Oval Definition:oval:com.redhat.rhsa:def:20201567
Revision Date:2020-04-28Version:641
Title:RHSA-2020:1567: kernel-rt security, bug fix, and enhancement update (Important)
Description:The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768)

  • kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)

  • kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service (CVE-2019-8980)

  • kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol. (CVE-2019-17053)

  • kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol. (CVE-2019-17055)

  • kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c (CVE-2019-18805)

  • kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (CVE-2019-19534)

  • kernel: some ipv6 protocols not encrypted over ipsec tunnel. (CVE-2020-1749)

  • Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR (CVE-2019-10639)

  • kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure (CVE-2019-15090)

  • kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash (CVE-2019-15099)

  • kernel: Null pointer dereference in the sound/usb/line6/pcm.c (CVE-2019-15221)

  • kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS (CVE-2019-19057)

  • kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS) (CVE-2019-19073)

  • kernel: a memory leak in the ath9k management function in allows local DoS (CVE-2019-19074)

  • kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications (CVE-2019-19922)

    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

    Bug Fix(es):

  • RT: update RT source tree to the RHEL-8.2 tree (BZ#1708716)

  • KVM-RT guest fails boot with emulatorsched (BZ#1712781)

  • 8 vCPU guest need max latency < 20 us with stress [RT-8.2] (BZ#1757165)

  • Request nx_huge_pages=N as default value to avoid kvm-rt guest large latency spike [rt-8] (BZ#1788352)

  • RT: Add rpm Provide of 'kernel' to indicate that this is a kernel package (BZ#1796284)

  • [RHEL8] RT kernel signed by test certificate and not Red Hat Secure Boot (BZ#1806871)

    Enhancement(s):

  • update to the upstream 5.x RT patchset (BZ#1680161)
  • Family:unixClass:patch
    Status:Reference(s):CVE-2018-16871
    CVE-2019-10639
    CVE-2019-12819
    CVE-2019-15090
    CVE-2019-15099
    CVE-2019-15221
    CVE-2019-15223
    CVE-2019-16234
    CVE-2019-17053
    CVE-2019-17055
    CVE-2019-18282
    CVE-2019-18805
    CVE-2019-19045
    CVE-2019-19047
    CVE-2019-19055
    CVE-2019-19057
    CVE-2019-19058
    CVE-2019-19059
    CVE-2019-19065
    CVE-2019-19067
    CVE-2019-19073
    CVE-2019-19074
    CVE-2019-19077
    CVE-2019-19532
    CVE-2019-19534
    CVE-2019-19768
    CVE-2019-19922
    CVE-2019-5108
    CVE-2019-8980
    CVE-2020-10690
    CVE-2020-1749
    CVE-2020-7053
    RHSA-2020:1567
    Platform(s):Red Hat Enterprise Linux 8
    Product(s):
    Definition Synopsis
  • Red Hat Enterprise Linux must be installed
  • OR Package Information
  • Red Hat Enterprise Linux 8 is installed
  • OR Red Hat CoreOS 4 is installed
  • AND
  • kernel-rt earlier than 0:4.18.0-193.rt13.51.el8 is currently running
  • OR kernel-rt earlier than 0:4.18.0-193.rt13.51.el8 is set to boot up on next boot
  • AND
  • kernel-rt is earlier than 0:4.18.0-193.rt13.51.el8
  • AND kernel-rt is signed with Red Hat redhatrelease2 key
  • kernel-rt-core is earlier than 0:4.18.0-193.rt13.51.el8
  • AND kernel-rt-core is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug is earlier than 0:4.18.0-193.rt13.51.el8
  • AND kernel-rt-debug is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug-core is earlier than 0:4.18.0-193.rt13.51.el8
  • AND kernel-rt-debug-core is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug-devel is earlier than 0:4.18.0-193.rt13.51.el8
  • AND kernel-rt-debug-devel is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug-kvm is earlier than 0:4.18.0-193.rt13.51.el8
  • AND kernel-rt-debug-kvm is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug-modules is earlier than 0:4.18.0-193.rt13.51.el8
  • AND kernel-rt-debug-modules is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug-modules-extra is earlier than 0:4.18.0-193.rt13.51.el8
  • AND kernel-rt-debug-modules-extra is signed with Red Hat redhatrelease2 key
  • kernel-rt-devel is earlier than 0:4.18.0-193.rt13.51.el8
  • AND kernel-rt-devel is signed with Red Hat redhatrelease2 key
  • kernel-rt-kvm is earlier than 0:4.18.0-193.rt13.51.el8
  • AND kernel-rt-kvm is signed with Red Hat redhatrelease2 key
  • kernel-rt-modules is earlier than 0:4.18.0-193.rt13.51.el8
  • AND kernel-rt-modules is signed with Red Hat redhatrelease2 key
  • kernel-rt-modules-extra is earlier than 0:4.18.0-193.rt13.51.el8
  • AND kernel-rt-modules-extra is signed with Red Hat redhatrelease2 key
  • BACK