First published: Wed May 13 2020(Updated: )
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.<br>Security Fix(es):<br><li> Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kpatch-patch | <4_18_0-193-1-2.el8 | 4_18_0-193-1-2.el8 |
redhat/kpatch-patch | <4_18_0-193-1-2.el8 | 4_18_0-193-1-2.el8 |
redhat/kpatch-patch | <4_18_0-193-debuginfo-1-2.el8 | 4_18_0-193-debuginfo-1-2.el8 |
redhat/kpatch-patch | <4_18_0-193-debugsource-1-2.el8 | 4_18_0-193-debugsource-1-2.el8 |
redhat/kpatch-patch | <4_18_0-193-1-2.el8 | 4_18_0-193-1-2.el8 |
redhat/kpatch-patch | <4_18_0-193-debuginfo-1-2.el8 | 4_18_0-193-debuginfo-1-2.el8 |
redhat/kpatch-patch | <4_18_0-193-debugsource-1-2.el8 | 4_18_0-193-debugsource-1-2.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:2125 is classified as Important.
To fix RHSA-2020:2125, update the kpatch-patch package to version 4_18_0-193-1-2.el8 or later.
RHSA-2020:2125 affects systems running the kpatch-patch package prior to version 4_18_0-193-1-2.el8.
RHSA-2020:2125 addresses a kernel vulnerability that may cause a null pointer dereference and kernel panic when receiving a CIPSO packet.
There is no specific workaround for RHSA-2020:2125; applying the recommended updates is necessary to mitigate the vulnerability.