Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2020:0204 - Security Advisory
Issued:
2020-01-22
Updated:
2020-01-22

RHSA-2020:0204 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)
  • hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)
  • kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884)
  • hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write (CVE-2019-0155)
  • Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900)
  • Kernel: page cache side channel attacks (CVE-2019-5489)
  • hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) (CVE-2019-9506)
  • kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c (CVE-2019-10126)
  • kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver (CVE-2019-14816)
  • Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821)
  • kernel: heap overflow in marvell/mwifiex/tdls.c (CVE-2019-14901)
  • hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Backport TCP follow-up for small buffers (BZ#1739184)
  • TCP performance regression after CVE-2019-11478 bug fix (BZ#1743170)
  • RHEL8.0 - bnx2x link down, caused by transmit timeouts during load test (Marvell/Cavium/QLogic) (L3:) (BZ#1743548)
  • block: blk-mq improvement (BZ#1780567)
  • RHEL8.0 - Regression to RHEL7.6 by changing force_latency found during RHEL8.0 validation for SAP HANA on POWER (BZ#1781111)
  • blk-mq: overwirte performance drops on real MQ device (BZ#1782183)
  • RHEL8: creating vport takes lot of memory i.e 2GB per vport which leads to drain out system memory quickly. (BZ#1782705)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.0 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.0 x86_64

Fixes

  • BZ - 1646768 - CVE-2018-12207 hw: Machine Check Error on Page Size Change (IFU)
  • BZ - 1660375 - CVE-2018-16884 kernel: nfs: use-after-free in svc_process_common()
  • BZ - 1664110 - CVE-2019-5489 Kernel: page cache side channel attacks
  • BZ - 1698757 - CVE-2019-3900 Kernel: vhost_net: infinite loop while receiving packets leads to DoS
  • BZ - 1716992 - CVE-2019-10126 kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c
  • BZ - 1724393 - CVE-2019-0154 hw: Intel GPU Denial Of Service while accessing MMIO in lower power state
  • BZ - 1724398 - CVE-2019-0155 hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write
  • BZ - 1727857 - CVE-2019-9506 hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)
  • BZ - 1744149 - CVE-2019-14816 kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver
  • BZ - 1746708 - CVE-2019-14821 Kernel: KVM: OOB memory access via mmio ring buffer
  • BZ - 1753062 - CVE-2019-11135 hw: TSX Transaction Asynchronous Abort (TAA)
  • BZ - 1773519 - CVE-2019-14901 kernel: heap overflow in marvell/mwifiex/tdls.c

CVEs

  • CVE-2018-12207
  • CVE-2018-16884
  • CVE-2019-0154
  • CVE-2019-0155
  • CVE-2019-3900
  • CVE-2019-5489
  • CVE-2019-9506
  • CVE-2019-10126
  • CVE-2019-11135
  • CVE-2019-14816
  • CVE-2019-14821
  • CVE-2019-14901

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/security/vulnerabilities/ifu-page-mce
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.0

