Oval Definition:oval:com.redhat.rhsa:def:20192473
Revision Date:2019-08-13Version:639
Title:RHSA-2019:2473: kernel security and bug fix update (Important)
Description:The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • Kernel: page cache side channel attacks (CVE-2019-5489)

  • kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service (CVE-2017-17805)

  • kernel: Unprivileged users able to inspect kernel stacks of arbitrary tasks (CVE-2018-17972)

  • kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125)

    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

    Bug Fix(es):

  • OOPS with Null Pointer exception in v4l2_ctrl_query_menu when second arg of function is NULL (BZ#1647975)

  • Another RHEL 6 hang in congestion_wait() (BZ#1658254)

  • kernel crash after running user space script (BZ#1663262)

  • RHEL-6.10: Don't report the use of retpoline on Skylake as vulnerable (BZ#1666102)

  • Bad pagetable: 000f “*pdpt = 0000000000000000 *pde = 0000000000000000” RHEL 6 32bit (BZ#1702782)

  • fs/binfmt_misc.c: do not allow offset overflow [6.10.z] (BZ#1710149)

  • Wrong spectre backport causing linux headers to break compilation of 3rd party packages (BZ#1722185)
  • Family:unixClass:patch
    Status:Reference(s):CVE-2017-17805
    CVE-2018-17972
    CVE-2019-1125
    CVE-2019-5489
    RHSA-2019:2473
    Platform(s):Red Hat Enterprise Linux 6
    Product(s):
    Definition Synopsis
  • Red Hat Enterprise Linux must be installed
  • OR Package Information
  • Red Hat Enterprise Linux 6 is installed
  • AND
  • kernel earlier than 0:2.6.32-754.18.2.el6 is currently running
  • OR kernel earlier than 0:2.6.32-754.18.2.el6 is set to boot up on next boot
  • AND
  • kernel is earlier than 0:2.6.32-754.18.2.el6
  • AND kernel is signed with Red Hat redhatrelease2 key
  • kernel-abi-whitelists is earlier than 0:2.6.32-754.18.2.el6
  • AND kernel-abi-whitelists is signed with Red Hat redhatrelease2 key
  • kernel-bootwrapper is earlier than 0:2.6.32-754.18.2.el6
  • AND kernel-bootwrapper is signed with Red Hat redhatrelease2 key
  • kernel-debug is earlier than 0:2.6.32-754.18.2.el6
  • AND kernel-debug is signed with Red Hat redhatrelease2 key
  • kernel-debug-devel is earlier than 0:2.6.32-754.18.2.el6
  • AND kernel-debug-devel is signed with Red Hat redhatrelease2 key
  • kernel-devel is earlier than 0:2.6.32-754.18.2.el6
  • AND kernel-devel is signed with Red Hat redhatrelease2 key
  • kernel-doc is earlier than 0:2.6.32-754.18.2.el6
  • AND kernel-doc is signed with Red Hat redhatrelease2 key
  • kernel-firmware is earlier than 0:2.6.32-754.18.2.el6
  • AND kernel-firmware is signed with Red Hat redhatrelease2 key
  • kernel-headers is earlier than 0:2.6.32-754.18.2.el6
  • AND kernel-headers is signed with Red Hat redhatrelease2 key
  • kernel-kdump is earlier than 0:2.6.32-754.18.2.el6
  • AND kernel-kdump is signed with Red Hat redhatrelease2 key
  • kernel-kdump-devel is earlier than 0:2.6.32-754.18.2.el6
  • AND kernel-kdump-devel is signed with Red Hat redhatrelease2 key
  • perf is earlier than 0:2.6.32-754.18.2.el6
  • AND perf is signed with Red Hat redhatrelease2 key
  • python-perf is earlier than 0:2.6.32-754.18.2.el6
  • AND python-perf is signed with Red Hat redhatrelease2 key
  • BACK