Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2020:3041 - Security Advisory
Issued:
2020-07-21
Updated:
2020-07-21

RHSA-2020:3041 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)
  • kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)
  • kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)
  • kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)
  • kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)
  • kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)
  • Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • [ESXi][RHEL8.1.0] scsi driver SG list incompatibility (vmw_pvscsi) (BZ#1839359)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.0 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.0 x86_64

Fixes

  • BZ - 1831868 - CVE-2020-12653 kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c
  • BZ - 1832530 - CVE-2020-12654 kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c
  • BZ - 1836244 - CVE-2020-12888 Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario
  • BZ - 1842525 - CVE-2020-10757 kernel: kernel: DAX hugepages not considered during mremap
  • BZ - 1845840 - CVE-2020-10766 kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection.
  • BZ - 1845867 - CVE-2020-10767 kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available.
  • BZ - 1845868 - CVE-2020-10768 kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command.

CVEs

  • CVE-2020-10757
  • CVE-2020-10766
  • CVE-2020-10767
  • CVE-2020-10768
  • CVE-2020-12653
  • CVE-2020-12654
  • CVE-2020-12888

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.0

SRPM
kernel-4.18.0-80.27.1.el8_0.src.rpm SHA-256: 8a266d5197ff27a651a2bda6003f7e4ca35dbe526dd363b66071df8084957fcc
ppc64le
bpftool-4.18.0-80.27.1.el8_0.ppc64le.rpm SHA-256: d03aa2fd0fdd6eba206e95d2e1aecef02595199e1670664f86b56ac2cb3ef9b5
bpftool-debuginfo-4.18.0-80.27.1.el8_0.ppc64le.rpm SHA-256: 0975a622822de844e00e419dd858511bb2c99f669b17baecb3e7fd097708eee4
kernel-4.18.0-80.27.1.el8_0.ppc64le.rpm SHA-256: f5c1a9fd120a0146972476fa874cb17fbc889286ef226878b2b46dd4abe7e83c
kernel-abi-whitelists-4.18.0-80.27.1.el8_0.noarch.rpm SHA-256: 874f942d2441c4be8df1135d79711fd44bee5ba649a80ad4d8a9d41eff459abe
kernel-core-4.18.0-80.27.1.el8_0.ppc64le.rpm SHA-256: 7f6642f60599b51fd500490137b541aafcf589ca448eeaa4d1fb64aa4eb245f0
kernel-cross-headers-4.18.0-80.27.1.el8_0.ppc64le.rpm SHA-256: c293a4ba8698a3a9e7148114e304de5245eb5f3ee89c2b6e959cd98243d587ee
