First published: Tue May 08 2018(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux operating system.<br>Security Fix(es):<br><li> hw: cpu: speculative execution permission faults handling (CVE-2017-5754, x86 32-bit)</li> <li> Kernel: error in exception handling leads to DoS (CVE-2018-8897)</li> <li> kernel: nfsd: Incorrect handling of long RPC replies (CVE-2017-7645)</li> <li> kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824)</li> <li> kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166)</li> <li> kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c (CVE-2017-18017)</li> <li> kernel: Stack information leak in the EFS element (CVE-2017-1000410)</li> For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.<br>Red Hat would like to thank Google Project Zero for reporting CVE-2017-5754; Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897; Mohamed Ghannam for reporting CVE-2017-8824; and Armis Labs for reporting CVE-2017-1000410.<br>Bug Fix(es):<br>These updated kernel packages include also numerous bug fixes. Space precludes documenting all of these bug fixes in this advisory. See the bug fix descriptions in the related Knowledge Article: <a href="https://access.redhat.com/articles/3431591" target="_blank">https://access.redhat.com/articles/3431591</a>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/kernel | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/kernel-abi-whitelists | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/kernel-debug | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/kernel-debug-devel | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/kernel-debug-devel | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/kernel-debuginfo | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/kernel-debuginfo | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/kernel-debuginfo-common-i686 | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/kernel-devel | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/kernel-doc | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/kernel-firmware | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/kernel-headers | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/perf | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/perf-debuginfo | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/perf-debuginfo | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/python-perf | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/python-perf-debuginfo | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/python-perf-debuginfo | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/kernel-debug | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/kernel-devel | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/kernel-headers | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/perf | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/python-perf | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/kernel-debuginfo-common-s390x | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/kernel-kdump | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/kernel-kdump-debuginfo | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/kernel-kdump-devel | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/kernel-bootwrapper | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
redhat/kernel-debuginfo-common-ppc64 | <2.6.32-696.28.1.el6 | 2.6.32-696.28.1.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.