- Issued:
- 2020-08-11
- Updated:
- 2020-08-11
RHSA-2020:3389 - Security Advisory
Synopsis
Important: kernel-rt security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for kernel-rt is now available for Red Hat Enterprise MRG 2.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
- kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)
- kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- update the MRG 2.5.z 3.10 realtime-kernel sources (BZ#1858091)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- MRG Realtime 2 x86_64
Fixes
- BZ - 1831868 - CVE-2020-12653 kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c
- BZ - 1832530 - CVE-2020-12654 kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c
MRG Realtime 2
SRPM | |
---|---|
kernel-rt-3.10.0-693.72.1.rt56.672.el6rt.src.rpm | SHA-256: 449b41fdf7a4cb714cdacc9d61646515e719cacbedc24e5dc190f030f4bea1a0 |
x86_64 | |
kernel-rt-3.10.0-693.72.1.rt56.672.el6rt.x86_64.rpm | SHA-256: 4946b7e6aaed546fe8373d0d6e9f4c17ece0ba0dd717ac9f47f67ee879875775 |
kernel-rt-debug-3.10.0-693.72.1.rt56.672.el6rt.x86_64.rpm | SHA-256: efebf43340cf149628e0aeff14c097fe82036cc9387fb491cb4adb5b03550fbd |
kernel-rt-debug-debuginfo-3.10.0-693.72.1.rt56.672.el6rt.x86_64.rpm | SHA-256: f0dd1eb6fad946e9063be90873404f2eb288e68db400db5c9b93a670ac2d9544 |
kernel-rt-debug-devel-3.10.0-693.72.1.rt56.672.el6rt.x86_64.rpm | SHA-256: 7adaf661a494bb17103e8aeb26b8dd892422dc03fb8ab2076687afe8e125839b |
kernel-rt-debuginfo-3.10.0-693.72.1.rt56.672.el6rt.x86_64.rpm | SHA-256: ae94a267e3e37b644b4c1dab4f7685cb9b7de337617233196bee69e0c4d2ccc8 |
kernel-rt-debuginfo-common-x86_64-3.10.0-693.72.1.rt56.672.el6rt.x86_64.rpm | SHA-256: 3194060041106e31cb6e3b56dc19aa79bc75f57e85e7c58fa2985b24ecd9f7f6 |
kernel-rt-devel-3.10.0-693.72.1.rt56.672.el6rt.x86_64.rpm | SHA-256: 144b1bc612b0dde01b5500086f680dce22282aa63e55ece6fbed72cea3446586 |
kernel-rt-doc-3.10.0-693.72.1.rt56.672.el6rt.noarch.rpm | SHA-256: 464f97f12593abda428275a2ab420cd04b5f8f4d6c9a8f914bef235289842f58 |
kernel-rt-firmware-3.10.0-693.72.1.rt56.672.el6rt.noarch.rpm | SHA-256: e0be608d4b3573d93146cc01c81b9e542da3faf163cfef25f1fa1051379d5848 |
kernel-rt-trace-3.10.0-693.72.1.rt56.672.el6rt.x86_64.rpm | SHA-256: f4e47c86c647f245ee8c856b17f931381311f17e6efee0700320ab370047cc65 |
kernel-rt-trace-debuginfo-3.10.0-693.72.1.rt56.672.el6rt.x86_64.rpm | SHA-256: b4325aedc8c830b0002793566ffb02f5c557f7be239667dfa5a1e2154e08a6aa |
kernel-rt-trace-devel-3.10.0-693.72.1.rt56.672.el6rt.x86_64.rpm | SHA-256: 55c8f355af709b4f6b490fe0cdd98d35a84254511e63079a86ecc7fda0887b1c |
kernel-rt-vanilla-3.10.0-693.72.1.rt56.672.el6rt.x86_64.rpm | SHA-256: 8cc8dab15627334e23a6413d552efe952bad37db3c671806874fca70314a3828 |
kernel-rt-vanilla-debuginfo-3.10.0-693.72.1.rt56.672.el6rt.x86_64.rpm | SHA-256: f084058b077b6a68035eb23586528caf668e2f6fec31bed56b749a4af3cf9134 |
kernel-rt-vanilla-devel-3.10.0-693.72.1.rt56.672.el6rt.x86_64.rpm | SHA-256: 9758da9ecfcfa8f45e84b995e2eee0d61b0c67ed9a3b47f9f0f9c6d23bd59e37 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.