-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security update Advisory ID: RHSA-2018:1354-01 Product: Red Hat Enterprise MRG for RHEL-6 Advisory URL: https://access.redhat.com/errata/RHSA-2018:1354 Issue date: 2018-05-08 CVE Names: CVE-2018-8897 CVE-2018-1000199 ===================================================================== 1. Summary: An update for kernel-rt is now available for Red Hat Enterprise MRG 2. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat MRG Realtime for RHEL 6 Server v.2 - noarch, x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * Kernel: error in exception handling leads to DoS (CVE-2018-8897) * kernel: ptrace() incorrect error handling leads to corruption and DoS (CVE-2018-1000199) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897 and Andy Lutomirski for reporting CVE-2018-1000199. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1567074 - CVE-2018-8897 Kernel: error in exception handling leads to DoS 1568477 - CVE-2018-1000199 kernel: ptrace() incorrect error handling leads to corruption and DoS 6. Package List: Red Hat MRG Realtime for RHEL 6 Server v.2: Source: kernel-rt-3.10.0-693.25.4.rt56.613.el6rt.src.rpm noarch: kernel-rt-doc-3.10.0-693.25.4.rt56.613.el6rt.noarch.rpm kernel-rt-firmware-3.10.0-693.25.4.rt56.613.el6rt.noarch.rpm x86_64: kernel-rt-3.10.0-693.25.4.rt56.613.el6rt.x86_64.rpm kernel-rt-debug-3.10.0-693.25.4.rt56.613.el6rt.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-693.25.4.rt56.613.el6rt.x86_64.rpm kernel-rt-debug-devel-3.10.0-693.25.4.rt56.613.el6rt.x86_64.rpm kernel-rt-debuginfo-3.10.0-693.25.4.rt56.613.el6rt.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-693.25.4.rt56.613.el6rt.x86_64.rpm kernel-rt-devel-3.10.0-693.25.4.rt56.613.el6rt.x86_64.rpm kernel-rt-trace-3.10.0-693.25.4.rt56.613.el6rt.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-693.25.4.rt56.613.el6rt.x86_64.rpm kernel-rt-trace-devel-3.10.0-693.25.4.rt56.613.el6rt.x86_64.rpm kernel-rt-vanilla-3.10.0-693.25.4.rt56.613.el6rt.x86_64.rpm kernel-rt-vanilla-debuginfo-3.10.0-693.25.4.rt56.613.el6rt.x86_64.rpm kernel-rt-vanilla-devel-3.10.0-693.25.4.rt56.613.el6rt.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-8897 https://access.redhat.com/security/cve/CVE-2018-1000199 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/pop_ss 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFa8iQ8XlSAg2UNWIIRAoqDAJ9siam0IVq9gIDIU9hUCVefEzXhqwCeM+yZ 9HmYQhip/gvWW/HC78IzkF4= =ChKJ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce