Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2019:0514 - Security Advisory
Issued:
2019-03-12
Updated:
2019-03-12

RHSA-2019:0514 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel-rt security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel-rt is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: Memory corruption due to incorrect socket cloning (CVE-2018-9568)
  • kernel: Unprivileged users able to inspect kernel stacks of arbitrary tasks (CVE-2018-17972)
  • kernel: Faulty computation of numberic bounds in the BPF verifier (CVE-2018-18445)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • kernel-rt: update to the RHEL7.6.z batch#3 source tree (BZ#1672406)

Users of kernel-rt are advised to upgrade to these updated packages, which fix this bug.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for Real Time 7 x86_64
  • Red Hat Enterprise Linux for Real Time for NFV 7 x86_64
  • Red Hat Enterprise Linux for Real Time for x86_64 - Extended Life Cycle Support 7 x86_64

Fixes

  • BZ - 1636349 - CVE-2018-17972 kernel: Unprivileged users able to inspect kernel stacks of arbitrary tasks
  • BZ - 1640596 - CVE-2018-18445 kernel: Faulty computation of numberic bounds in the BPF verifier
  • BZ - 1655904 - CVE-2018-9568 kernel: Memory corruption due to incorrect socket cloning
  • BZ - 1672406 - kernel-rt: update to the RHEL7.6.z batch#3 source tree

CVEs

  • CVE-2018-9568
  • CVE-2018-17972
  • CVE-2018-18445

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for Real Time 7

SRPM
kernel-rt-3.10.0-957.10.1.rt56.921.el7.src.rpm SHA-256: d56a36e3ae03059d6e97bbcd90f707a56a754801702b4fb65c86013080e11efb
x86_64
kernel-rt-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: 91a1ad7087338aed70ae68b425502e6123afde6c7388f5e0102e566b3558ab9a
kernel-rt-debug-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: e2d013966f2b20a3d194ba2626d304f1b2e4f7be5b7505786c2fdc3bb8860f95
kernel-rt-debug-devel-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: 7bba2bcb04f8faa3e0386091256670155f4040312355d5fa8aa36860f8c26b62
kernel-rt-devel-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: 4e57141af0834d280d0c5d06a95b111067149dbb3f2979efd3f2729656a2ace1
kernel-rt-doc-3.10.0-957.10.1.rt56.921.el7.noarch.rpm SHA-256: 46924909694d9a26d6dba2cde8136bd8421b6679cbaab9491a70f950e45540d4
kernel-rt-trace-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: c495b295445fb4367a0f12e31a88c60cbefe2bc9574cfc5b891bd1545cecc9cf
kernel-rt-trace-devel-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: 71812fd21a198f2e99af1904d4a32a449cdff6e9af35422f36dac6d18a6b1c96

Red Hat Enterprise Linux for Real Time for NFV 7

SRPM
kernel-rt-3.10.0-957.10.1.rt56.921.el7.src.rpm SHA-256: d56a36e3ae03059d6e97bbcd90f707a56a754801702b4fb65c86013080e11efb
x86_64
kernel-rt-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: 91a1ad7087338aed70ae68b425502e6123afde6c7388f5e0102e566b3558ab9a
kernel-rt-debug-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: e2d013966f2b20a3d194ba2626d304f1b2e4f7be5b7505786c2fdc3bb8860f95
kernel-rt-debug-debuginfo-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: 80bfdeb3508e2ef2808880adc6f0f60f41c831df01a89ffc291cab72dd5e21a3
kernel-rt-debug-devel-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: 7bba2bcb04f8faa3e0386091256670155f4040312355d5fa8aa36860f8c26b62
kernel-rt-debug-kvm-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: 0c12e14cb5e4db16e2b4166d5879f4e9d75a5bb8f214c502e18cd6155d1a456f
kernel-rt-debug-kvm-debuginfo-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: 6335ad9e7806244b2916a8b45f2b282940b9decc2a7aa6ffe53f75a4eb0ef4f8
kernel-rt-debuginfo-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: ea8f9282bd81de8a2aeffaa62284feab6e089ff5a28ccb2c80cf44d2aedf3025
kernel-rt-debuginfo-common-x86_64-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: 50565c50376776fc50c8db6bf9aaf8fdb2e1857fcd012757b7c311d20403cc61
kernel-rt-devel-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: 4e57141af0834d280d0c5d06a95b111067149dbb3f2979efd3f2729656a2ace1
kernel-rt-doc-3.10.0-957.10.1.rt56.921.el7.noarch.rpm SHA-256: 46924909694d9a26d6dba2cde8136bd8421b6679cbaab9491a70f950e45540d4
kernel-rt-kvm-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: 916759c441a1597f0790c83f6626a6467b9a7bc6fa1767062644a1c012da5611
kernel-rt-kvm-debuginfo-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: 4d6e1a401e6f0f83b305a202c7aabecb106a151450c34b9ea73a40dfde17473f
kernel-rt-trace-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: c495b295445fb4367a0f12e31a88c60cbefe2bc9574cfc5b891bd1545cecc9cf
kernel-rt-trace-debuginfo-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: 8c662fd58721794ad90dc322b76f0e62e862289a316b43f9341951b571b5d328
kernel-rt-trace-devel-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: 71812fd21a198f2e99af1904d4a32a449cdff6e9af35422f36dac6d18a6b1c96
kernel-rt-trace-kvm-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: 0f0c97d250ba1c2f331447a1514707d6bda40f19f57708fd1d48b6c8f33df9fd
kernel-rt-trace-kvm-debuginfo-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: 00cc3db256ebfd8c1a74f55ea278d4d2204c7b225b72d98b5c07510d044c73cc

Red Hat Enterprise Linux for Real Time for x86_64 - Extended Life Cycle Support 7

SRPM
kernel-rt-3.10.0-957.10.1.rt56.921.el7.src.rpm SHA-256: d56a36e3ae03059d6e97bbcd90f707a56a754801702b4fb65c86013080e11efb
x86_64
kernel-rt-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: 91a1ad7087338aed70ae68b425502e6123afde6c7388f5e0102e566b3558ab9a
kernel-rt-debug-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: e2d013966f2b20a3d194ba2626d304f1b2e4f7be5b7505786c2fdc3bb8860f95
kernel-rt-debug-devel-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: 7bba2bcb04f8faa3e0386091256670155f4040312355d5fa8aa36860f8c26b62
kernel-rt-devel-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: 4e57141af0834d280d0c5d06a95b111067149dbb3f2979efd3f2729656a2ace1
kernel-rt-doc-3.10.0-957.10.1.rt56.921.el7.noarch.rpm SHA-256: 46924909694d9a26d6dba2cde8136bd8421b6679cbaab9491a70f950e45540d4
kernel-rt-trace-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: c495b295445fb4367a0f12e31a88c60cbefe2bc9574cfc5b891bd1545cecc9cf
kernel-rt-trace-devel-3.10.0-957.10.1.rt56.921.el7.x86_64.rpm SHA-256: 71812fd21a198f2e99af1904d4a32a449cdff6e9af35422f36dac6d18a6b1c96

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility