Oval Definition:oval:com.redhat.rhsa:def:20193309
Revision Date:2019-11-05Version:636
Title:RHSA-2019:3309: kernel-rt security and bug fix update (Important)
Description:The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884)

  • Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900)

  • Kernel: page cache side channel attacks (CVE-2019-5489)

  • hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) (CVE-2019-9506)

  • kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c (CVE-2019-10126)

  • Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821)

  • kernel: Information Disclosure in crypto_report_one in crypto/crypto_user.c (CVE-2018-19854)

  • kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS (CVE-2018-20169)

  • kernel: Heap address information leak while using L2CAP_GET_CONF_OPT (CVE-2019-3459)

  • kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP (CVE-2019-3460)

  • kernel: SCTP socket buffer memory leak leading to denial of service (CVE-2019-3874)

  • kernel: denial of service vector through vfio DMA mappings (CVE-2019-3882)

  • kernel: null-pointer dereference in hci_uart_set_flow_control (CVE-2019-10207)

  • kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping (CVE-2019-11599)

  • kernel: fs/ext4/extents.c leads to information disclosure (CVE-2019-11833)

  • kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command (CVE-2019-11884)

  • kernel: use-after-free in arch/x86/lib/insn-eval.c (CVE-2019-13233)

  • kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service (CVE-2019-15916)

  • kernel: oob memory read in hso_probe in drivers/net/usb/hso.c (CVE-2018-19985)

  • Kernel: KVM: leak of uninitialized stack contents to guest (CVE-2019-7222)

  • Kernel: net: weak IP ID generation leads to remote device tracking (CVE-2019-10638)

    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

    Additional Changes:

    For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.
  • Family:unixClass:patch
    Status:Reference(s):CVE-2018-16884
    CVE-2018-19854
    CVE-2018-19985
    CVE-2018-20169
    CVE-2019-10126
    CVE-2019-10207
    CVE-2019-10638
    CVE-2019-11599
    CVE-2019-11833
    CVE-2019-11884
    CVE-2019-13233
    CVE-2019-14821
    CVE-2019-15666
    CVE-2019-15916
    CVE-2019-15921
    CVE-2019-15924
    CVE-2019-16994
    CVE-2019-3459
    CVE-2019-3460
    CVE-2019-3874
    CVE-2019-3882
    CVE-2019-3900
    CVE-2019-5489
    CVE-2019-7222
    CVE-2019-9506
    CVE-2020-10720
    RHSA-2019:3309
    Platform(s):Red Hat Enterprise Linux 8
    Product(s):
    Definition Synopsis
  • Red Hat Enterprise Linux must be installed
  • OR Package Information
  • Red Hat Enterprise Linux 8 is installed
  • OR Red Hat CoreOS 4 is installed
  • AND
  • kernel-rt earlier than 0:4.18.0-147.rt24.93.el8 is currently running
  • OR kernel-rt earlier than 0:4.18.0-147.rt24.93.el8 is set to boot up on next boot
  • AND
  • kernel-rt is earlier than 0:4.18.0-147.rt24.93.el8
  • AND kernel-rt is signed with Red Hat redhatrelease2 key
  • kernel-rt-core is earlier than 0:4.18.0-147.rt24.93.el8
  • AND kernel-rt-core is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug is earlier than 0:4.18.0-147.rt24.93.el8
  • AND kernel-rt-debug is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug-core is earlier than 0:4.18.0-147.rt24.93.el8
  • AND kernel-rt-debug-core is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug-devel is earlier than 0:4.18.0-147.rt24.93.el8
  • AND kernel-rt-debug-devel is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug-kvm is earlier than 0:4.18.0-147.rt24.93.el8
  • AND kernel-rt-debug-kvm is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug-modules is earlier than 0:4.18.0-147.rt24.93.el8
  • AND kernel-rt-debug-modules is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug-modules-extra is earlier than 0:4.18.0-147.rt24.93.el8
  • AND kernel-rt-debug-modules-extra is signed with Red Hat redhatrelease2 key
  • kernel-rt-devel is earlier than 0:4.18.0-147.rt24.93.el8
  • AND kernel-rt-devel is signed with Red Hat redhatrelease2 key
  • kernel-rt-kvm is earlier than 0:4.18.0-147.rt24.93.el8
  • AND kernel-rt-kvm is signed with Red Hat redhatrelease2 key
  • kernel-rt-modules is earlier than 0:4.18.0-147.rt24.93.el8
  • AND kernel-rt-modules is signed with Red Hat redhatrelease2 key
  • kernel-rt-modules-extra is earlier than 0:4.18.0-147.rt24.93.el8
  • AND kernel-rt-modules-extra is signed with Red Hat redhatrelease2 key
  • BACK