First published: Tue Apr 10 2018(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux operating system.<br>Security Fix(es):<br><li> hw: cpu: speculative execution permission faults handling (CVE-2017-5754, Important, KVM for Power)</li> <li> kernel: Buffer overflow in firewire driver via crafted incoming packets (CVE-2016-8633, Important)</li> <li> kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824, Important)</li> <li> Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register (CVE-2017-12154, Important)</li> <li> kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166, Important)</li> <li> kernel: media: use-after-free in [tuner-xc2028] media driver (CVE-2016-7913, Moderate)</li> <li> kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl() (CVE-2017-7294, Moderate)</li> <li> kernel: Incorrect type conversion for size during dma allocation (CVE-2017-9725, Moderate)</li> <li> kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190, Moderate)</li> <li> kernel: vfs: BUG in truncate_inode_pages_range() and fuse client (CVE-2017-15121, Moderate)</li> <li> kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c (CVE-2017-15126, Moderate)</li> <li> kernel: net: double-free and memory corruption in get_net_ns_by_id() (CVE-2017-15129, Moderate)</li> <li> kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265, Moderate)</li> <li> kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure (CVE-2017-17448, Moderate)</li> <li> kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity (CVE-2017-17449, Moderate)</li> <li> kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow (CVE-2017-17558, Moderate)</li> <li> kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c (CVE-2017-18017, Moderate)</li> <li> kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service (CVE-2017-18203, Moderate)</li> <li> kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ (CVE-2017-1000252, Moderate)</li> <li> Kernel: KVM: DoS via write flood to I/O port 0x80 (CVE-2017-1000407, Moderate)</li> <li> kernel: Stack information leak in the EFS element (CVE-2017-1000410, Moderate)</li> <li> kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass (CVE-2018-5750, Moderate)</li> <li> kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004, Moderate)</li> <li> kernel: multiple Low security impact security issues (CVE-2016-3672, CVE-2017-14140, CVE-2017-15116, CVE-2017-15127, CVE-2018-6927, Low)</li> Red Hat would like to thank Eyal Itkin for reporting CVE-2016-8633; Google Project Zero for reporting CVE-2017-5754; Mohamed Ghannam for reporting CVE-2017-8824; Jim Mattson (Google.com) for reporting CVE-2017-12154; Vitaly Mayatskih for reporting CVE-2017-12190; Andrea Arcangeli (Engineering) for reporting CVE-2017-15126; Kirill Tkhai for reporting CVE-2017-15129; Jan H. Schönherr (Amazon) for reporting CVE-2017-1000252; and Armis Labs for reporting CVE-2017-1000410. The CVE-2017-15121 issue was discovered by Miklos Szeredi (Red Hat) and the CVE-2017-15116 issue was discovered by ChunYu Wang (Red Hat).<br>For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.<br>Additional Changes:<br>For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.5 Release Notes linked from the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-abi-whitelists | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-debug | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-debug-debuginfo | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-debug-devel | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-debuginfo | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-devel | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-doc | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-headers | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-tools | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-tools-debuginfo | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-tools-libs | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-tools-libs-devel | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/perf | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/perf-debuginfo | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/python-perf | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/python-perf-debuginfo | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-debug | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-debug-debuginfo | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-debug-devel | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-debuginfo | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-debuginfo-common-s390x | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-devel | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-headers | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-kdump | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-kdump-debuginfo | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-kdump-devel | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/perf | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/perf-debuginfo | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/python-perf | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/python-perf-debuginfo | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-bootwrapper | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-debuginfo-common-ppc64 | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-tools | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-tools-debuginfo | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-tools-libs | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-tools-libs-devel | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-bootwrapper | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-debug | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-debug-debuginfo | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-debug-devel | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-debuginfo | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-debuginfo-common-ppc64le | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-devel | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-headers | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-tools | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-tools-debuginfo | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-tools-libs | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/kernel-tools-libs-devel | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/perf | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/perf-debuginfo | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/python-perf | <3.10.0-862.el7 | 3.10.0-862.el7 |
redhat/python-perf-debuginfo | <3.10.0-862.el7 | 3.10.0-862.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.