First published: Tue Apr 09 2019(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux operating system.<br>Security Fix(es):<br><li> kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members (CVE-2018-13405)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> sched/sysctl: Check user input value of sysctl_sched_time_avg (BZ#1579128)</li> <li> unable to handle kernel NULL pointer dereference at 000000000000005d in tcp_enter_frto+0x102 (BZ#1585892)</li> <li> qla2xxx: Mask Off Scope bits for Retry delay timer in the driver (BZ#1588133)</li> <li> [PATCH] perf: Fix a race between ring_buffer_detach() and ring_buffer_wakeup() (BZ#1589340)</li> <li> RHEL6.10 - kernel: improve spectre mitigation for s390x (BZ#1625381)</li> <li> kernel panic due to NULL pointer dereference in __wake_up_common through perf_event_wakeup (BZ#1627672)</li> <li> After upgrading from rhel 6.9 to rhel 6.10, files in a cifs share can't be read (BZ#1636484)</li> <li> Retpoline impact on vdso gettimeofday performance (BZ#1638552)</li> <li> [RHEL 6.10] 32-bit kernel-2.6.32-754.3.5 registers the swap of 4k size only (BZ#1670328)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/kernel | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/kernel-abi-whitelists | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/kernel-debug | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/kernel-debug-devel | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/kernel-debug-devel | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/kernel-debuginfo | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/kernel-debuginfo | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/kernel-debuginfo-common-i686 | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/kernel-devel | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/kernel-doc | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/kernel-firmware | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/kernel-headers | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/perf | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/perf-debuginfo | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/perf-debuginfo | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/python-perf | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/python-perf-debuginfo | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/python-perf-debuginfo | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/kernel-debug | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/kernel-devel | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/kernel-headers | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/perf | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/python-perf | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/kernel-debuginfo-common-s390x | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/kernel-kdump | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/kernel-kdump-debuginfo | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/kernel-kdump-devel | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/kernel-bootwrapper | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
redhat/kernel-debuginfo-common-ppc64 | <2.6.32-754.12.1.el6 | 2.6.32-754.12.1.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2019:0717 is classified as important.
To fix RHSA-2019:0717, update the kernel packages to version 2.6.32-754.12.1.el6 or later.
RHSA-2019:0717 addresses a vulnerability where the SGID bit is not cleared on non-directories for non-members, identified as CVE-2018-13405.
RHSA-2019:0717 affects systems running Linux kernel version prior to 2.6.32-754.12.1.el6.
Yes, a reboot is typically required to ensure that the updated kernel is loaded and the vulnerabilities are mitigated.