First published: Tue Sep 10 2019(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux operating system.<br>Security Fix(es):<br><li> kernel: Memory corruption due to incorrect socket cloning (CVE-2018-9568)</li> <li> kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members (CVE-2018-13405)</li> <li> kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884)</li> <li> kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)</li> <li> kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> fragmented packets timing out (BZ#1729411)</li> <li> kernel build: speed up debuginfo extraction (BZ#1731462)</li> <li> TCP packets are segmented when sent to the VM (TAP) (BZ#1732744)</li> <li> TCP packets are segmented when sent to the VLAN device when coming from VXLAN dev. (BZ#1732809)</li> <li> skb head copy occurs when sending traffic over OVS managed VXLAN tunnel (BZ#1733626)</li> <li> [mlx4] VXLAN over VLAN TCP segmentation (BZ#1734160)</li> <li> use "make -jN" for modules_install (BZ#1735081)</li> <li> shmem: consider shm_mnt as a long-term mount (BZ#1737376)</li> <li> [ESXi][RHEL7]use-after-free of scsi_cmnd on VMWare virtual guest with vmw_pvscsi and ata_piix (BZ#1737377)</li> <li> Backport TCP follow-up for small buffers (BZ#1739127)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-abi-whitelists | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-debug | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-debug-debuginfo | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-debug-devel | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-debuginfo | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-devel | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-doc | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-headers | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-tools | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-tools-debuginfo | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-tools-libs | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-tools-libs-devel | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/perf | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/perf-debuginfo | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/python-perf | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/python-perf-debuginfo | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-debug | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-debug-debuginfo | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-debug-devel | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-debuginfo | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-debuginfo-common-s390x | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-devel | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-headers | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-kdump | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-kdump-debuginfo | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-kdump-devel | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/perf | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/perf-debuginfo | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/python-perf | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/python-perf-debuginfo | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-bootwrapper | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-debuginfo-common-ppc64 | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-tools | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-tools-debuginfo | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-tools-libs | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-tools-libs-devel | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-bootwrapper | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-debug | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-debug-debuginfo | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-debug-devel | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-debuginfo | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-debuginfo-common-ppc64le | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-devel | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-headers | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-tools | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-tools-debuginfo | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-tools-libs | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/kernel-tools-libs-devel | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/perf | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/perf-debuginfo | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/python-perf | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
redhat/python-perf-debuginfo | <3.10.0-693.58.1.el7 | 3.10.0-693.58.1.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2019:2696 addresses memory corruption due to incorrect socket cloning (CVE-2018-9568) and a missing check in fs/inode.c.
To fix the vulnerabilities in RHSA-2019:2696, upgrade to kernel version 3.10.0-693.58.1.el7.
Not applying the fix for RHSA-2019:2696 could lead to potential memory corruption issues and security vulnerabilities.
RHSA-2019:2696 affects systems running specific versions of the Red Hat kernel packages.
Yes, you should update the kernel package to 3.10.0-693.58.1.el7 to mitigate the vulnerabilities.