RHSA-2018:1355

Affecting kernel-rt-trace package, versions centos:7: <0:3.10.0-862.2.3.rt56.806.el7

high severity
Do your applications use this vulnerable package? Test your applications

Overview

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): Kernel: KVM: error in exception handling leads to wrong debug stack value (CVE-2018-1087) Kernel: error in exception handling leads to DoS (CVE-2018-8897) Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation (CVE-2017-16939) kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c (CVE-2018-1068) kernel: ptrace() incorrect error handling leads to corruption and DoS (CVE-2018-1000199) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Andy Lutomirski for reporting CVE-2018-1087 and CVE-2018-1000199 and Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897. Bug Fix(es): The kernel-rt packages have been upgraded to the 3.10.0-862.2.3 source tree, which provides a number of bug fixes over the previous version. (BZ#1549768)

CVE
RHSA-2018:1355
Snyk ID
SNYK-LINUX-KERNELRTTRACE-170923
Published
27 Jun, 2018