Oval Definition:oval:com.redhat.rhsa:def:20182772
Revision Date:2018-09-25Version:602
Title:RHSA-2018:2772: kernel-alt security and bug fix update (Important)
Description:The kernel-alt packages provide the Linux kernel version 4.x.

Security Fix(es):

  • kernel: Infoleak/use-after-free in __oom_reap_task_mm function in mm/oom_kill.c (CVE-2017-18202)

    For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

    Bug Fix(es):

  • Previously, on certain little-endian variants of IBM Power Systems, there was no “sysfs spec_store_bypass” file. As a consequence, there was no way to indicate the Speculative Store Bypass Disable (SSBD) mitigation status. This update adds infrastructure code into the kernel to create the /sys/devices/system/cpu/vulnerabilities/
  • files. As a result, sysfs spec_store_bypass shows whether the SSBD mitigation is disabled or enabled. (BZ#1602340)

  • Previously, the kernel architectures for IBM z Systems were missing support to display the status of the Spectre v2 mitigations. As a consequence, the /sys/devices/system/cpu/vulnerabilities/spectre_v2 file did not exist. With this update, the kernel now shows the status in the above mentioned file and as a result, the file now reports either "Vulnerable" or "Mitigation: execute trampolines" message. (BZ#1619667)
  • Family:unixClass:patch
    Status:Reference(s):CVE-2017-18202
    RHSA-2018:2772-00
    RHSA-2018:2772-01
    Platform(s):Red Hat Enterprise Linux 7
    Product(s):
    Definition Synopsis
  • Release Information
  • Red Hat Enterprise Linux 7 Client is installed
  • OR Red Hat Enterprise Linux 7 Server is installed
  • OR Red Hat Enterprise Linux 7 Workstation is installed
  • OR Red Hat Enterprise Linux 7 ComputeNode is installed
  • AND Package Information
  • kernel is earlier than 0:4.14.0-49.13.1.el7a
  • AND kernel is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-abi-whitelists is earlier than 0:4.14.0-49.13.1.el7a
  • AND kernel-abi-whitelists is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-bootwrapper is earlier than 0:4.14.0-49.13.1.el7a
  • AND kernel-bootwrapper is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-debug is earlier than 0:4.14.0-49.13.1.el7a
  • AND kernel-debug is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-debug-devel is earlier than 0:4.14.0-49.13.1.el7a
  • AND kernel-debug-devel is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-devel is earlier than 0:4.14.0-49.13.1.el7a
  • AND kernel-devel is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-doc is earlier than 0:4.14.0-49.13.1.el7a
  • AND kernel-doc is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-headers is earlier than 0:4.14.0-49.13.1.el7a
  • AND kernel-headers is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-kdump is earlier than 0:4.14.0-49.13.1.el7a
  • AND kernel-kdump is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-kdump-devel is earlier than 0:4.14.0-49.13.1.el7a
  • AND kernel-kdump-devel is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-tools is earlier than 0:4.14.0-49.13.1.el7a
  • AND kernel-tools is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-tools-libs is earlier than 0:4.14.0-49.13.1.el7a
  • AND kernel-tools-libs is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-tools-libs-devel is earlier than 0:4.14.0-49.13.1.el7a
  • AND kernel-tools-libs-devel is signed with Red Hat redhatrelease2 key
  • OR
  • perf is earlier than 0:4.14.0-49.13.1.el7a
  • AND perf is signed with Red Hat redhatrelease2 key
  • OR
  • python-perf is earlier than 0:4.14.0-49.13.1.el7a
  • AND python-perf is signed with Red Hat redhatrelease2 key
  • BACK