kernel-debug-4.18.0-80.27.1.el8_0.ppc64le.rpm SHA-256: d17a8d019c3be54ed91124f7994ba0c3efa44ad97a100f9feeaaeef43222348d
kernel-debug-core-4.18.0-80.27.1.el8_0.ppc64le.rpm SHA-256: 482b83792c26c5ec6ea06ae20f4ea488fde45a466d4d1bb8de30204358cbf248
kernel-debug-debuginfo-4.18.0-80.27.1.el8_0.ppc64le.rpm SHA-256: c80e65ec2438e4a2418c60a4668f5d997d5ca55afd129157c1bd7217f99c0a7a
kernel-debug-devel-4.18.0-80.27.1.el8_0.ppc64le.rpm SHA-256: 6778b0ca13ff764f7d14410b7ef0467257136ca307b8636dd6bcc513ddc84c28
kernel-debug-modules-4.18.0-80.27.1.el8_0.ppc64le.rpm SHA-256: f7c08878ff53191de6040aa9c1313d68de41090c148b50b83662300b9cbd115e
kernel-debug-modules-extra-4.18.0-80.27.1.el8_0.ppc64le.rpm SHA-256: 380236544defe54ad003d1c28b57c8576f54a7c3430a7c6d8c03516f11ac0b94
kernel-debuginfo-4.18.0-80.27.1.el8_0.ppc64le.rpm SHA-256: 7f8d1fa59b835b8e64ea70a84ba87be9351a9bf1ee5d5346786c8baf5c5d37c6
kernel-debuginfo-common-ppc64le-4.18.0-80.27.1.el8_0.ppc64le.rpm SHA-256: 8f255f6b673c52a36aea62af8eec8326d3a5f152c725795e737438665eb186c8
kernel-devel-4.18.0-80.27.1.el8_0.ppc64le.rpm SHA-256: 53e68c53e9b8d5e958dbc98cf0a8cfc2aa372baddc7633c6b80af702bfb244e1
kernel-doc-4.18.0-80.27.1.el8_0.noarch.rpm SHA-256: 5c74d5cf0e6acc1663c622fd3d27a64507b840448a6742ad7a9fb6cbbfa8f0a2
kernel-headers-4.18.0-80.27.1.el8_0.ppc64le.rpm SHA-256: 0976561def72e6f0eedea6f9f8e0832c906e081b37dadb8073b89fe32b78433c
kernel-modules-4.18.0-80.27.1.el8_0.ppc64le.rpm SHA-256: 8863340a5c69e73c02b0535bde16a813f77698d044d2803e81abcfeac96b1b0d
kernel-modules-extra-4.18.0-80.27.1.el8_0.ppc64le.rpm SHA-256: 4dc77098072e591bf1821466a9f58a1b7f047347d0c83050da81a2c495dbcd1b
kernel-tools-4.18.0-80.27.1.el8_0.ppc64le.rpm SHA-256: 8df89ecd48935c424d9bec06c05affb7898b2e6ad628e66f65102faded31eee4
kernel-tools-debuginfo-4.18.0-80.27.1.el8_0.ppc64le.rpm SHA-256: 92b7b6d7c47c5ad488b91adea59839009d9d41afee2dd8a53af185d3bbe37e4b
kernel-tools-libs-4.18.0-80.27.1.el8_0.ppc64le.rpm SHA-256: 53b3c57764d50dc865c25ccc84a73752ac04b8a0e2bab22e7c1c27dcbf823f58
perf-4.18.0-80.27.1.el8_0.ppc64le.rpm SHA-256: 5cf4bd5974f8edee077d40a81e912d6ce130500dcb3d3aa99589702f01824e5a
perf-debuginfo-4.18.0-80.27.1.el8_0.ppc64le.rpm SHA-256: 33065bb3354c607cb214bd71a1cbbf82ff2ad72fe078ed60b71d0b557824aa7c
python3-perf-4.18.0-80.27.1.el8_0.ppc64le.rpm SHA-256: e6082e1db48d3842cde6a38f65562210792d7c9b4dd8454d3fed50244d3be827
python3-perf-debuginfo-4.18.0-80.27.1.el8_0.ppc64le.rpm SHA-256: dc4e3049aeaee8f95781dcb04148314df0b043ce268f0da7940b81a5ad5729e1

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.0

SRPM
kernel-4.18.0-80.27.1.el8_0.src.rpm SHA-256: 8a266d5197ff27a651a2bda6003f7e4ca35dbe526dd363b66071df8084957fcc
x86_64
bpftool-4.18.0-80.27.1.el8_0.x86_64.rpm SHA-256: a271ccc9e1139c7883b8691f62051a355235fbe8dabba98bcc59ea9a9cebe6a9
bpftool-debuginfo-4.18.0-80.27.1.el8_0.x86_64.rpm SHA-256: 07455ab7b59c84b00d3af009aa66e1c9910376b827531e99a4f79b792f7aefb6
kernel-4.18.0-80.27.1.el8_0.x86_64.rpm SHA-256: 87afa1d8f78f971864333da26f6dd1c926274e8a26aa813e34175a5741734b43
kernel-abi-whitelists-4.18.0-80.27.1.el8_0.noarch.rpm SHA-256: 874f942d2441c4be8df1135d79711fd44bee5ba649a80ad4d8a9d41eff459abe
kernel-core-4.18.0-80.27.1.el8_0.x86_64.rpm SHA-256: c52912fa0f114ab5934471e0da4a868dfb435a810f0384e17e2eadcd94ad381f
kernel-cross-headers-4.18.0-80.27.1.el8_0.x86_64.rpm SHA-256: 9f07ff4da6463b89c3aae46a5f220be49894f7e5b4b8923153930ed4ae135548
kernel-debug-4.18.0-80.27.1.el8_0.x86_64.rpm SHA-256: 7ec31e53c7066e18846b26dae29e687e83f71b605eabd49bd873334787498205
kernel-debug-core-4.18.0-80.27.1.el8_0.x86_64.rpm SHA-256: 864f896ad26b621bd09b6b6a52801eddb8318d4803e25ff0c26e763941009ace
kernel-debug-debuginfo-4.18.0-80.27.1.el8_0.x86_64.rpm SHA-256: 2cb79cdefe4982d665481c383659d22bf98d42ab1773fc370fd8494fbb6ccbf8
kernel-debug-devel-4.18.0-80.27.1.el8_0.x86_64.rpm SHA-256: d1dc8b6d4353f25688e31f2e982fd9d2c58b9dc88487b7536c8eefab3b6b345f
kernel-debug-modules-4.18.0-80.27.1.el8_0.x86_64.rpm SHA-256: 066f0f06791e00fd1d3bd97daf86e520fb2d61c39cf35e42624ce33354984100
kernel-debug-modules-extra-4.18.0-80.27.1.el8_0.x86_64.rpm SHA-256: 5fe8a53350f3b615b813b9c532d9f4d96fe78ea855a1003ac2451bdf73704a08
kernel-debuginfo-4.18.0-80.27.1.el8_0.x86_64.rpm SHA-256: 7cc353e2fbe62c7d5989155de0cef020794741fa4c4351b56ebd117c3987f1bd
kernel-debuginfo-common-x86_64-4.18.0-80.27.1.el8_0.x86_64.rpm SHA-256: 9ccace4a93d530ca7bd03dc9e6e40c348f35db1c26421f7c3bf69f1e1e65ffa6
kernel-devel-4.18.0-80.27.1.el8_0.x86_64.rpm SHA-256: 6192105572d135ac228f696f36ff7e5e083660e77c01fe520d650a6979e392d8
kernel-doc-4.18.0-80.27.1.el8_0.noarch.rpm SHA-256: 5c74d5cf0e6acc1663c622fd3d27a64507b840448a6742ad7a9fb6cbbfa8f0a2
kernel-headers-4.18.0-80.27.1.el8_0.x86_64.rpm SHA-256: adb11eb886acef60cd7a41cc57f0eb27973d0c1d5ff93521b0bbfcb3143e22ea
kernel-modules-4.18.0-80.27.1.el8_0.x86_64.rpm SHA-256: c9601ce96724e3b950b06181ad1ca80f4f917b193e6c0c0702441d11b1a840ab
kernel-modules-extra-4.18.0-80.27.1.el8_0.x86_64.rpm SHA-256: f4d08f40e55ff233d4162328acc1fcb198351ad19c25d3059049f8ecb522b448
kernel-tools-4.18.0-80.27.1.el8_0.x86_64.rpm SHA-256: ad293a0fe91687ba090217ccdcf6e5bc98ded1ce30e99070c936bc4273281150
kernel-tools-debuginfo-4.18.0-80.27.1.el8_0.x86_64.rpm SHA-256: bf2ec3fb86ed91939d977eec391ae235fd7ac40c5e758e34f6804c404f5656fd
kernel-tools-libs-4.18.0-80.27.1.el8_0.x86_64.rpm SHA-256: 8ee5a78064764d6056e8f347227e7efe5d30e5c35813cf64451da98b2fab9eec
perf-4.18.0-80.27.1.el8_0.x86_64.rpm SHA-256: eb930986ba4cf7130e73f0638eaf9fb4322a1313ab8632b586ae924b21421310
perf-debuginfo-4.18.0-80.27.1.el8_0.x86_64.rpm SHA-256: 29b983e00d5c35178ffbef57abb383796bb7a61d86fbb692c90241c1cadfa795
python3-perf-4.18.0-80.27.1.el8_0.x86_64.rpm SHA-256: 54d86aa892f6d1418d1e527f1be70d8f2653c23049b350e5197bd6964c4c5e48
python3-perf-debuginfo-4.18.0-80.27.1.el8_0.x86_64.rpm SHA-256: b54b10c20e11d2a12aa704a7b5f65d1f431b14dc3efa54a2c4a282a620e80809

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter