Oval Definition:oval:com.redhat.rhsa:def:20203016
Revision Date:2020-07-21Version:639
Title:RHSA-2020:3016: kernel-rt security and bug fix update (Important)
Description:The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: use-after-free in sound/core/timer.c (CVE-2019-19807)

  • kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)

  • kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)

  • kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)

  • kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)

  • kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)

  • kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)

  • Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)

  • kernel: kvm: Information leak within a KVM guest (CVE-2019-3016)

    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

    Bug Fix(es):

  • kernel-rt: update RT source tree to the RHEL-8.2.z2 source tree (BZ#1829582)
  • Family:unixClass:patch
    Status:Reference(s):CVE-2019-19807
    CVE-2019-3016
    CVE-2020-10757
    CVE-2020-10766
    CVE-2020-10767
    CVE-2020-10768
    CVE-2020-12653
    CVE-2020-12654
    CVE-2020-12888
    RHSA-2020:3016
    Platform(s):Red Hat Enterprise Linux 8
    Product(s):
    Definition Synopsis
  • Red Hat Enterprise Linux must be installed
  • OR Package Information
  • Red Hat Enterprise Linux 8 is installed
  • OR Red Hat CoreOS 4 is installed
  • AND
  • kernel-rt earlier than 0:4.18.0-193.13.2.rt13.65.el8_2 is currently running
  • OR kernel-rt earlier than 0:4.18.0-193.13.2.rt13.65.el8_2 is set to boot up on next boot
  • AND
  • kernel-rt is earlier than 0:4.18.0-193.13.2.rt13.65.el8_2
  • AND kernel-rt is signed with Red Hat redhatrelease2 key
  • kernel-rt-core is earlier than 0:4.18.0-193.13.2.rt13.65.el8_2
  • AND kernel-rt-core is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug is earlier than 0:4.18.0-193.13.2.rt13.65.el8_2
  • AND kernel-rt-debug is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug-core is earlier than 0:4.18.0-193.13.2.rt13.65.el8_2
  • AND kernel-rt-debug-core is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug-devel is earlier than 0:4.18.0-193.13.2.rt13.65.el8_2
  • AND kernel-rt-debug-devel is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug-kvm is earlier than 0:4.18.0-193.13.2.rt13.65.el8_2
  • AND kernel-rt-debug-kvm is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug-modules is earlier than 0:4.18.0-193.13.2.rt13.65.el8_2
  • AND kernel-rt-debug-modules is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug-modules-extra is earlier than 0:4.18.0-193.13.2.rt13.65.el8_2
  • AND kernel-rt-debug-modules-extra is signed with Red Hat redhatrelease2 key
  • kernel-rt-devel is earlier than 0:4.18.0-193.13.2.rt13.65.el8_2
  • AND kernel-rt-devel is signed with Red Hat redhatrelease2 key
  • kernel-rt-kvm is earlier than 0:4.18.0-193.13.2.rt13.65.el8_2
  • AND kernel-rt-kvm is signed with Red Hat redhatrelease2 key
  • kernel-rt-modules is earlier than 0:4.18.0-193.13.2.rt13.65.el8_2
  • AND kernel-rt-modules is signed with Red Hat redhatrelease2 key
  • kernel-rt-modules-extra is earlier than 0:4.18.0-193.13.2.rt13.65.el8_2
  • AND kernel-rt-modules-extra is signed with Red Hat redhatrelease2 key
  • BACK