SRPM
kernel-4.18.0-80.15.1.el8_0.src.rpm SHA-256: 664ccf2bd0232150321aa2099031671b23abac2637ca43f82bc4b1c4c3828c0f
ppc64le
bpftool-4.18.0-80.15.1.el8_0.ppc64le.rpm SHA-256: 4366c66993fc73fb678b76d58e7f5cceb6cc064d73ffa8f5294d3a9631d1056e
bpftool-debuginfo-4.18.0-80.15.1.el8_0.ppc64le.rpm SHA-256: 540918f26d93216b737150ed3cab6359c898e3b39b00887aea603973ab2af803
kernel-4.18.0-80.15.1.el8_0.ppc64le.rpm SHA-256: 6455cd35e1fa25ce49fb51fc0017caa3bc52080bda66300fbc64a2c92c54ecd3
kernel-abi-whitelists-4.18.0-80.15.1.el8_0.noarch.rpm SHA-256: 626c39859b460337eba7cf04fcd3a09b84e64cac12f96f1cba32fcaf2b16513e
kernel-core-4.18.0-80.15.1.el8_0.ppc64le.rpm SHA-256: be3dd11aab070eb9ae011d6758f87c8237662260cd228f596674978aa242e4c6
kernel-cross-headers-4.18.0-80.15.1.el8_0.ppc64le.rpm SHA-256: e264e6a197f90553134d3c6f223b45e97bee1bd96410ed51c41927996d2d2b73
kernel-debug-4.18.0-80.15.1.el8_0.ppc64le.rpm SHA-256: 1a35fbc05f4c1a94a3ba8de6e07f60aaea5e7fae67c586b06f33975c51058af8
kernel-debug-core-4.18.0-80.15.1.el8_0.ppc64le.rpm SHA-256: 84c120badb447101614c9f05db3b0d7f1a89333cdbf5d928735912ca365820c5
kernel-debug-debuginfo-4.18.0-80.15.1.el8_0.ppc64le.rpm SHA-256: 093b183900b58cbf712a2201949a06db5926100f2f5720f73859d8431f9ba617
kernel-debug-devel-4.18.0-80.15.1.el8_0.ppc64le.rpm SHA-256: 0211f921fab5638abff51fad058654b9c2718e20105ee22e476b3a7a7705f35a
kernel-debug-modules-4.18.0-80.15.1.el8_0.ppc64le.rpm SHA-256: ddc5491e53663ca8a53ab846461174a837d28dcfb57da5ee344634963d2b37b3
kernel-debug-modules-extra-4.18.0-80.15.1.el8_0.ppc64le.rpm SHA-256: 4f833f9a63ddc03cdd4d4aa875fc47938c789505cfbf40e12a2df2f03a6b2aa4
kernel-debuginfo-4.18.0-80.15.1.el8_0.ppc64le.rpm SHA-256: c84d07a4b7357944f3a0c22064cacfb388fa3a1436612a227e64daf62630c63f
kernel-debuginfo-common-ppc64le-4.18.0-80.15.1.el8_0.ppc64le.rpm SHA-256: e21e012cc721888bb859777babe7741d2624b98e9419ecf3499e3297b55f3eac
kernel-devel-4.18.0-80.15.1.el8_0.ppc64le.rpm SHA-256: 9b04d34a3b4c39d4f534ac7eac0e12e1096dd8abda78239014ac4888293f30a3
kernel-doc-4.18.0-80.15.1.el8_0.noarch.rpm SHA-256: 9e1096c331d85ccd8c0de725f883e0da7c98fef165db6ee51afa41c08ea3a867
kernel-headers-4.18.0-80.15.1.el8_0.ppc64le.rpm SHA-256: 585cb2babac7dd1758962ee18c48dc91a9e6576ad45e5109ea3211488d3e6bb9
kernel-modules-4.18.0-80.15.1.el8_0.ppc64le.rpm SHA-256: 3fcd48ed427e77054e86331b7f986b96f54d2117a5cea0a1a49eb0ccb39695a9
kernel-modules-extra-4.18.0-80.15.1.el8_0.ppc64le.rpm SHA-256: c5a177d061a5ee17c2e0e016b7d66303beab34872e39b170b38a16450c41037f
kernel-tools-4.18.0-80.15.1.el8_0.ppc64le.rpm SHA-256: 03ca3c73b1d41eb7ad834aba6b1da7cee6b490141c9db3cff6aa2018f854ee94
kernel-tools-debuginfo-4.18.0-80.15.1.el8_0.ppc64le.rpm SHA-256: 986cc826222e9f023f1e0c52d5530b5c3a233481f3f605250255db9985c8eafb
kernel-tools-libs-4.18.0-80.15.1.el8_0.ppc64le.rpm SHA-256: 8ca458b31ccb75d647e8909b13312da29cd270f12a69881733cf9eefeb9eaf18
perf-4.18.0-80.15.1.el8_0.ppc64le.rpm SHA-256: 33c52458b90133670ce21ec001f4cdc6a1107cad4e85b7bb91b05abdeabf3aae
perf-debuginfo-4.18.0-80.15.1.el8_0.ppc64le.rpm SHA-256: e0417d2d47632f9ee9922215a8ad5c107aab5557faed1eca5e19026912a04262
python3-perf-4.18.0-80.15.1.el8_0.ppc64le.rpm SHA-256: b2ccccd0e6f6248e5fee9fa2e1d3365200038b0e5badd1d8293c3b75d4934e7a
python3-perf-debuginfo-4.18.0-80.15.1.el8_0.ppc64le.rpm SHA-256: ca51f2064fe70ce4c216bb498723150c4e7b892fd31c569854cc61d4962343a5

