Oval Definition:oval:com.redhat.rhsa:def:20204062
Revision Date:2020-09-29Version:643
Title:RHSA-2020:4062: kernel-rt security and bug fix update (Important)
Description:The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: use-after-free in sound/core/timer.c (CVE-2019-19807)

  • kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c (CVE-2017-18551)

  • kernel: race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c leads to use-after-free (CVE-2018-20836)

  • kernel: out of bounds write in i2c driver leads to local escalation of privilege (CVE-2019-9454)

  • kernel: use after free due to race condition in the video driver leads to local privilege escalation (CVE-2019-9458)

    Space precludes documenting all of the security fixes in this advisory. See the descriptions of the remaining security fixes in the related Knowledge Article:

    https://access.redhat.com/articles/5442481

    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

    Additional Changes:

    For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.
  • Family:unixClass:patch
    Status:Reference(s):CVE-2017-18551
    CVE-2018-20836
    CVE-2019-15217
    CVE-2019-15807
    CVE-2019-15917
    CVE-2019-16231
    CVE-2019-16233
    CVE-2019-16994
    CVE-2019-17053
    CVE-2019-17055
    CVE-2019-18808
    CVE-2019-19046
    CVE-2019-19055
    CVE-2019-19058
    CVE-2019-19059
    CVE-2019-19062
    CVE-2019-19063
    CVE-2019-19332
    CVE-2019-19447
    CVE-2019-19523
    CVE-2019-19524
    CVE-2019-19530
    CVE-2019-19534
    CVE-2019-19537
    CVE-2019-19767
    CVE-2019-19807
    CVE-2019-20054
    CVE-2019-20095
    CVE-2019-20636
    CVE-2019-9454
    CVE-2019-9458
    CVE-2020-10690
    CVE-2020-10732
    CVE-2020-10742
    CVE-2020-10751
    CVE-2020-10942
    CVE-2020-11565
    CVE-2020-12770
    CVE-2020-12826
    CVE-2020-14305
    CVE-2020-1749
    CVE-2020-2732
    CVE-2020-8647
    CVE-2020-8649
    CVE-2020-9383
    RHSA-2020:4062
    Platform(s):Red Hat Enterprise Linux 7
    Product(s):
    Definition Synopsis
  • Red Hat Enterprise Linux must be installed
  • OR Package Information
  • Red Hat Enterprise Linux 7 is installed
  • AND
  • kernel-rt earlier than 0:3.10.0-1160.rt56.1131.el7 is currently running
  • OR kernel-rt earlier than 0:3.10.0-1160.rt56.1131.el7 is set to boot up on next boot
  • AND
  • kernel-rt is earlier than 0:3.10.0-1160.rt56.1131.el7
  • AND kernel-rt is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug is earlier than 0:3.10.0-1160.rt56.1131.el7
  • AND kernel-rt-debug is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug-devel is earlier than 0:3.10.0-1160.rt56.1131.el7
  • AND kernel-rt-debug-devel is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug-kvm is earlier than 0:3.10.0-1160.rt56.1131.el7
  • AND kernel-rt-debug-kvm is signed with Red Hat redhatrelease2 key
  • kernel-rt-devel is earlier than 0:3.10.0-1160.rt56.1131.el7
  • AND kernel-rt-devel is signed with Red Hat redhatrelease2 key
  • kernel-rt-doc is earlier than 0:3.10.0-1160.rt56.1131.el7
  • AND kernel-rt-doc is signed with Red Hat redhatrelease2 key
  • kernel-rt-kvm is earlier than 0:3.10.0-1160.rt56.1131.el7
  • AND kernel-rt-kvm is signed with Red Hat redhatrelease2 key
  • kernel-rt-trace is earlier than 0:3.10.0-1160.rt56.1131.el7
  • AND kernel-rt-trace is signed with Red Hat redhatrelease2 key
  • kernel-rt-trace-devel is earlier than 0:3.10.0-1160.rt56.1131.el7
  • AND kernel-rt-trace-devel is signed with Red Hat redhatrelease2 key
  • kernel-rt-trace-kvm is earlier than 0:3.10.0-1160.rt56.1131.el7
  • AND kernel-rt-trace-kvm is signed with Red Hat redhatrelease2 key
  • BACK