li> RT: Add rpm Provide of 'kernel' to indicate that this is a kernel package (BZ#1796284)</li> <li> [RHEL8] RT kernel signed by test certificate and not Red Hat Secure Boot (BZ#1806871)</li> Enhancement(s):<br><li> update to the upstream 5.x RT patchset (BZ#1680161)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <4.18.0-193.rt13.51.el8 | 4.18.0-193.rt13.51.el8 |
redhat/kernel-rt | <4.18.0-193.rt13.51.el8 | 4.18.0-193.rt13.51.el8 |
redhat/kernel-rt-core | <4.18.0-193.rt13.51.el8 | 4.18.0-193.rt13.51.el8 |
redhat/kernel-rt-debug | <4.18.0-193.rt13.51.el8 | 4.18.0-193.rt13.51.el8 |
redhat/kernel-rt-debug-core | <4.18.0-193.rt13.51.el8 | 4.18.0-193.rt13.51.el8 |
redhat/kernel-rt-debug-debuginfo | <4.18.0-193.rt13.51.el8 | 4.18.0-193.rt13.51.el8 |
redhat/kernel-rt-debug-devel | <4.18.0-193.rt13.51.el8 | 4.18.0-193.rt13.51.el8 |
redhat/kernel-rt-debug-modules | <4.18.0-193.rt13.51.el8 | 4.18.0-193.rt13.51.el8 |
redhat/kernel-rt-debug-modules-extra | <4.18.0-193.rt13.51.el8 | 4.18.0-193.rt13.51.el8 |
redhat/kernel-rt-debuginfo | <4.18.0-193.rt13.51.el8 | 4.18.0-193.rt13.51.el8 |
redhat/kernel-rt-devel | <4.18.0-193.rt13.51.el8 | 4.18.0-193.rt13.51.el8 |
redhat/kernel-rt-modules | <4.18.0-193.rt13.51.el8 | 4.18.0-193.rt13.51.el8 |
redhat/kernel-rt-modules-extra | <4.18.0-193.rt13.51.el8 | 4.18.0-193.rt13.51.el8 |
redhat/kernel-rt-debug-kvm | <4.18.0-193.rt13.51.el8 | 4.18.0-193.rt13.51.el8 |
redhat/kernel-rt-kvm | <4.18.0-193.rt13.51.el8 | 4.18.0-193.rt13.51.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.