Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2020:4609 - Security Advisory
Issued:
2020-11-03
Updated:
2020-11-03

RHSA-2020:4609 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel-rt security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: use after free due to race condition in the video driver leads to local privilege escalation (CVE-2019-9458)
  • kernel: use-after-free in drivers/bluetooth/hci_ldisc.c (CVE-2019-15917)
  • kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg (CVE-2019-15925)
  • kernel: memory leak in ccp_run_sha_cmd() (CVE-2019-18808)
  • kernel: Denial Of Service in the __ipmi_bmc_register() (CVE-2019-19046)
  • kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c (CVE-2019-19319)
  • Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid (CVE-2019-19332)
  • kernel: use-after-free in ext4_put_super (CVE-2019-19447)
  • kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free (CVE-2019-19524)
  • kernel: race condition caused by a malicious USB device in the USB character device driver layer (CVE-2019-19537)
  • kernel: use-after-free in serial_ir_init_module() (CVE-2019-19543)
  • kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry (CVE-2019-19767)
  • kernel: use-after-free in debugfs_remove (CVE-2019-19770)
  • kernel: out-of-bounds write via crafted keycode table (CVE-2019-20636)
  • kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c (CVE-2020-0305)
  • kernel: out-of-bounds read in in vc_do_resize (CVE-2020-8647)
  • kernel: use-after-free in n_tty_receive_buf_common (CVE-2020-8648)
  • kernel: invalid read location in vgacon_invert_region (CVE-2020-8649)
  • kernel: uninitialized kernel data leak in userspace coredumps (CVE-2020-10732)
  • kernel: SELinux netlink permission check bypass (CVE-2020-10751)
  • kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c (CVE-2020-11565)
  • kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)
  • kernel: out-of-bounds write in xdp_umem_reg (CVE-2020-12659)
  • kernel: sg_write function lacks an sg_remove_request call in a certain failure case (CVE-2020-12770)
  • kernel: possible to send arbitrary signals to a privileged (suidroot) parent process (CVE-2020-12826)
  • kernel: referencing inode of removed superblock in get_futex_key() causes UAF (CVE-2020-14381)
  • kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)
  • kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure (CVE-2019-9455)
  • kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c (CVE-2019-16231)
  • kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c (CVE-2019-16233)
  • kernel: memory leak in af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c (CVE-2019-18809)
  • kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() (CVE-2019-19056)
  • kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS (CVE-2019-19062)
  • kernel: Two memory leaks in the rtl_usb_probe() (CVE-2019-19063)
  • kernel: A memory leak in the rtl8xxxu_submit_int_urb() (CVE-2019-19068)
  • kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS (CVE-2019-19072)
  • kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c (CVE-2019-19533)
  • kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c (CVE-2019-20054)
  • kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features (CVE-2020-10774)
  • kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field (CVE-2020-10942)
  • kernel: sync of excessive duration via an XFS v5 image with crafted metadata (CVE-2020-12655)

Solution

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for Real Time 8 x86_64
  • Red Hat Enterprise Linux for Real Time for NFV 8 x86_64
  • Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.8 x86_64
  • Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.6 x86_64
  • Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64
  • Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.8 x86_64
  • Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.6 x86_64
  • Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64

Fixes

  • BZ - 1733495 - BUG: sleeping function called from invalid context at kernel/locking/rtmutex.c:974
  • BZ - 1759052 - CVE-2019-15925 kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg
  • BZ - 1760100 - CVE-2019-15917 kernel: use-after-free in drivers/bluetooth/hci_ldisc.c
  • BZ - 1760310 - CVE-2019-16231 kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c
  • BZ - 1760420 - CVE-2019-16233 kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c
  • BZ - 1774946 - CVE-2019-19072 kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS
  • BZ - 1774963 - CVE-2019-19068 kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS
  • BZ - 1774988 - CVE-2019-19046 kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c
  • BZ - 1775015 - CVE-2019-19063 kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS
  • BZ - 1775021 - CVE-2019-19062 kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS
  • BZ - 1775097 - CVE-2019-19056 kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS
  • BZ - 1777418 - CVE-2019-18808 kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c
  • BZ - 1777449 - CVE-2019-18809 kernel: memory leak in af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c
  • BZ - 1779046 - RT host hang with Call Trace "WARNING: CPU: 16 PID: 153 at kernel/smp.c:333 smp_call_function_single_async+0x7a/"
  • BZ - 1779594 - CVE-2019-19332 Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid
  • BZ - 1781679 - CVE-2019-19447 kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c
  • BZ - 1781810 - CVE-2019-19543 kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c
  • BZ - 1783459 - CVE-2019-19524 kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free
  • BZ - 1783534 - CVE-2019-19533 kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c
  • BZ - 1783561 - CVE-2019-19537 kernel: race condition caused by a malicious USB device in the USB character device driver layer
  • BZ - 1784130 - CVE-2019-19319 kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c
  • BZ - 1786160 - CVE-2019-19767 kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c
  • BZ - 1786179 - CVE-2019-19770 kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c
  • BZ - 1790063 - CVE-2019-20054 kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c
  • BZ - 1802555 - CVE-2020-8649 kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c
  • BZ - 1802559 - CVE-2020-8648 kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c
  • BZ - 1802563 - CVE-2020-8647 kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c
  • BZ - 1817718 - CVE-2020-10942 kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field
  • BZ - 1819377 - CVE-2019-9458 kernel: use after free due to race condition in the video driver leads to local privilege escalation
  • BZ - 1819399 - CVE-2019-9455 kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure
  • BZ - 1822077 - CVE-2020-12826 kernel: possible to send arbitrary signals to a privileged (suidroot) parent process
  • BZ - 1824059 - CVE-2019-20636 kernel: out-of-bounds write via crafted keycode table
  • BZ - 1824792 - CVE-2020-11668 kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c
  • BZ - 1824918 - CVE-2020-11565 kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c
  • BZ - 1831399 - CVE-2020-10732 kernel: uninitialized kernel data leak in userspace coredumps
  • BZ - 1832543 - CVE-2020-12655 kernel: sync of excessive duration via an XFS v5 image with crafted metadata
  • BZ - 1832876 - CVE-2020-12659 kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption
  • BZ - 1833196 - adaptive-tick appears to not be functioning as expected on RHEL 8.2 RT
  • BZ - 1834845 - CVE-2020-12770 kernel: sg_write function lacks an sg_remove_request call in a certain failure case
  • BZ - 1839634 - CVE-2020-10751 kernel: SELinux netlink permission check bypass
  • BZ - 1843410 - RT guest get Call Trace "INFO: task ld:274531 blocked for more than 600 seconds."
  • BZ - 1846964 - CVE-2020-10774 kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features
  • BZ - 1852298 - Install VM fails and RT host get Call Trace "WARNING: CPU: 18 PID: 2947 at fs/eventfd.c:68 eventfd_signal+0x7e/0x90"
  • BZ - 1859590 - [efi]RT kernel crash with "rcu: INFO: rcu_preempt detected stalls on CPUs/tasks"
  • BZ - 1860065 - CVE-2020-0305 kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c
  • BZ - 1874311 - CVE-2020-14381 kernel: referencing inode of removed superblock in get_futex_key() causes UAF
  • BZ - 1881424 - CVE-2020-25641 kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS

CVEs

  • CVE-2019-9455
  • CVE-2019-9458
  • CVE-2019-15917
  • CVE-2019-15925
  • CVE-2019-16231
  • CVE-2019-16233
  • CVE-2019-18808
  • CVE-2019-18809
  • CVE-2019-19046
  • CVE-2019-19056
  • CVE-2019-19062
  • CVE-2019-19063
  • CVE-2019-19068
  • CVE-2019-19072
  • CVE-2019-19319
  • CVE-2019-19332
  • CVE-2019-19447
  • CVE-2019-19524
  • CVE-2019-19533
  • CVE-2019-19537
  • CVE-2019-19543
  • CVE-2019-19767
  • CVE-2019-19770
  • CVE-2019-20054
  • CVE-2019-20636
  • CVE-2020-0305
  • CVE-2020-8647
  • CVE-2020-8648
  • CVE-2020-8649
  • CVE-2020-10732
  • CVE-2020-10751
  • CVE-2020-10774
  • CVE-2020-10942
  • CVE-2020-11565
  • CVE-2020-11668
  • CVE-2020-12655
  • CVE-2020-12659
  • CVE-2020-12770
  • CVE-2020-12826
  • CVE-2020-14381
  • CVE-2020-25641
  • CVE-2021-3715

