- Issued:
- 2020-04-28
- Updated:
- 2020-04-28
RHSA-2020:1567 - Important: kernel-rt security, bug fix, and enhancement update
Synopsis
Important: kernel-rt security, bug fix, and enhancement update
Type/Severity
Security Advisory Important
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
-
kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768)
-
kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)
-
kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service (CVE-2019-8980)
-
kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol. (CVE-2019-17053)
-
kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol. (CVE-2019-17055)
-
kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c (CVE-2019-18805)
-
kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (CVE-2019-19534)
-
kernel: some ipv6 protocols not encrypted over ipsec tunnel. (CVE-2020-1749)
-
Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR (CVE-2019-10639)
-
kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure (CVE-2019-15090)
-
kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash (CVE-2019-15099)
-
kernel: Null pointer dereference in the sound/usb/line6/pcm.c (CVE-2019-15221)
-
kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS (CVE-2019-19057)
-
kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS) (CVE-2019-19073)
-
kernel: a memory leak in the ath9k management function in allows local DoS (CVE-2019-19074)
-
kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications (CVE-2019-19922)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
-
RT: update RT source tree to the RHEL-8.2 tree (BZ#1708716)
-
KVM-RT guest fails boot with emulatorsched (BZ#1712781)
-
8 vCPU guest need max latency < 20 us with stress [RT-8.2] (BZ#1757165)
-
Request nx_huge_pages=N as default value to avoid kvm-rt guest large latency spike [rt-8] (BZ#1788352)
-
RT: Add rpm Provide of 'kernel' to indicate that this is a kernel package (BZ#1796284)
-
[RHEL8] RT kernel signed by test certificate and not Red Hat Secure Boot (BZ#1806871)
Enhancement(s):
- update to the upstream 5.x RT patchset (BZ#1680161)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension | 8.8 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension | 8.6 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension | 8.4 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Life Cycle | 8.10 | x86_64 |
| Red Hat Enterprise Linux for Real Time | 8 | x86_64 |
| Red Hat Enterprise Linux for Real Time for NFV | 8 | x86_64 |
| Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service | 8.8 | x86_64 |
| Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service | 8.6 | x86_64 |
| Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service | 8.4 | x86_64 |
| Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service | 8.2 | x86_64 |
| Red Hat Enterprise Linux for Real Time - Telecommunications Update Service | 8.8 | x86_64 |
| Red Hat Enterprise Linux for Real Time - Telecommunications Update Service | 8.6 | x86_64 |
| Red Hat Enterprise Linux for Real Time - Telecommunications Update Service | 8.4 | x86_64 |
| Red Hat Enterprise Linux for Real Time - Telecommunications Update Service | 8.2 | x86_64 |
Updated Packages
- kernel-rt-devel-4.18.0-193.rt13.51.el8.x86_64.rpm
- kernel-rt-debug-modules-4.18.0-193.rt13.51.el8.x86_64.rpm
- kernel-rt-debuginfo-4.18.0-193.rt13.51.el8.x86_64.rpm
- kernel-rt-4.18.0-193.rt13.51.el8.src.rpm
- kernel-rt-kvm-4.18.0-193.rt13.51.el8.x86_64.rpm
- kernel-rt-debug-kvm-4.18.0-193.rt13.51.el8.x86_64.rpm
- kernel-rt-modules-extra-4.18.0-193.rt13.51.el8.x86_64.rpm
- kernel-rt-debug-core-4.18.0-193.rt13.51.el8.x86_64.rpm
- kernel-rt-4.18.0-193.rt13.51.el8.x86_64.rpm
- kernel-rt-debug-4.18.0-193.rt13.51.el8.x86_64.rpm
- kernel-rt-debuginfo-common-x86_64-4.18.0-193.rt13.51.el8.x86_64.rpm
- kernel-rt-core-4.18.0-193.rt13.51.el8.x86_64.rpm
- kernel-rt-debug-modules-extra-4.18.0-193.rt13.51.el8.x86_64.rpm
- kernel-rt-debug-devel-4.18.0-193.rt13.51.el8.x86_64.rpm
- kernel-rt-modules-4.18.0-193.rt13.51.el8.x86_64.rpm
- kernel-rt-debug-debuginfo-4.18.0-193.rt13.51.el8.x86_64.rpm
Fixes
- This content is not included.BZ - 1655162
- This content is not included.BZ - 1679972
- This content is not included.BZ - 1708716
- This content is not included.BZ - 1712781
- This content is not included.BZ - 1729933
- This content is not included.BZ - 1743526
- This content is not included.BZ - 1743560
- This content is not included.BZ - 1749974
- This content is not included.BZ - 1757165
- This content is not included.BZ - 1758242
- This content is not included.BZ - 1758248
- This content is not included.BZ - 1768730
- This content is not included.BZ - 1771496
- This content is not included.BZ - 1772738
- This content is not included.BZ - 1774933
- This content is not included.BZ - 1774937
- This content is not included.BZ - 1775050
- This content is not included.BZ - 1783540
- This content is not included.BZ - 1786164
- This content is not included.BZ - 1788352
- This content is not included.BZ - 1792512
- This content is not included.BZ - 1796284
- This content is not included.BZ - 1806871
- This content is not included.BZ - 1809833
CVEs
- CVE-2018-16871
- CVE-2019-5108
- CVE-2019-8980
- CVE-2019-10639
- CVE-2019-12819
- CVE-2019-15090
- CVE-2019-15099
- CVE-2019-15221
- CVE-2019-15223
- CVE-2019-16234
- CVE-2019-17053
- CVE-2019-17055
- CVE-2019-18282
- CVE-2019-18805
- CVE-2019-19045
- CVE-2019-19047
- CVE-2019-19055
- CVE-2019-19057
- CVE-2019-19058
- CVE-2019-19059
- CVE-2019-19065
- CVE-2019-19067
- CVE-2019-19073
- CVE-2019-19074
- CVE-2019-19077
- CVE-2019-19532
- CVE-2019-19534
- CVE-2019-19768
- CVE-2019-19922
- CVE-2020-1749
- CVE-2020-7053
- CVE-2020-10690
- CVE-2021-33630
References
- https://access.redhat.com/security/updates/classification/#important
- https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.