Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHEA-2017:3163 - Product Enhancement Advisory
Issued:
2017-11-09
Updated:
2017-11-09

RHEA-2017:3163 - Product Enhancement Advisory

  • Overview
  • Updated Packages

Synopsis

new packages: kernel-alt

Type/Severity

Product Enhancement Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

New kernel-alt packages are now available for Red Hat Enterprise Linux 7.

Description

The kernel-alt packages provide the Linux kernel version 4.11.0.

This enhancement update adds the kernel-alt packages to Red Hat Enterprise Linux 7 for ARM and for IBM Power LE (POWER9).

For detailed information on changes in this release, see the Release Notes linked from the References section.

Solution

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for ARM 64 7 aarch64
  • Red Hat Enterprise Linux for Power 9 7 ppc64le

Fixes

  • BZ - 1399727 - CVE-2016-7910 kernel: Use after free in seq file
  • BZ - 1403145 - CVE-2016-9576 kernel: Use after free in SCSI generic device interface
  • BZ - 1404200 - CVE-2016-10147 kernel: Kernel crash by spawning mcrypt(alg) with incompatible algorithm
  • BZ - 1404939 - CVE-2016-7914 kernel: assoc_array: don't call compare_object() on a node
  • BZ - 1406085 - CVE-2016-7916 kernel: proc: prevent accessing /proc/<pid>/environ until it's ready
  • BZ - 1412210 - CVE-2016-10088 kernel: Use after free in SCSI generic device interface (CVE-2016-9576 regression)
  • BZ - 1416114 - CVE-2017-5549 kernel: Incorrect line-state error handling
  • BZ - 1419916 - CVE-2017-2618 kernel: Off-by-one error in selinux_setprocattr (/proc/self/attr/fscreate)
  • BZ - 1420276 - CVE-2017-5986 kernel: Reachable BUG_ON from userspace in sctp_wait_for_sndbuf
  • BZ - 1428319 - CVE-2017-2636 kernel: Race condition access to n_hdlc.tbuf causes double free in n_hdlc_release()
  • BZ - 1436629 - CVE-2017-7277 kernel: Mishandling SCM_TIMESTAMPING_OPT_STATS feature causes out-of-bounds read
  • BZ - 1437404 - CVE-2017-7308 kernel: net/packet: overflow in check for priv area size
  • BZ - 1441088 - CVE-2017-7616 kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c
  • BZ - 1450972 - CVE-2017-8890 kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c
  • BZ - 1452679 - CVE-2017-9074 kernel: net: IPv6 fragmentation implementation of nexthdr field may be associated with an invalid option
  • BZ - 1462706 - Backport vfio/type1: Synchronous locked page accounting
  • BZ - 1473649 - CVE-2017-7542 kernel: Integer overflow in ip6_find_1stfragopt() causes infinite loop
  • BZ - 1479304 - CVE-2017-1000111 kernel: Heap out-of-bounds in AF_PACKET sockets
  • BZ - 1480266 - CVE-2017-7558 kernel: Out of bounds read in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info() in SCTP stack
  • BZ - 1487295 - CVE-2017-14106 kernel: Divide-by-zero in __tcp_select_window
  • BZ - 1492984 - CVE-2017-12168 Kernel: kvm: ARM64: assert failure when accessing PMCCNTR register

CVEs

  • CVE-2017-12146
  • CVE-2017-12168

References

  • https://access.redhat.com/articles/3158541
  • https://access.redhat.com/articles/3158511
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for ARM 64 7

SRPM
kernel-alt-4.11.0-44.el7a.src.rpm SHA-256: 85c3fe2b237b6df6de7246cb02de017c38639c42a1bd6795e83e364240751bd3
aarch64
kernel-4.11.0-44.el7a.aarch64.rpm SHA-256: 15e338d9d991bbcb96932ae65e48728511129fd07438fb41fe664456c823899d
kernel-abi-whitelists-4.11.0-44.el7a.noarch.rpm SHA-256: 80b026b6b88b8b4161854ebef2d2638a4202ebc02ced76c5f20b8664703a43d1
kernel-debug-4.11.0-44.el7a.aarch64.rpm SHA-256: cffd531bb665a68651c963c38f8f055ce921b0099456fd57910dfdca9a70d1d6
kernel-debug-debuginfo-4.11.0-44.el7a.aarch64.rpm SHA-256: 9ae25205c5d393a78818bbeb445f755ffc9276aa613130ad3f84bc4f4b3f5e9d
kernel-debug-debuginfo-4.11.0-44.el7a.aarch64.rpm SHA-256: 9ae25205c5d393a78818bbeb445f755ffc9276aa613130ad3f84bc4f4b3f5e9d
kernel-debug-devel-4.11.0-44.el7a.aarch64.rpm SHA-256: 53e4b24730e6837e7a5aab490a3041ca8d123fb125dceccc47c2e018729e3115
kernel-debuginfo-4.11.0-44.el7a.aarch64.rpm SHA-256: e9b4116a66f6884cea43f7880b617b506578d776818a5f879d28e4c9f3f46eb5
kernel-debuginfo-4.11.0-44.el7a.aarch64.rpm SHA-256: e9b4116a66f6884cea43f7880b617b506578d776818a5f879d28e4c9f3f46eb5
kernel-debuginfo-common-aarch64-4.11.0-44.el7a.aarch64.rpm SHA-256: 4cb292379e865be861edf117c56ae37b45a1ef21fef25c5fcb64cc58be932b03
kernel-debuginfo-common-aarch64-4.11.0-44.el7a.aarch64.rpm SHA-256: 4cb292379e865be861edf117c56ae37b45a1ef21fef25c5fcb64cc58be932b03
kernel-devel-4.11.0-44.el7a.aarch64.rpm SHA-256: 54c5d05955c9f90e6aab674dcd1e7dbdb9fc2c98e991a7c675e40c539ac930a4
kernel-doc-4.11.0-44.el7a.noarch.rpm SHA-256: dfa3da767f5a1a1e68a222f97d6d62267bb374d46539a5c2b5f7cbda604f09a1
kernel-headers-4.11.0-44.el7a.aarch64.rpm SHA-256: a295aed82ca5f1b9299fb2c1d6f3e858fda6b8c5ecf8774dadbb6229754335c4
kernel-tools-4.11.0-44.el7a.aarch64.rpm SHA-256: 5f4f56fc39531f32f8ef88751297ce06fcb50953d86b4259cb24fbb4496a211c
kernel-tools-debuginfo-4.11.0-44.el7a.aarch64.rpm SHA-256: 9a5e5aab7d4bcbd928104efb2c7e2682d964885c570f1739e61a3c8769981ef1
kernel-tools-debuginfo-4.11.0-44.el7a.aarch64.rpm SHA-256: 9a5e5aab7d4bcbd928104efb2c7e2682d964885c570f1739e61a3c8769981ef1
kernel-tools-libs-4.11.0-44.el7a.aarch64.rpm SHA-256: 5e6bb9aac4c614863e705ac56d9e15cf0af9c42564fc33adf3692aa58a3b7a47
kernel-tools-libs-devel-4.11.0-44.el7a.aarch64.rpm SHA-256: d44354b86efb1656f9ee89f547bb21c7dd046db6fc485ac8dea1c7e2aedc8ae0
perf-4.11.0-44.el7a.aarch64.rpm SHA-256: e9396a74914d9903083a6acab8b4b1736dcb036ac55e68cade1a005e145ed8e8
perf-debuginfo-4.11.0-44.el7a.aarch64.rpm SHA-256: 483826a68e56bfa19fc283586ac47e280f950b4dc06af12994879b0915eb85b8
perf-debuginfo-4.11.0-44.el7a.aarch64.rpm SHA-256: 483826a68e56bfa19fc283586ac47e280f950b4dc06af12994879b0915eb85b8
python-perf-4.11.0-44.el7a.aarch64.rpm SHA-256: ab7ab8ecabc84658a4a0088c29aaedc59034e58705728327474f17d501ad6a0f
python-perf-debuginfo-4.11.0-44.el7a.aarch64.rpm SHA-256: 0fac57f7b608f09e3b69f86f10f56fa45bed0f34229dfbd5316b900907d8b24e
python-perf-debuginfo-4.11.0-44.el7a.aarch64.rpm SHA-256: 0fac57f7b608f09e3b69f86f10f56fa45bed0f34229dfbd5316b900907d8b24e

Red Hat Enterprise Linux for Power 9 7

SRPM
kernel-alt-4.11.0-44.el7a.src.rpm SHA-256: 85c3fe2b237b6df6de7246cb02de017c38639c42a1bd6795e83e364240751bd3
ppc64le
kernel-4.11.0-44.el7a.ppc64le.rpm SHA-256: 8d662db5ea257e7b5b9a80e9b78e5805d482a68bc8a339e681ce57ec081dac1e
kernel-abi-whitelists-4.11.0-44.el7a.noarch.rpm SHA-256: 80b026b6b88b8b4161854ebef2d2638a4202ebc02ced76c5f20b8664703a43d1
kernel-bootwrapper-4.11.0-44.el7a.ppc64le.rpm SHA-256: 43bdc89e908274fba0cef7fe3d51da54c2eb0f557260785c499ff56b916f46a8
kernel-debug-4.11.0-44.el7a.ppc64le.rpm SHA-256: ce7f0bc1ae1abe2206e9d14939f6e613f7dbedacd59f003b068e428987ff6b72
kernel-debug-debuginfo-4.11.0-44.el7a.ppc64le.rpm SHA-256: d77e59ee14ef161f79f01ec29ff6ece924a83e27efaab4d7c6c8ed4260917830
kernel-debug-debuginfo-4.11.0-44.el7a.ppc64le.rpm SHA-256: d77e59ee14ef161f79f01ec29ff6ece924a83e27efaab4d7c6c8ed4260917830
kernel-debug-devel-4.11.0-44.el7a.ppc64le.rpm SHA-256: a280757e28b9773f53b9dbaaabd44bbc9ea2c439e59394dcd339e5fbc7b37cf7
kernel-debuginfo-4.11.0-44.el7a.ppc64le.rpm SHA-256: 66aa7212aad5e8c74cf36781261cf37362a48393f86576bbe16e1e093fabdb9e
kernel-debuginfo-4.11.0-44.el7a.ppc64le.rpm SHA-256: 66aa7212aad5e8c74cf36781261cf37362a48393f86576bbe16e1e093fabdb9e
kernel-debuginfo-common-ppc64le-4.11.0-44.el7a.ppc64le.rpm SHA-256: 5996967ace7a5cafc8308cebd1f793c7b59af94081ad2e045e06d1e04e318733
kernel-debuginfo-common-ppc64le-4.11.0-44.el7a.ppc64le.rpm SHA-256: 5996967ace7a5cafc8308cebd1f793c7b59af94081ad2e045e06d1e04e318733
kernel-devel-4.11.0-44.el7a.ppc64le.rpm SHA-256: 52417d677beac960af53ce8667512138171eff07b311360ae38f8e399a7092d1
kernel-doc-4.11.0-44.el7a.noarch.rpm SHA-256: dfa3da767f5a1a1e68a222f97d6d62267bb374d46539a5c2b5f7cbda604f09a1
kernel-headers-4.11.0-44.el7a.ppc64le.rpm SHA-256: 31c21aacbefe9ad21a4bc682b3d3fbfd0bbf425d9fa38075ced9abbd755e38d3
kernel-tools-4.11.0-44.el7a.ppc64le.rpm SHA-256: 1c07dc27284bc3dbfc79bc4c01db9f44bff199eabe673f501e90cb78b8b9f95b
kernel-tools-debuginfo-4.11.0-44.el7a.ppc64le.rpm SHA-256: 33fa75e8838c58495cd3020005be84b8fbc784a58622db0ffa33ef56484811e5
kernel-tools-debuginfo-4.11.0-44.el7a.ppc64le.rpm SHA-256: 33fa75e8838c58495cd3020005be84b8fbc784a58622db0ffa33ef56484811e5
kernel-tools-libs-4.11.0-44.el7a.ppc64le.rpm SHA-256: fdec5494fdce3163e4e3d40a66d7a31bd85c2009571264c76bd8c04b6ee60d75
kernel-tools-libs-devel-4.11.0-44.el7a.ppc64le.rpm SHA-256: 032d930a20ba75368aedca7f4ca87d8c21ba5c7a37757f65b61b8b8d4bb4b6a8
perf-4.11.0-44.el7a.ppc64le.rpm SHA-256: 46174e01b4c715acc7473b2060dff5432e58ea7cf879fc9cd1a6410da4b82666
perf-debuginfo-4.11.0-44.el7a.ppc64le.rpm SHA-256: 19c5d564753eb986b937fd0864e06f307a0ed5bfc42cde7977ce6a46fa9a090d
perf-debuginfo-4.11.0-44.el7a.ppc64le.rpm SHA-256: 19c5d564753eb986b937fd0864e06f307a0ed5bfc42cde7977ce6a46fa9a090d
python-perf-4.11.0-44.el7a.ppc64le.rpm SHA-256: 1362ffbe638cc28b65f0ebca751d9e4bfab1a8f6b0966ec5582442e7dbe24326
python-perf-debuginfo-4.11.0-44.el7a.ppc64le.rpm SHA-256: 38bd3f6998a7c09b5906bc4e52a54a1526e3d63993c37d1de10b4bf710314317
python-perf-debuginfo-4.11.0-44.el7a.ppc64le.rpm SHA-256: 38bd3f6998a7c09b5906bc4e52a54a1526e3d63993c37d1de10b4bf710314317

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility