- Issued:
- 2017-11-09
- Updated:
- 2017-11-09
RHEA-2017:3163 - Product Enhancement Advisory
Synopsis
new packages: kernel-alt
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
New kernel-alt packages are now available for Red Hat Enterprise Linux 7.
Description
The kernel-alt packages provide the Linux kernel version 4.11.0.
This enhancement update adds the kernel-alt packages to Red Hat Enterprise Linux 7 for ARM and for IBM Power LE (POWER9).
For detailed information on changes in this release, see the Release Notes linked from the References section.
Affected Products
- Red Hat Enterprise Linux for ARM 64 7 aarch64
- Red Hat Enterprise Linux for Power 9 7 ppc64le
Fixes
- BZ - 1399727 - CVE-2016-7910 kernel: Use after free in seq file
- BZ - 1403145 - CVE-2016-9576 kernel: Use after free in SCSI generic device interface
- BZ - 1404200 - CVE-2016-10147 kernel: Kernel crash by spawning mcrypt(alg) with incompatible algorithm
- BZ - 1404939 - CVE-2016-7914 kernel: assoc_array: don't call compare_object() on a node
- BZ - 1406085 - CVE-2016-7916 kernel: proc: prevent accessing /proc/<pid>/environ until it's ready
- BZ - 1412210 - CVE-2016-10088 kernel: Use after free in SCSI generic device interface (CVE-2016-9576 regression)
- BZ - 1416114 - CVE-2017-5549 kernel: Incorrect line-state error handling
- BZ - 1419916 - CVE-2017-2618 kernel: Off-by-one error in selinux_setprocattr (/proc/self/attr/fscreate)
- BZ - 1420276 - CVE-2017-5986 kernel: Reachable BUG_ON from userspace in sctp_wait_for_sndbuf
- BZ - 1428319 - CVE-2017-2636 kernel: Race condition access to n_hdlc.tbuf causes double free in n_hdlc_release()
- BZ - 1436629 - CVE-2017-7277 kernel: Mishandling SCM_TIMESTAMPING_OPT_STATS feature causes out-of-bounds read
- BZ - 1437404 - CVE-2017-7308 kernel: net/packet: overflow in check for priv area size
- BZ - 1441088 - CVE-2017-7616 kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c
- BZ - 1450972 - CVE-2017-8890 kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c
- BZ - 1452679 - CVE-2017-9074 kernel: net: IPv6 fragmentation implementation of nexthdr field may be associated with an invalid option
- BZ - 1462706 - Backport vfio/type1: Synchronous locked page accounting
- BZ - 1473649 - CVE-2017-7542 kernel: Integer overflow in ip6_find_1stfragopt() causes infinite loop
- BZ - 1479304 - CVE-2017-1000111 kernel: Heap out-of-bounds in AF_PACKET sockets
- BZ - 1480266 - CVE-2017-7558 kernel: Out of bounds read in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info() in SCTP stack
- BZ - 1487295 - CVE-2017-14106 kernel: Divide-by-zero in __tcp_select_window
- BZ - 1492984 - CVE-2017-12168 Kernel: kvm: ARM64: assert failure when accessing PMCCNTR register
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Enterprise Linux for ARM 64 7
SRPM | |
---|---|
kernel-alt-4.11.0-44.el7a.src.rpm | SHA-256: 85c3fe2b237b6df6de7246cb02de017c38639c42a1bd6795e83e364240751bd3 |
aarch64 | |
kernel-4.11.0-44.el7a.aarch64.rpm | SHA-256: 15e338d9d991bbcb96932ae65e48728511129fd07438fb41fe664456c823899d |
kernel-abi-whitelists-4.11.0-44.el7a.noarch.rpm | SHA-256: 80b026b6b88b8b4161854ebef2d2638a4202ebc02ced76c5f20b8664703a43d1 |
kernel-debug-4.11.0-44.el7a.aarch64.rpm | SHA-256: cffd531bb665a68651c963c38f8f055ce921b0099456fd57910dfdca9a70d1d6 |
kernel-debug-debuginfo-4.11.0-44.el7a.aarch64.rpm | SHA-256: 9ae25205c5d393a78818bbeb445f755ffc9276aa613130ad3f84bc4f4b3f5e9d |
kernel-debug-debuginfo-4.11.0-44.el7a.aarch64.rpm | SHA-256: 9ae25205c5d393a78818bbeb445f755ffc9276aa613130ad3f84bc4f4b3f5e9d |
kernel-debug-devel-4.11.0-44.el7a.aarch64.rpm | SHA-256: 53e4b24730e6837e7a5aab490a3041ca8d123fb125dceccc47c2e018729e3115 |
kernel-debuginfo-4.11.0-44.el7a.aarch64.rpm | SHA-256: e9b4116a66f6884cea43f7880b617b506578d776818a5f879d28e4c9f3f46eb5 |
kernel-debuginfo-4.11.0-44.el7a.aarch64.rpm | SHA-256: e9b4116a66f6884cea43f7880b617b506578d776818a5f879d28e4c9f3f46eb5 |
kernel-debuginfo-common-aarch64-4.11.0-44.el7a.aarch64.rpm | SHA-256: 4cb292379e865be861edf117c56ae37b45a1ef21fef25c5fcb64cc58be932b03 |
kernel-debuginfo-common-aarch64-4.11.0-44.el7a.aarch64.rpm | SHA-256: 4cb292379e865be861edf117c56ae37b45a1ef21fef25c5fcb64cc58be932b03 |
kernel-devel-4.11.0-44.el7a.aarch64.rpm | SHA-256: 54c5d05955c9f90e6aab674dcd1e7dbdb9fc2c98e991a7c675e40c539ac930a4 |
kernel-doc-4.11.0-44.el7a.noarch.rpm | SHA-256: dfa3da767f5a1a1e68a222f97d6d62267bb374d46539a5c2b5f7cbda604f09a1 |
kernel-headers-4.11.0-44.el7a.aarch64.rpm | SHA-256: a295aed82ca5f1b9299fb2c1d6f3e858fda6b8c5ecf8774dadbb6229754335c4 |
kernel-tools-4.11.0-44.el7a.aarch64.rpm | SHA-256: 5f4f56fc39531f32f8ef88751297ce06fcb50953d86b4259cb24fbb4496a211c |
kernel-tools-debuginfo-4.11.0-44.el7a.aarch64.rpm | SHA-256: 9a5e5aab7d4bcbd928104efb2c7e2682d964885c570f1739e61a3c8769981ef1 |
kernel-tools-debuginfo-4.11.0-44.el7a.aarch64.rpm | SHA-256: 9a5e5aab7d4bcbd928104efb2c7e2682d964885c570f1739e61a3c8769981ef1 |
kernel-tools-libs-4.11.0-44.el7a.aarch64.rpm | SHA-256: 5e6bb9aac4c614863e705ac56d9e15cf0af9c42564fc33adf3692aa58a3b7a47 |
kernel-tools-libs-devel-4.11.0-44.el7a.aarch64.rpm | SHA-256: d44354b86efb1656f9ee89f547bb21c7dd046db6fc485ac8dea1c7e2aedc8ae0 |
perf-4.11.0-44.el7a.aarch64.rpm | SHA-256: e9396a74914d9903083a6acab8b4b1736dcb036ac55e68cade1a005e145ed8e8 |
perf-debuginfo-4.11.0-44.el7a.aarch64.rpm | SHA-256: 483826a68e56bfa19fc283586ac47e280f950b4dc06af12994879b0915eb85b8 |
perf-debuginfo-4.11.0-44.el7a.aarch64.rpm | SHA-256: 483826a68e56bfa19fc283586ac47e280f950b4dc06af12994879b0915eb85b8 |
python-perf-4.11.0-44.el7a.aarch64.rpm | SHA-256: ab7ab8ecabc84658a4a0088c29aaedc59034e58705728327474f17d501ad6a0f |
python-perf-debuginfo-4.11.0-44.el7a.aarch64.rpm | SHA-256: 0fac57f7b608f09e3b69f86f10f56fa45bed0f34229dfbd5316b900907d8b24e |
python-perf-debuginfo-4.11.0-44.el7a.aarch64.rpm | SHA-256: 0fac57f7b608f09e3b69f86f10f56fa45bed0f34229dfbd5316b900907d8b24e |
Red Hat Enterprise Linux for Power 9 7
SRPM | |
---|---|
kernel-alt-4.11.0-44.el7a.src.rpm | SHA-256: 85c3fe2b237b6df6de7246cb02de017c38639c42a1bd6795e83e364240751bd3 |
ppc64le | |
kernel-4.11.0-44.el7a.ppc64le.rpm | SHA-256: 8d662db5ea257e7b5b9a80e9b78e5805d482a68bc8a339e681ce57ec081dac1e |
kernel-abi-whitelists-4.11.0-44.el7a.noarch.rpm | SHA-256: 80b026b6b88b8b4161854ebef2d2638a4202ebc02ced76c5f20b8664703a43d1 |
kernel-bootwrapper-4.11.0-44.el7a.ppc64le.rpm | SHA-256: 43bdc89e908274fba0cef7fe3d51da54c2eb0f557260785c499ff56b916f46a8 |
kernel-debug-4.11.0-44.el7a.ppc64le.rpm | SHA-256: ce7f0bc1ae1abe2206e9d14939f6e613f7dbedacd59f003b068e428987ff6b72 |
kernel-debug-debuginfo-4.11.0-44.el7a.ppc64le.rpm | SHA-256: d77e59ee14ef161f79f01ec29ff6ece924a83e27efaab4d7c6c8ed4260917830 |
kernel-debug-debuginfo-4.11.0-44.el7a.ppc64le.rpm | SHA-256: d77e59ee14ef161f79f01ec29ff6ece924a83e27efaab4d7c6c8ed4260917830 |
kernel-debug-devel-4.11.0-44.el7a.ppc64le.rpm | SHA-256: a280757e28b9773f53b9dbaaabd44bbc9ea2c439e59394dcd339e5fbc7b37cf7 |
kernel-debuginfo-4.11.0-44.el7a.ppc64le.rpm | SHA-256: 66aa7212aad5e8c74cf36781261cf37362a48393f86576bbe16e1e093fabdb9e |
kernel-debuginfo-4.11.0-44.el7a.ppc64le.rpm | SHA-256: 66aa7212aad5e8c74cf36781261cf37362a48393f86576bbe16e1e093fabdb9e |
kernel-debuginfo-common-ppc64le-4.11.0-44.el7a.ppc64le.rpm | SHA-256: 5996967ace7a5cafc8308cebd1f793c7b59af94081ad2e045e06d1e04e318733 |
kernel-debuginfo-common-ppc64le-4.11.0-44.el7a.ppc64le.rpm | SHA-256: 5996967ace7a5cafc8308cebd1f793c7b59af94081ad2e045e06d1e04e318733 |
kernel-devel-4.11.0-44.el7a.ppc64le.rpm | SHA-256: 52417d677beac960af53ce8667512138171eff07b311360ae38f8e399a7092d1 |
kernel-doc-4.11.0-44.el7a.noarch.rpm | SHA-256: dfa3da767f5a1a1e68a222f97d6d62267bb374d46539a5c2b5f7cbda604f09a1 |
kernel-headers-4.11.0-44.el7a.ppc64le.rpm | SHA-256: 31c21aacbefe9ad21a4bc682b3d3fbfd0bbf425d9fa38075ced9abbd755e38d3 |
kernel-tools-4.11.0-44.el7a.ppc64le.rpm | SHA-256: 1c07dc27284bc3dbfc79bc4c01db9f44bff199eabe673f501e90cb78b8b9f95b |
kernel-tools-debuginfo-4.11.0-44.el7a.ppc64le.rpm | SHA-256: 33fa75e8838c58495cd3020005be84b8fbc784a58622db0ffa33ef56484811e5 |
kernel-tools-debuginfo-4.11.0-44.el7a.ppc64le.rpm | SHA-256: 33fa75e8838c58495cd3020005be84b8fbc784a58622db0ffa33ef56484811e5 |
kernel-tools-libs-4.11.0-44.el7a.ppc64le.rpm | SHA-256: fdec5494fdce3163e4e3d40a66d7a31bd85c2009571264c76bd8c04b6ee60d75 |
kernel-tools-libs-devel-4.11.0-44.el7a.ppc64le.rpm | SHA-256: 032d930a20ba75368aedca7f4ca87d8c21ba5c7a37757f65b61b8b8d4bb4b6a8 |
perf-4.11.0-44.el7a.ppc64le.rpm | SHA-256: 46174e01b4c715acc7473b2060dff5432e58ea7cf879fc9cd1a6410da4b82666 |
perf-debuginfo-4.11.0-44.el7a.ppc64le.rpm | SHA-256: 19c5d564753eb986b937fd0864e06f307a0ed5bfc42cde7977ce6a46fa9a090d |
perf-debuginfo-4.11.0-44.el7a.ppc64le.rpm | SHA-256: 19c5d564753eb986b937fd0864e06f307a0ed5bfc42cde7977ce6a46fa9a090d |
python-perf-4.11.0-44.el7a.ppc64le.rpm | SHA-256: 1362ffbe638cc28b65f0ebca751d9e4bfab1a8f6b0966ec5582442e7dbe24326 |
python-perf-debuginfo-4.11.0-44.el7a.ppc64le.rpm | SHA-256: 38bd3f6998a7c09b5906bc4e52a54a1526e3d63993c37d1de10b4bf710314317 |
python-perf-debuginfo-4.11.0-44.el7a.ppc64le.rpm | SHA-256: 38bd3f6998a7c09b5906bc4e52a54a1526e3d63993c37d1de10b4bf710314317 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.