Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2018:2790 - Security Advisory
Issued:
2018-09-25
Updated:
2018-09-25

RHSA-2018:2790 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)

Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting this issue.

Bug Fix(es):

  • Previously, the early microcode updater in the kernel was trying to perform a microcode update on virtualized guests. As a consequence, the virtualized guests sometimes mishandled the request to perform the microcode update and became unresponsive in the early boot stage. This update applies an upstream patch to avoid the early microcode update when running under a hypervisor. As a result, no kernel freezes appear in the described scenario. (BZ#1618386)

Solution

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server - AUS 7.2 x86_64
  • Red Hat Enterprise Linux Server - TUS 7.2 x86_64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.2 x86_64

Fixes

  • BZ - 1601704 - CVE-2018-5390 kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)

CVEs

  • CVE-2018-5390

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 7.2

SRPM
kernel-3.10.0-327.73.1.el7.src.rpm SHA-256: 9f643a05cc904c80f77c05d12749e2a7fdb12cde285ed4ecb156c3242bea7d64
x86_64
kernel-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 8f88a19b6e0bca5396ae60b4e94d523f975de5fd58f29eeb54b793a614c4330e
kernel-abi-whitelists-3.10.0-327.73.1.el7.noarch.rpm SHA-256: 94da42c7cf41649e506683855dbe9f107c853fafc4ed0cd6057010f3e9daea75
kernel-debug-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: eb646c65d55f772236b8a45fc5c32305566b132cb888f3e63350d8ae343cf958
kernel-debug-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: d90dbf281862630aa737b3b43705a52f1d4a5ed36583975d16943ed9c0ce87c7
kernel-debug-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: d90dbf281862630aa737b3b43705a52f1d4a5ed36583975d16943ed9c0ce87c7
kernel-debug-devel-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 36ad4b21b005e15c0dc33562b0a0a6b17af80e8277ebc8734144b81f2a868bcf
kernel-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 4b4052cfe2b67a4f89c94de3ee5230bab28cf8d83cf685214f58ccee55df10f6
kernel-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 4b4052cfe2b67a4f89c94de3ee5230bab28cf8d83cf685214f58ccee55df10f6
kernel-debuginfo-common-x86_64-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: a2804346eed365d7015b6b7eb1d532b050a75b9b89f207b9dfdf21ce74adec85
kernel-debuginfo-common-x86_64-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: a2804346eed365d7015b6b7eb1d532b050a75b9b89f207b9dfdf21ce74adec85
kernel-devel-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 904ef09fa6fe9120abca0d9e801d64eed73ab0b3a127a7bf1fc3fa0a0fedbde5
kernel-doc-3.10.0-327.73.1.el7.noarch.rpm SHA-256: 92b89f70acff8a87e4fe2992dd7ec3872e652e0d6f1eaa1cbca9f840d83cd305
kernel-headers-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: ed912d4f4284a6f71785a12d8e0b07b5fdd099d58b7bd3e3f779c986a6e995e3
kernel-tools-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 5dc9faa67c44dfafc10e71a27a14a94a6d296b85553722bf2f46aea89dd8c63f
kernel-tools-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 2f91f058356f3b83cc291114421f7729c1352f951de67bef1dbfeb1f2ac63058
kernel-tools-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 2f91f058356f3b83cc291114421f7729c1352f951de67bef1dbfeb1f2ac63058
kernel-tools-libs-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 823f4e7eac314e88355a80f2fbc5d747ca2ee08463b85c4efdb8d9da8154dbf1
kernel-tools-libs-devel-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: e976f9265d157ec8d353cb04e573da3d4d40bec01652ed4d60da0462302227d6
perf-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 8c1c94524f502d32722c44f4161efe2d1f46d6025df52ac5f3a40f1d9e8ae4fa
perf-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 407590b4b6518f68226dbd4d62c16037df081ba6ffba226283c9a7704e8fb679
perf-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 407590b4b6518f68226dbd4d62c16037df081ba6ffba226283c9a7704e8fb679
python-perf-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 34b360bccfd1545cd3e7dc8b0c9a50c6a73472412ca4fd101d16bb3e16054b53
python-perf-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: e74b4b693072b707558565a9ccc5d3b1b5ecc639ba032225d02d65f5156ad196
python-perf-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: e74b4b693072b707558565a9ccc5d3b1b5ecc639ba032225d02d65f5156ad196

Red Hat Enterprise Linux Server - TUS 7.2

SRPM
kernel-3.10.0-327.73.1.el7.src.rpm SHA-256: 9f643a05cc904c80f77c05d12749e2a7fdb12cde285ed4ecb156c3242bea7d64
x86_64
kernel-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 8f88a19b6e0bca5396ae60b4e94d523f975de5fd58f29eeb54b793a614c4330e
kernel-abi-whitelists-3.10.0-327.73.1.el7.noarch.rpm SHA-256: 94da42c7cf41649e506683855dbe9f107c853fafc4ed0cd6057010f3e9daea75
kernel-debug-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: eb646c65d55f772236b8a45fc5c32305566b132cb888f3e63350d8ae343cf958
kernel-debug-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: d90dbf281862630aa737b3b43705a52f1d4a5ed36583975d16943ed9c0ce87c7
kernel-debug-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: d90dbf281862630aa737b3b43705a52f1d4a5ed36583975d16943ed9c0ce87c7
kernel-debug-devel-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 36ad4b21b005e15c0dc33562b0a0a6b17af80e8277ebc8734144b81f2a868bcf
kernel-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 4b4052cfe2b67a4f89c94de3ee5230bab28cf8d83cf685214f58ccee55df10f6
kernel-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 4b4052cfe2b67a4f89c94de3ee5230bab28cf8d83cf685214f58ccee55df10f6
kernel-debuginfo-common-x86_64-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: a2804346eed365d7015b6b7eb1d532b050a75b9b89f207b9dfdf21ce74adec85
kernel-debuginfo-common-x86_64-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: a2804346eed365d7015b6b7eb1d532b050a75b9b89f207b9dfdf21ce74adec85
kernel-devel-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 904ef09fa6fe9120abca0d9e801d64eed73ab0b3a127a7bf1fc3fa0a0fedbde5
kernel-doc-3.10.0-327.73.1.el7.noarch.rpm SHA-256: 92b89f70acff8a87e4fe2992dd7ec3872e652e0d6f1eaa1cbca9f840d83cd305
kernel-headers-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: ed912d4f4284a6f71785a12d8e0b07b5fdd099d58b7bd3e3f779c986a6e995e3
kernel-tools-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 5dc9faa67c44dfafc10e71a27a14a94a6d296b85553722bf2f46aea89dd8c63f
kernel-tools-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 2f91f058356f3b83cc291114421f7729c1352f951de67bef1dbfeb1f2ac63058
kernel-tools-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 2f91f058356f3b83cc291114421f7729c1352f951de67bef1dbfeb1f2ac63058
kernel-tools-libs-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 823f4e7eac314e88355a80f2fbc5d747ca2ee08463b85c4efdb8d9da8154dbf1
kernel-tools-libs-devel-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: e976f9265d157ec8d353cb04e573da3d4d40bec01652ed4d60da0462302227d6
perf-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 8c1c94524f502d32722c44f4161efe2d1f46d6025df52ac5f3a40f1d9e8ae4fa
perf-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 407590b4b6518f68226dbd4d62c16037df081ba6ffba226283c9a7704e8fb679
perf-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 407590b4b6518f68226dbd4d62c16037df081ba6ffba226283c9a7704e8fb679
python-perf-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 34b360bccfd1545cd3e7dc8b0c9a50c6a73472412ca4fd101d16bb3e16054b53
python-perf-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: e74b4b693072b707558565a9ccc5d3b1b5ecc639ba032225d02d65f5156ad196
python-perf-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: e74b4b693072b707558565a9ccc5d3b1b5ecc639ba032225d02d65f5156ad196

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.2

SRPM
kernel-3.10.0-327.73.1.el7.src.rpm SHA-256: 9f643a05cc904c80f77c05d12749e2a7fdb12cde285ed4ecb156c3242bea7d64
x86_64
kernel-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 8f88a19b6e0bca5396ae60b4e94d523f975de5fd58f29eeb54b793a614c4330e
kernel-abi-whitelists-3.10.0-327.73.1.el7.noarch.rpm SHA-256: 94da42c7cf41649e506683855dbe9f107c853fafc4ed0cd6057010f3e9daea75
kernel-debug-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: eb646c65d55f772236b8a45fc5c32305566b132cb888f3e63350d8ae343cf958
kernel-debug-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: d90dbf281862630aa737b3b43705a52f1d4a5ed36583975d16943ed9c0ce87c7
kernel-debug-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: d90dbf281862630aa737b3b43705a52f1d4a5ed36583975d16943ed9c0ce87c7
kernel-debug-devel-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 36ad4b21b005e15c0dc33562b0a0a6b17af80e8277ebc8734144b81f2a868bcf
kernel-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 4b4052cfe2b67a4f89c94de3ee5230bab28cf8d83cf685214f58ccee55df10f6
kernel-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 4b4052cfe2b67a4f89c94de3ee5230bab28cf8d83cf685214f58ccee55df10f6
kernel-debuginfo-common-x86_64-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: a2804346eed365d7015b6b7eb1d532b050a75b9b89f207b9dfdf21ce74adec85
kernel-debuginfo-common-x86_64-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: a2804346eed365d7015b6b7eb1d532b050a75b9b89f207b9dfdf21ce74adec85
kernel-devel-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 904ef09fa6fe9120abca0d9e801d64eed73ab0b3a127a7bf1fc3fa0a0fedbde5
kernel-doc-3.10.0-327.73.1.el7.noarch.rpm SHA-256: 92b89f70acff8a87e4fe2992dd7ec3872e652e0d6f1eaa1cbca9f840d83cd305
kernel-headers-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: ed912d4f4284a6f71785a12d8e0b07b5fdd099d58b7bd3e3f779c986a6e995e3
kernel-tools-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 5dc9faa67c44dfafc10e71a27a14a94a6d296b85553722bf2f46aea89dd8c63f
kernel-tools-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 2f91f058356f3b83cc291114421f7729c1352f951de67bef1dbfeb1f2ac63058
kernel-tools-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 2f91f058356f3b83cc291114421f7729c1352f951de67bef1dbfeb1f2ac63058
kernel-tools-libs-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 823f4e7eac314e88355a80f2fbc5d747ca2ee08463b85c4efdb8d9da8154dbf1
kernel-tools-libs-devel-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: e976f9265d157ec8d353cb04e573da3d4d40bec01652ed4d60da0462302227d6
perf-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 8c1c94524f502d32722c44f4161efe2d1f46d6025df52ac5f3a40f1d9e8ae4fa
perf-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 407590b4b6518f68226dbd4d62c16037df081ba6ffba226283c9a7704e8fb679
perf-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 407590b4b6518f68226dbd4d62c16037df081ba6ffba226283c9a7704e8fb679
python-perf-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: 34b360bccfd1545cd3e7dc8b0c9a50c6a73472412ca4fd101d16bb3e16054b53
python-perf-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: e74b4b693072b707558565a9ccc5d3b1b5ecc639ba032225d02d65f5156ad196
python-perf-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm SHA-256: e74b4b693072b707558565a9ccc5d3b1b5ecc639ba032225d02d65f5156ad196

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility