Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2019:4255 - Security Advisory
Issued:
2019-12-17
Updated:
2019-12-17

RHSA-2019:4255 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: Memory corruption due to incorrect socket cloning (CVE-2018-9568)
  • Kernel: page cache side channel attacks (CVE-2019-5489)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 6.6 x86_64

Fixes

  • BZ - 1655904 - CVE-2018-9568 kernel: Memory corruption due to incorrect socket cloning
  • BZ - 1664110 - CVE-2019-5489 Kernel: page cache side channel attacks

CVEs

  • CVE-2018-9568
  • CVE-2019-5489

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 6.6

SRPM
kernel-2.6.32-504.82.1.el6.src.rpm SHA-256: 62e7ced81442eea49dc1cfe77b0e4e76d0c642ac048d4e51614443b98e517220
x86_64
kernel-2.6.32-504.82.1.el6.x86_64.rpm SHA-256: bb99b6949722365bfa5689be197073b3c8177ca2c61aee511f230cf1a5040c1a
kernel-abi-whitelists-2.6.32-504.82.1.el6.noarch.rpm SHA-256: 59c04e24bc040182f9ca3df1059e566947249925bb3ea8f75214e27e6f4d0731
kernel-debug-2.6.32-504.82.1.el6.x86_64.rpm SHA-256: 433e3926c4ba304ba6c5d4e0e87c40267e99caa3ad51142beacb4cdac79b40db
kernel-debug-debuginfo-2.6.32-504.82.1.el6.x86_64.rpm SHA-256: 20ddf2e2cebc8d71aac2ecc3b0b737539aacd03b3b63deca3d3faf7b35e9480d
kernel-debug-debuginfo-2.6.32-504.82.1.el6.x86_64.rpm SHA-256: 20ddf2e2cebc8d71aac2ecc3b0b737539aacd03b3b63deca3d3faf7b35e9480d
kernel-debug-devel-2.6.32-504.82.1.el6.x86_64.rpm SHA-256: f0c68a760692583baec77fa1a29ebb5b79f91b64b26f6d4c8bd7bc9b59dd727a
kernel-debuginfo-2.6.32-504.82.1.el6.x86_64.rpm SHA-256: 66fe05dd7231e4155e4bb673f3207255a9f3e05dd0243b0a0504b3c194ec7592
kernel-debuginfo-2.6.32-504.82.1.el6.x86_64.rpm SHA-256: 66fe05dd7231e4155e4bb673f3207255a9f3e05dd0243b0a0504b3c194ec7592
kernel-debuginfo-common-x86_64-2.6.32-504.82.1.el6.x86_64.rpm SHA-256: 45aa95301e278918656c32254ee96b35a4527a1d43009ed2ce37a0d479de134f
kernel-debuginfo-common-x86_64-2.6.32-504.82.1.el6.x86_64.rpm SHA-256: 45aa95301e278918656c32254ee96b35a4527a1d43009ed2ce37a0d479de134f
kernel-devel-2.6.32-504.82.1.el6.x86_64.rpm SHA-256: a6acb5f6ad52b64f2b2c778bc2740b1d3f4532d078a955eba02cae54849e4664
kernel-doc-2.6.32-504.82.1.el6.noarch.rpm SHA-256: 727b3027850e756aaf47153bf47771c9ef812d12b6c595f1917904ccb6554e9f
kernel-firmware-2.6.32-504.82.1.el6.noarch.rpm SHA-256: c6aaef33a7579ca1592c461cbdc926562ae9cbc68ad46d0a8f1b281f47d4de8d
kernel-headers-2.6.32-504.82.1.el6.x86_64.rpm SHA-256: 61f20bf004cd99a062bfac2ed1f7f164b5349471d4c9c42b58efb0a0bbb22907
perf-2.6.32-504.82.1.el6.x86_64.rpm SHA-256: 015e2b8751281522b1b5aa748f4374ba78010f25e66b3118b12fd7b9c92a55aa
perf-debuginfo-2.6.32-504.82.1.el6.x86_64.rpm SHA-256: 0dd4d97f161f20f5cbf1ae010647becb68da3897fc13044e0ae12b058e570daf
perf-debuginfo-2.6.32-504.82.1.el6.x86_64.rpm SHA-256: 0dd4d97f161f20f5cbf1ae010647becb68da3897fc13044e0ae12b058e570daf
python-perf-2.6.32-504.82.1.el6.x86_64.rpm SHA-256: b0e6c8837e21c2057f6017bd4b38162003f2cbbc0e09c37f4501a80526e9e074
python-perf-debuginfo-2.6.32-504.82.1.el6.x86_64.rpm SHA-256: 3b1b7aafc6c7bb27698201410b46af439dc28114463bbb935b0a4edb420f1cbb
python-perf-debuginfo-2.6.32-504.82.1.el6.x86_64.rpm SHA-256: 3b1b7aafc6c7bb27698201410b46af439dc28114463bbb935b0a4edb420f1cbb

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility