Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2018:2763 - Security Advisory
Issued:
2018-09-25
Updated:
2018-09-25

RHSA-2018:2763 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel-rt security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel-rt is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: Integer overflow in Linux's create_elf_tables function (CVE-2018-14634)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Red Hat would like to thank Qualys Research Labs for reporting this issue.

Bug Fix(es):

  • The kernel-rt packages have been upgraded to the 3.10.0-862.14.3 source tree, which provides a number of bug fixes over the previous version. (BZ#1616429)
  • Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1617941)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for Real Time 7 x86_64
  • Red Hat Enterprise Linux for Real Time for NFV 7 x86_64
  • Red Hat Enterprise Linux for Real Time for x86_64 - Extended Life Cycle Support 7 x86_64

Fixes

  • BZ - 1616429 - kernel-rt: update to the RHEL7.5.z batch#4 source tree
  • BZ - 1617941 - RT system hang due to wrong of rq's nr_running [rhel-7.5.z]
  • BZ - 1624498 - CVE-2018-14634 kernel: Integer overflow in Linux's create_elf_tables function

CVEs

  • CVE-2018-14634

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for Real Time 7

SRPM
kernel-rt-3.10.0-862.14.4.rt56.821.el7.src.rpm SHA-256: 6202eaf4c8276986fc6275cb805761ec26eebeceecba6aa6b492b01742ff99b6
x86_64
kernel-rt-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: f02887c4c745277a143d5f19fcf6d4e49adac73a49df2eb4e57fd81533cafbb9
kernel-rt-debug-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: 03be9e90fb948e4c905e72db460f8aba92b64ef1ecf969827b08f1adb5b2749d
kernel-rt-debug-devel-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: 983cf08d363716d0946328033c27ac8e75617b906d0ffc3f97905b766ec99d3d
kernel-rt-devel-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: 6827ff6659f4f8b743620a0d7b9deb401673488f9a795a91a1c5aef9adb9bc74
kernel-rt-doc-3.10.0-862.14.4.rt56.821.el7.noarch.rpm SHA-256: 5af78f85061f510a2b967f9facf3ec57b35f74d110d238fc64450da815d9fadb
kernel-rt-trace-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: b2130b0f3b6148f488b535155e96abebc91803b958c224b0ce8e26dcdd806a30
kernel-rt-trace-devel-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: ec5691d92b97dedf14341d006ee394bd267e39818054a7b9194d38bd0641e24e

Red Hat Enterprise Linux for Real Time for NFV 7

SRPM
kernel-rt-3.10.0-862.14.4.rt56.821.el7.src.rpm SHA-256: 6202eaf4c8276986fc6275cb805761ec26eebeceecba6aa6b492b01742ff99b6
x86_64
kernel-rt-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: f02887c4c745277a143d5f19fcf6d4e49adac73a49df2eb4e57fd81533cafbb9
kernel-rt-debug-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: 03be9e90fb948e4c905e72db460f8aba92b64ef1ecf969827b08f1adb5b2749d
kernel-rt-debug-debuginfo-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: 19bfb63ba16ed80e2eee9a19496a0305ef310372f1a5a46d8ac3b38509b6f2be
kernel-rt-debug-devel-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: 983cf08d363716d0946328033c27ac8e75617b906d0ffc3f97905b766ec99d3d
kernel-rt-debug-kvm-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: 71dc3f16a30d52534ff9218748cdfa656e6648e72809e32bd498021332bc7b26
kernel-rt-debug-kvm-debuginfo-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: f495b298408ea45264a34629795fb5d278fa3b5a1b278b11c648a535b0024c09
kernel-rt-debuginfo-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: d8761bf2aab6391d4fc1e6964cf645fcfdd8ab3a2e5c227f8588ef829d7ebfa9
kernel-rt-debuginfo-common-x86_64-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: a25aa077b84c1fe697685a7848657e3fab95c1e0a28d78a1c73862f6f8800d6a
kernel-rt-devel-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: 6827ff6659f4f8b743620a0d7b9deb401673488f9a795a91a1c5aef9adb9bc74
kernel-rt-doc-3.10.0-862.14.4.rt56.821.el7.noarch.rpm SHA-256: 5af78f85061f510a2b967f9facf3ec57b35f74d110d238fc64450da815d9fadb
kernel-rt-kvm-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: ded80ed91a4c31cdb31a6b21700a6ae1d6d7c3f6568a6635ed04b7255cea37cc
kernel-rt-kvm-debuginfo-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: 0378fe4db7f1b99db836df6f9307fbedb0737c032a4e2a711275a7aeb7646e2a
kernel-rt-trace-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: b2130b0f3b6148f488b535155e96abebc91803b958c224b0ce8e26dcdd806a30
kernel-rt-trace-debuginfo-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: 6bada1919b64d0549e416d9102849841320d967f60ba992cdde9d1949f39bc8c
kernel-rt-trace-devel-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: ec5691d92b97dedf14341d006ee394bd267e39818054a7b9194d38bd0641e24e
kernel-rt-trace-kvm-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: 184b2eff4c0dba83dcfd0f194edd5e90a5bb93e789ed8e0b3bf84f730bf67aef
kernel-rt-trace-kvm-debuginfo-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: 2e428e438c9f40f1c31fab61d46238c55df0c28e684b9213198e9be1ae1ec742

Red Hat Enterprise Linux for Real Time for x86_64 - Extended Life Cycle Support 7

SRPM
kernel-rt-3.10.0-862.14.4.rt56.821.el7.src.rpm SHA-256: 6202eaf4c8276986fc6275cb805761ec26eebeceecba6aa6b492b01742ff99b6
x86_64
kernel-rt-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: f02887c4c745277a143d5f19fcf6d4e49adac73a49df2eb4e57fd81533cafbb9
kernel-rt-debug-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: 03be9e90fb948e4c905e72db460f8aba92b64ef1ecf969827b08f1adb5b2749d
kernel-rt-debug-devel-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: 983cf08d363716d0946328033c27ac8e75617b906d0ffc3f97905b766ec99d3d
kernel-rt-devel-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: 6827ff6659f4f8b743620a0d7b9deb401673488f9a795a91a1c5aef9adb9bc74
kernel-rt-doc-3.10.0-862.14.4.rt56.821.el7.noarch.rpm SHA-256: 5af78f85061f510a2b967f9facf3ec57b35f74d110d238fc64450da815d9fadb
kernel-rt-trace-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: b2130b0f3b6148f488b535155e96abebc91803b958c224b0ce8e26dcdd806a30
kernel-rt-trace-devel-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm SHA-256: ec5691d92b97dedf14341d006ee394bd267e39818054a7b9194d38bd0641e24e

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility