First published: Tue Dec 10 2019(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux operating system.<br>Security Fix(es):<br><li> kernel: Out-of-bounds heap access in xfrm (CVE-2017-7184)</li> <li> kernel: Exploitable memory corruption due to UFO to non-UFO path switch (CVE-2017-1000112)</li> <li> kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c (CVE-2018-1068)</li> <li> kernel: Memory corruption due to incorrect socket cloning (CVE-2018-9568)</li> <li> kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members (CVE-2018-13405)</li> <li> kernel: Use-after-free due to race condition in AF_PACKET implementation (CVE-2018-18559)</li> <li> Kernel: page cache side channel attacks (CVE-2019-5489)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> IPv6 UDP inconsistent usage of UFO and HW checksums (BZ#1773816)</li> <li> UDPv6 packets badly fragmented when ESP in use on devices supporting UFO (BZ#1774503)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel-abi-whitelists | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel-debug | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel-debug-debuginfo | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel-debug-devel | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel-debuginfo | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel-devel | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel-doc | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel-headers | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel-tools | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel-tools-debuginfo | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel-tools-libs | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel-tools-libs-devel | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/perf | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/perf-debuginfo | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/python-perf | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/python-perf-debuginfo | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel-bootwrapper | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel-debug | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel-debug-debuginfo | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel-debug-devel | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel-debuginfo | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel-debuginfo-common-ppc64le | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel-devel | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel-headers | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel-tools | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel-tools-debuginfo | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel-tools-libs | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/kernel-tools-libs-devel | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/perf | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/perf-debuginfo | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/python-perf | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
redhat/python-perf-debuginfo | <3.10.0-514.71.1.el7 | 3.10.0-514.71.1.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.