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.0

SRPM
kernel-4.18.0-80.15.1.el8_0.src.rpm SHA-256: 664ccf2bd0232150321aa2099031671b23abac2637ca43f82bc4b1c4c3828c0f
x86_64
bpftool-4.18.0-80.15.1.el8_0.x86_64.rpm SHA-256: ab7ab51222518fcd279506875fce71118bba50833271decfc343cbe36b2d0404
bpftool-debuginfo-4.18.0-80.15.1.el8_0.x86_64.rpm SHA-256: f2ec04dbc53772020909538d0e5160cb5e6daec5715622ef04a600b954df540f
kernel-4.18.0-80.15.1.el8_0.x86_64.rpm SHA-256: 7e46a52b32c001cc73f6a52f8c3d22e4edfb60a35ac693180402c62bf49de2b8
kernel-abi-whitelists-4.18.0-80.15.1.el8_0.noarch.rpm SHA-256: 626c39859b460337eba7cf04fcd3a09b84e64cac12f96f1cba32fcaf2b16513e
kernel-core-4.18.0-80.15.1.el8_0.x86_64.rpm SHA-256: a41405b0ef17c71bd25faf24c0c13a78318b0179858dbfbb905f704014d14b0a
kernel-cross-headers-4.18.0-80.15.1.el8_0.x86_64.rpm SHA-256: 2d9d3ecfe1c223d1c1889408f4675d7cd2028f093e521929078cdbbc8ad763d1
kernel-debug-4.18.0-80.15.1.el8_0.x86_64.rpm SHA-256: ccecef75b1fa9f5dfbccd0b065e593962bbe89dd53db83176f0171a5da74a586
kernel-debug-core-4.18.0-80.15.1.el8_0.x86_64.rpm SHA-256: c7e5568a7f7b1d7b7af21e40241e6f736870961083c5c86ea67c23f03ef6f86d
kernel-debug-debuginfo-4.18.0-80.15.1.el8_0.x86_64.rpm SHA-256: 9613b8d5a396d27aa88b1407183bce85aefde61245808382f7c2a49433b9a222
kernel-debug-devel-4.18.0-80.15.1.el8_0.x86_64.rpm SHA-256: 9b521f00b49b2a3c1a8814102bd3469dc084b22f16bc15aead90e984323164e6
kernel-debug-modules-4.18.0-80.15.1.el8_0.x86_64.rpm SHA-256: 3e96302097aa39fc8e2a1dca5948d276748ee495aa8ae05b99b0e71b99c4d6d8
kernel-debug-modules-extra-4.18.0-80.15.1.el8_0.x86_64.rpm SHA-256: b2cb6281e390b6d22c329cf4247ae040b7343b2dce43ed01366364c8e5904dff
kernel-debuginfo-4.18.0-80.15.1.el8_0.x86_64.rpm SHA-256: 0f76c7f5a850a9ea7a375dd4b913e40f853c1c18a76e5f3c0622d44ffad9849d
kernel-debuginfo-common-x86_64-4.18.0-80.15.1.el8_0.x86_64.rpm SHA-256: de572119beb920f702be4ef1af507d89a0984eb2d4d01734a95a7eefa2d91a7d
kernel-devel-4.18.0-80.15.1.el8_0.x86_64.rpm SHA-256: 45bd3888dc37e24ec70cea6014f99c91f4d3eda4ccf1ed3ecf7fc1866dc97f6b
kernel-doc-4.18.0-80.15.1.el8_0.noarch.rpm SHA-256: 9e1096c331d85ccd8c0de725f883e0da7c98fef165db6ee51afa41c08ea3a867
kernel-headers-4.18.0-80.15.1.el8_0.x86_64.rpm SHA-256: 68c2e9acf24f34c5fb45eace11596cd591f165fcb1199bf9acb30fe9837764dc
kernel-modules-4.18.0-80.15.1.el8_0.x86_64.rpm SHA-256: 9264f9107dbf3a10eb6e75a2cd344b150d07f32106877457b5e571c44230a8a3
kernel-modules-extra-4.18.0-80.15.1.el8_0.x86_64.rpm SHA-256: 0d2cbafe3e7f1f43009a1239480213886df10644f766551940b9ea630e8f0c9d
kernel-tools-4.18.0-80.15.1.el8_0.x86_64.rpm SHA-256: a95555a61834c173030bc11d2207ad8adef8602adc57e3c085bf425320947ca9
kernel-tools-debuginfo-4.18.0-80.15.1.el8_0.x86_64.rpm SHA-256: 2a6ea432c3bc394b5d23b9b3c75417c22245820ff7aec84f2c5ccb52afbdf60e
kernel-tools-libs-4.18.0-80.15.1.el8_0.x86_64.rpm SHA-256: d85696595dabccafa9ea73e1f98df3308cd1168c294d51bc7f78ad6bed67202a
perf-4.18.0-80.15.1.el8_0.x86_64.rpm SHA-256: c0a09f9fe213da349d782ac109ec19169ec45826f45a16975c2098bdcbffd9eb
perf-debuginfo-4.18.0-80.15.1.el8_0.x86_64.rpm SHA-256: 3f3bc563f80df6ec6cc29ee382a3dc79bbdc61b4a7806b3975aba360b2398bd9
python3-perf-4.18.0-80.15.1.el8_0.x86_64.rpm SHA-256: b5d16bc5ae8244662112e0d3fe46c173d4e737bf1c0bdbc1cd531fc06d7fbc93
python3-perf-debuginfo-4.18.0-80.15.1.el8_0.x86_64.rpm SHA-256: 91acc946ecc17349c4824700d9b7033e1d4c5f39d4df55f83e4383492feaf38a

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility