First published: Tue Dec 15 2020(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux operating system.<br>Security Fix(es):<br><li> kernel: information exposure in drivers/char/random.c and kernel/time/timer.c (CVE-2020-16166)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> [RHEL-8.3][arm64] CN99xx: DIMM errors not populated in EDAC sysfs (BZ#1857754)</li> <li> sctp: backports from upstream, 2nd phase (BZ#1878308)</li> <li> Backport upstream OVS performance patch fix (BZ#1879936)</li> <li> avoid flush_backlog IPI for isolated CPUs by configuring RPS cpumask (BZ#1883315)</li> <li> Unexpected fragmentation needed error, OpenShift 4, OVS, VXLAN, GSO, Azure (BZ#1885767)</li> <li> XFS: reflinked file data corruption (BZ#1886896)</li> <li> Scheduler: rq->tmp_alone_branch != &rq->leaf_cfs_rq_list (BZ#1890123)</li> <li> geneve: add transport ports in route lookup for geneve (BZ#1891819)</li> <li> BUG: using smp_processor_id() in preemptible [00000000] code: handler106/3082 (BZ#1893282)</li> <li> HRTICK not armed in specific cases with SCHED_DEADLINE (BZ#1894074)</li> <li> RHEL8.1 - ibmveth is producing TX errors over VXLAN when large send (TSO) is enabled (-> related to Red Hat bug 1816254 - OCP 4.3 - Authentication clusteroperator is in unknown state on POWER 9 servers") (BZ#1896300)</li> <li> RHEL8.2 - mm/gup: fix gup_fast with dynamic page table folding (BZ#1896352)</li> <li> block layer: update to upstream v5.8 (BZ#1896788)</li> <li> [Regression] RHEL8.2 zstream - Undetected Data corruption in MPI workloads that use VSX for reductions on POWER9 DD2.1 systems (BZ#1897279)</li> <li> ARO: excessive pod memory allocation causes node lockup (BZ#1901549)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/bpftool | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/bpftool-debuginfo | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-abi-whitelists | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-core | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-cross-headers | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-debug | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-debug-core | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-debug-debuginfo | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-debug-devel | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-debug-modules | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-debug-modules-extra | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-debuginfo | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-devel | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-doc | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-headers | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-modules | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-modules-extra | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-tools | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-tools-debuginfo | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-tools-libs | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/perf | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/perf-debuginfo | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/python3-perf | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/python3-perf-debuginfo | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/bpftool | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/bpftool-debuginfo | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-core | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-cross-headers | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-debug | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-debug-core | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-debug-debuginfo | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-debug-devel | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-debug-modules | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-debug-modules-extra | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-debuginfo | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-debuginfo-common-s390x | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-devel | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-headers | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-modules | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-modules-extra | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-tools | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-tools-debuginfo | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-zfcpdump | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-zfcpdump-core | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-zfcpdump-debuginfo | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-zfcpdump-devel | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-zfcpdump-modules | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-zfcpdump-modules-extra | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/perf | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/perf-debuginfo | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/python3-perf | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/python3-perf-debuginfo | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/bpftool | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/bpftool-debuginfo | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-core | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-cross-headers | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-debug | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-debug-core | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-debug-debuginfo | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-debug-devel | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-debug-modules | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-debug-modules-extra | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-debuginfo | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-debuginfo-common-ppc64le | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-devel | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-headers | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-modules | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-modules-extra | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-tools | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-tools-debuginfo | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-tools-libs | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/perf | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/perf-debuginfo | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/python3-perf | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/python3-perf-debuginfo | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/bpftool | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
redhat/bpftool-debuginfo | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
redhat/kernel | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
redhat/kernel-core | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
redhat/kernel-cross-headers | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
redhat/kernel-debug | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
redhat/kernel-debug-core | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
redhat/kernel-debug-debuginfo | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
redhat/kernel-debug-devel | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
redhat/kernel-debug-modules | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
redhat/kernel-debug-modules-extra | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
redhat/kernel-debuginfo | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
redhat/kernel-debuginfo-common-aarch64 | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
redhat/kernel-devel | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
redhat/kernel-headers | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
redhat/kernel-modules | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
redhat/kernel-modules-extra | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
redhat/kernel-tools | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
redhat/kernel-tools-debuginfo | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
redhat/kernel-tools-libs | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
redhat/perf | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
redhat/perf-debuginfo | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
redhat/python3-perf | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
redhat/python3-perf-debuginfo | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
redhat/kernel-tools-libs-devel | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-tools-libs-devel | <4.18.0-193.37.1.el8_2 | 4.18.0-193.37.1.el8_2 |
redhat/kernel-tools-libs-devel | <4.18.0-193.37.1.el8_2.aa | 4.18.0-193.37.1.el8_2.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:5418 is classified as moderate.
To fix RHSA-2020:5418, update the kernel packages to version 4.18.0-193.37.1.el8_2.
RHSA-2020:5418 addresses information exposure vulnerabilities in drivers/char/random.c and kernel/time/timer.c.
RHSA-2020:5418 affects Red Hat Enterprise Linux 8 systems with specific kernel and related package versions.
Yes, a reboot is required after applying the patch for RHSA-2020:5418 to ensure the new kernel is loaded.