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for Real Time 8

SRPM
kernel-rt-4.18.0-240.rt7.54.el8.src.rpm SHA-256: 83ee9483ea530aed46ae42edb6c0ad4d7adad2225c4225357d65a626734cfcd2
x86_64
kernel-rt-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 7bfc6b634372e70175e6e43c3a5f6d7582b6cbadaf9985dad01a20bc1e4f65f5
kernel-rt-core-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 3ae706a469710535624f6bcc8b27622edf2407092b58cf1ca6e48f7e4bbe1a90
kernel-rt-debug-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 1ff6300a5a5f8f4b0d20d4a73965a3c6c0f34a748de4f05996b86be7a060b4a1
kernel-rt-debug-core-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 37094c7377a733d838f8422dea555f5f41e4a9cd1c4d5da3bb970ff5f0332eaf
kernel-rt-debug-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 556d25899cf192eb7a684117f44f0cf0cd9439d0f88f902f17655d26bee42d01
kernel-rt-debug-devel-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 2909705a72d6d5c5901621e9f7d8bcbe8d46511a53d5e0e3b978d87ae4c1ec70
kernel-rt-debug-modules-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 61e10d6a119d2f8835009ca08eda59f0cb14b81c9f02b6f9b36a0cdb2c1a0cd3
kernel-rt-debug-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 9951fb736c83abc9e071d35b9be69e99ba296bbfeb7cbacd2a84432010fee007
kernel-rt-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: f0f3471a6235d0003f63d6b8e7faa4cdd426e045c6ec97b87c98793d9066c441
kernel-rt-debuginfo-common-x86_64-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 7c7d29490aae318eada83b381e6f096ec1b0321006e1df9ec853ffa0d84a5dcc
kernel-rt-devel-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: cdad8328d33928a579f544b0effb9f0c7745c54d037eb5690706f56554185536
kernel-rt-modules-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 4328cf1c05066d86f5607150bd789e38d38f3122cb26b491e1fc86f3f4f66467
kernel-rt-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 77e6a3ee5375e4132360213b306cd254ffb7310fee9496324aabe1cff4788a8f

Red Hat Enterprise Linux for Real Time for NFV 8

SRPM
kernel-rt-4.18.0-240.rt7.54.el8.src.rpm SHA-256: 83ee9483ea530aed46ae42edb6c0ad4d7adad2225c4225357d65a626734cfcd2
x86_64
kernel-rt-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 7bfc6b634372e70175e6e43c3a5f6d7582b6cbadaf9985dad01a20bc1e4f65f5
kernel-rt-core-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 3ae706a469710535624f6bcc8b27622edf2407092b58cf1ca6e48f7e4bbe1a90
kernel-rt-debug-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 1ff6300a5a5f8f4b0d20d4a73965a3c6c0f34a748de4f05996b86be7a060b4a1
kernel-rt-debug-core-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 37094c7377a733d838f8422dea555f5f41e4a9cd1c4d5da3bb970ff5f0332eaf
kernel-rt-debug-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 556d25899cf192eb7a684117f44f0cf0cd9439d0f88f902f17655d26bee42d01
kernel-rt-debug-devel-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 2909705a72d6d5c5901621e9f7d8bcbe8d46511a53d5e0e3b978d87ae4c1ec70
kernel-rt-debug-kvm-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: b303593745b9952d0aca068d3322fbca793fcbaa369598638715de57f3b1fb2e
kernel-rt-debug-modules-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 61e10d6a119d2f8835009ca08eda59f0cb14b81c9f02b6f9b36a0cdb2c1a0cd3
kernel-rt-debug-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 9951fb736c83abc9e071d35b9be69e99ba296bbfeb7cbacd2a84432010fee007
kernel-rt-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: f0f3471a6235d0003f63d6b8e7faa4cdd426e045c6ec97b87c98793d9066c441
kernel-rt-debuginfo-common-x86_64-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 7c7d29490aae318eada83b381e6f096ec1b0321006e1df9ec853ffa0d84a5dcc
kernel-rt-devel-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: cdad8328d33928a579f544b0effb9f0c7745c54d037eb5690706f56554185536
kernel-rt-kvm-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 6f0d40259ad29bb36114e01275323bbb2227bbbdb95502808a2843c49854466b
kernel-rt-modules-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 4328cf1c05066d86f5607150bd789e38d38f3122cb26b491e1fc86f3f4f66467
kernel-rt-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 77e6a3ee5375e4132360213b306cd254ffb7310fee9496324aabe1cff4788a8f

Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.8

SRPM
kernel-rt-4.18.0-240.rt7.54.el8.src.rpm SHA-256: 83ee9483ea530aed46ae42edb6c0ad4d7adad2225c4225357d65a626734cfcd2
x86_64
kernel-rt-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 7bfc6b634372e70175e6e43c3a5f6d7582b6cbadaf9985dad01a20bc1e4f65f5
kernel-rt-core-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 3ae706a469710535624f6bcc8b27622edf2407092b58cf1ca6e48f7e4bbe1a90
kernel-rt-debug-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 1ff6300a5a5f8f4b0d20d4a73965a3c6c0f34a748de4f05996b86be7a060b4a1
kernel-rt-debug-core-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 37094c7377a733d838f8422dea555f5f41e4a9cd1c4d5da3bb970ff5f0332eaf
kernel-rt-debug-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 556d25899cf192eb7a684117f44f0cf0cd9439d0f88f902f17655d26bee42d01
kernel-rt-debug-devel-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 2909705a72d6d5c5901621e9f7d8bcbe8d46511a53d5e0e3b978d87ae4c1ec70
kernel-rt-debug-modules-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 61e10d6a119d2f8835009ca08eda59f0cb14b81c9f02b6f9b36a0cdb2c1a0cd3
kernel-rt-debug-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 9951fb736c83abc9e071d35b9be69e99ba296bbfeb7cbacd2a84432010fee007
kernel-rt-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: f0f3471a6235d0003f63d6b8e7faa4cdd426e045c6ec97b87c98793d9066c441
kernel-rt-debuginfo-common-x86_64-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 7c7d29490aae318eada83b381e6f096ec1b0321006e1df9ec853ffa0d84a5dcc
kernel-rt-devel-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: cdad8328d33928a579f544b0effb9f0c7745c54d037eb5690706f56554185536
kernel-rt-modules-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 4328cf1c05066d86f5607150bd789e38d38f3122cb26b491e1fc86f3f4f66467
kernel-rt-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 77e6a3ee5375e4132360213b306cd254ffb7310fee9496324aabe1cff4788a8f

Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.6

SRPM
kernel-rt-4.18.0-240.rt7.54.el8.src.rpm SHA-256: 83ee9483ea530aed46ae42edb6c0ad4d7adad2225c4225357d65a626734cfcd2
x86_64
kernel-rt-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 7bfc6b634372e70175e6e43c3a5f6d7582b6cbadaf9985dad01a20bc1e4f65f5
kernel-rt-core-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 3ae706a469710535624f6bcc8b27622edf2407092b58cf1ca6e48f7e4bbe1a90
kernel-rt-debug-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 1ff6300a5a5f8f4b0d20d4a73965a3c6c0f34a748de4f05996b86be7a060b4a1
kernel-rt-debug-core-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 37094c7377a733d838f8422dea555f5f41e4a9cd1c4d5da3bb970ff5f0332eaf
kernel-rt-debug-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 556d25899cf192eb7a684117f44f0cf0cd9439d0f88f902f17655d26bee42d01
kernel-rt-debug-devel-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 2909705a72d6d5c5901621e9f7d8bcbe8d46511a53d5e0e3b978d87ae4c1ec70
kernel-rt-debug-modules-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 61e10d6a119d2f8835009ca08eda59f0cb14b81c9f02b6f9b36a0cdb2c1a0cd3
kernel-rt-debug-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 9951fb736c83abc9e071d35b9be69e99ba296bbfeb7cbacd2a84432010fee007
kernel-rt-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: f0f3471a6235d0003f63d6b8e7faa4cdd426e045c6ec97b87c98793d9066c441
kernel-rt-debuginfo-common-x86_64-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 7c7d29490aae318eada83b381e6f096ec1b0321006e1df9ec853ffa0d84a5dcc
kernel-rt-devel-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: cdad8328d33928a579f544b0effb9f0c7745c54d037eb5690706f56554185536
kernel-rt-modules-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 4328cf1c05066d86f5607150bd789e38d38f3122cb26b491e1fc86f3f4f66467
kernel-rt-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 77e6a3ee5375e4132360213b306cd254ffb7310fee9496324aabe1cff4788a8f

Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4

SRPM
kernel-rt-4.18.0-240.rt7.54.el8.src.rpm SHA-256: 83ee9483ea530aed46ae42edb6c0ad4d7adad2225c4225357d65a626734cfcd2
x86_64
kernel-rt-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 7bfc6b634372e70175e6e43c3a5f6d7582b6cbadaf9985dad01a20bc1e4f65f5
kernel-rt-core-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 3ae706a469710535624f6bcc8b27622edf2407092b58cf1ca6e48f7e4bbe1a90
kernel-rt-debug-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 1ff6300a5a5f8f4b0d20d4a73965a3c6c0f34a748de4f05996b86be7a060b4a1
kernel-rt-debug-core-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 37094c7377a733d838f8422dea555f5f41e4a9cd1c4d5da3bb970ff5f0332eaf
kernel-rt-debug-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 556d25899cf192eb7a684117f44f0cf0cd9439d0f88f902f17655d26bee42d01
kernel-rt-debug-devel-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 2909705a72d6d5c5901621e9f7d8bcbe8d46511a53d5e0e3b978d87ae4c1ec70
kernel-rt-debug-modules-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 61e10d6a119d2f8835009ca08eda59f0cb14b81c9f02b6f9b36a0cdb2c1a0cd3
kernel-rt-debug-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 9951fb736c83abc9e071d35b9be69e99ba296bbfeb7cbacd2a84432010fee007
kernel-rt-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: f0f3471a6235d0003f63d6b8e7faa4cdd426e045c6ec97b87c98793d9066c441
kernel-rt-debuginfo-common-x86_64-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 7c7d29490aae318eada83b381e6f096ec1b0321006e1df9ec853ffa0d84a5dcc
kernel-rt-devel-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: cdad8328d33928a579f544b0effb9f0c7745c54d037eb5690706f56554185536
kernel-rt-modules-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 4328cf1c05066d86f5607150bd789e38d38f3122cb26b491e1fc86f3f4f66467
kernel-rt-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 77e6a3ee5375e4132360213b306cd254ffb7310fee9496324aabe1cff4788a8f

Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.8

SRPM
kernel-rt-4.18.0-240.rt7.54.el8.src.rpm SHA-256: 83ee9483ea530aed46ae42edb6c0ad4d7adad2225c4225357d65a626734cfcd2
x86_64
kernel-rt-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 7bfc6b634372e70175e6e43c3a5f6d7582b6cbadaf9985dad01a20bc1e4f65f5
kernel-rt-core-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 3ae706a469710535624f6bcc8b27622edf2407092b58cf1ca6e48f7e4bbe1a90
kernel-rt-debug-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 1ff6300a5a5f8f4b0d20d4a73965a3c6c0f34a748de4f05996b86be7a060b4a1
kernel-rt-debug-core-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 37094c7377a733d838f8422dea555f5f41e4a9cd1c4d5da3bb970ff5f0332eaf
kernel-rt-debug-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 556d25899cf192eb7a684117f44f0cf0cd9439d0f88f902f17655d26bee42d01
kernel-rt-debug-devel-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 2909705a72d6d5c5901621e9f7d8bcbe8d46511a53d5e0e3b978d87ae4c1ec70
kernel-rt-debug-kvm-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: b303593745b9952d0aca068d3322fbca793fcbaa369598638715de57f3b1fb2e
kernel-rt-debug-modules-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 61e10d6a119d2f8835009ca08eda59f0cb14b81c9f02b6f9b36a0cdb2c1a0cd3
kernel-rt-debug-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 9951fb736c83abc9e071d35b9be69e99ba296bbfeb7cbacd2a84432010fee007
kernel-rt-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: f0f3471a6235d0003f63d6b8e7faa4cdd426e045c6ec97b87c98793d9066c441
kernel-rt-debuginfo-common-x86_64-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 7c7d29490aae318eada83b381e6f096ec1b0321006e1df9ec853ffa0d84a5dcc
kernel-rt-devel-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: cdad8328d33928a579f544b0effb9f0c7745c54d037eb5690706f56554185536
kernel-rt-kvm-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 6f0d40259ad29bb36114e01275323bbb2227bbbdb95502808a2843c49854466b
kernel-rt-modules-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 4328cf1c05066d86f5607150bd789e38d38f3122cb26b491e1fc86f3f4f66467
kernel-rt-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 77e6a3ee5375e4132360213b306cd254ffb7310fee9496324aabe1cff4788a8f

Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.6

SRPM
kernel-rt-4.18.0-240.rt7.54.el8.src.rpm SHA-256: 83ee9483ea530aed46ae42edb6c0ad4d7adad2225c4225357d65a626734cfcd2
x86_64
kernel-rt-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 7bfc6b634372e70175e6e43c3a5f6d7582b6cbadaf9985dad01a20bc1e4f65f5
kernel-rt-core-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 3ae706a469710535624f6bcc8b27622edf2407092b58cf1ca6e48f7e4bbe1a90
kernel-rt-debug-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 1ff6300a5a5f8f4b0d20d4a73965a3c6c0f34a748de4f05996b86be7a060b4a1
kernel-rt-debug-core-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 37094c7377a733d838f8422dea555f5f41e4a9cd1c4d5da3bb970ff5f0332eaf
kernel-rt-debug-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 556d25899cf192eb7a684117f44f0cf0cd9439d0f88f902f17655d26bee42d01
kernel-rt-debug-devel-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 2909705a72d6d5c5901621e9f7d8bcbe8d46511a53d5e0e3b978d87ae4c1ec70
kernel-rt-debug-kvm-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: b303593745b9952d0aca068d3322fbca793fcbaa369598638715de57f3b1fb2e
kernel-rt-debug-modules-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 61e10d6a119d2f8835009ca08eda59f0cb14b81c9f02b6f9b36a0cdb2c1a0cd3
kernel-rt-debug-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 9951fb736c83abc9e071d35b9be69e99ba296bbfeb7cbacd2a84432010fee007
kernel-rt-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: f0f3471a6235d0003f63d6b8e7faa4cdd426e045c6ec97b87c98793d9066c441
kernel-rt-debuginfo-common-x86_64-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 7c7d29490aae318eada83b381e6f096ec1b0321006e1df9ec853ffa0d84a5dcc
kernel-rt-devel-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: cdad8328d33928a579f544b0effb9f0c7745c54d037eb5690706f56554185536
kernel-rt-kvm-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 6f0d40259ad29bb36114e01275323bbb2227bbbdb95502808a2843c49854466b
kernel-rt-modules-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 4328cf1c05066d86f5607150bd789e38d38f3122cb26b491e1fc86f3f4f66467
kernel-rt-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 77e6a3ee5375e4132360213b306cd254ffb7310fee9496324aabe1cff4788a8f

Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4

SRPM
kernel-rt-4.18.0-240.rt7.54.el8.src.rpm SHA-256: 83ee9483ea530aed46ae42edb6c0ad4d7adad2225c4225357d65a626734cfcd2
x86_64
kernel-rt-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 7bfc6b634372e70175e6e43c3a5f6d7582b6cbadaf9985dad01a20bc1e4f65f5
kernel-rt-core-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 3ae706a469710535624f6bcc8b27622edf2407092b58cf1ca6e48f7e4bbe1a90
kernel-rt-debug-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 1ff6300a5a5f8f4b0d20d4a73965a3c6c0f34a748de4f05996b86be7a060b4a1
kernel-rt-debug-core-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 37094c7377a733d838f8422dea555f5f41e4a9cd1c4d5da3bb970ff5f0332eaf
kernel-rt-debug-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 556d25899cf192eb7a684117f44f0cf0cd9439d0f88f902f17655d26bee42d01
kernel-rt-debug-devel-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 2909705a72d6d5c5901621e9f7d8bcbe8d46511a53d5e0e3b978d87ae4c1ec70
kernel-rt-debug-kvm-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: b303593745b9952d0aca068d3322fbca793fcbaa369598638715de57f3b1fb2e
kernel-rt-debug-modules-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 61e10d6a119d2f8835009ca08eda59f0cb14b81c9f02b6f9b36a0cdb2c1a0cd3
kernel-rt-debug-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 9951fb736c83abc9e071d35b9be69e99ba296bbfeb7cbacd2a84432010fee007
kernel-rt-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: f0f3471a6235d0003f63d6b8e7faa4cdd426e045c6ec97b87c98793d9066c441
kernel-rt-debuginfo-common-x86_64-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 7c7d29490aae318eada83b381e6f096ec1b0321006e1df9ec853ffa0d84a5dcc
kernel-rt-devel-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: cdad8328d33928a579f544b0effb9f0c7745c54d037eb5690706f56554185536
kernel-rt-kvm-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 6f0d40259ad29bb36114e01275323bbb2227bbbdb95502808a2843c49854466b
kernel-rt-modules-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 4328cf1c05066d86f5607150bd789e38d38f3122cb26b491e1fc86f3f4f66467
kernel-rt-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm SHA-256: 77e6a3ee5375e4132360213b306cd254ffb7310fee9496324aabe1cff4788a8f

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility