First published: Tue May 08 2018(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux operating system.<br>Security Fix(es):<br><li> hw: cpu: speculative execution permission faults handling (CVE-2017-5754, x86 32-bit)</li> <li> Kernel: error in exception handling leads to DoS (CVE-2018-8897)</li> For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.<br>Red Hat would like to thank Google Project Zero for reporting CVE-2017-5754 and Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897.<br>Bug Fix(es):<br><li> The kernel build requirements have been updated to the GNU Compiler Collection (GCC) compiler version that has the support for Retpolines. The Retpolines mechanism is a software construct that leverages specific knowledge of the underlying hardware to mitigate the branch target injection, also known as Spectre variant 2 vulnerability described in CVE-2017-5715. (BZ#1554253)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/kernel | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/kernel-abi-whitelists | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/kernel-debug | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/kernel-debug-devel | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/kernel-debug-devel | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/kernel-debuginfo | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/kernel-debuginfo | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/kernel-debuginfo-common-i686 | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/kernel-devel | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/kernel-doc | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/kernel-firmware | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/kernel-headers | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/perf | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/perf-debuginfo | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/perf-debuginfo | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/python-perf | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/python-perf-debuginfo | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/python-perf-debuginfo | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/kernel-debug | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/kernel-devel | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/kernel-headers | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/perf | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/python-perf | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/kernel-debuginfo-common-s390x | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/kernel-kdump | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/kernel-kdump-debuginfo | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/kernel-kdump-devel | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/kernel-bootwrapper | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
redhat/kernel-debuginfo-common-ppc64 | <2.6.32-573.55.2.el6 | 2.6.32-573.55.2.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.