Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2019:1350 - Security Advisory
Issued:
2019-06-04
Updated:
2019-06-04

RHSA-2019:1350 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Low: kernel-alt security and bug fix update

Type/Severity

Security Advisory: Low

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel-alt is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel-alt packages provide the Linux kernel version 4.x.

Security Fix(es):

  • kernel: NULL pointer dereference in fs/xfs/libxfs/xfs_inode_buf.c (CVE-2018-13095)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • [rhel-alt] Could not remove the function from /sys/kernel/debug/tracing/kprobe_events (BZ#1677171)
  • RHEL-ALT-7.6z: usage of stale vma in do_fault() can lead to a crash (BZ#1679243)
  • RHEL-Alt-7.6 - Backport support for software count cache flush Spectre v2 mitigation (BZ#1692682)
  • RHEL-Alt-7.6 - [LTC Test][SR-IOV]: Guest with VF pass-through crashes during reboot operation in a loop. (kvm) (libvirt/kernel) (BZ#1693146)
  • RHEL-Alt-7.6 - Tolerate new s390x crypto hardware for migration (BZ#1695643)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for ARM 64 7 aarch64
  • Red Hat Enterprise Linux for Power 9 7 ppc64le
  • Red Hat Enterprise Linux for IBM System z (Structure A) 7 s390x

Fixes

  • BZ - 1597775 - CVE-2018-13095 kernel: NULL pointer dereference in fs/xfs/libxfs/xfs_inode_buf.c

CVEs

  • CVE-2018-13095

References

  • https://access.redhat.com/security/updates/classification/#low
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for ARM 64 7

SRPM
kernel-alt-4.14.0-115.8.1.el7a.src.rpm SHA-256: 62de88c02dc1c7f04dd2591d960ad10ac6001dc813b8322e5a3bccefe00fb498
aarch64
kernel-4.14.0-115.8.1.el7a.aarch64.rpm SHA-256: 340ccb392e885a09789493498ec3d1730ac60fb0e47fa44a0f8ca6e2c0acecc7
kernel-abi-whitelists-4.14.0-115.8.1.el7a.noarch.rpm SHA-256: 0500d28aed690bfa4504d8c74af94d5a1e995e8efc936f0eb4479dccfcbfa59a
kernel-debug-4.14.0-115.8.1.el7a.aarch64.rpm SHA-256: 7df5c26910e8d28cf422b3281315851217266466ea1b38070e2bd18c70bf101b
kernel-debug-debuginfo-4.14.0-115.8.1.el7a.aarch64.rpm SHA-256: dc29de4fe25e6055265b3861276e9851b43a2745c83a7717a5a7387553a23bd4
kernel-debug-debuginfo-4.14.0-115.8.1.el7a.aarch64.rpm SHA-256: dc29de4fe25e6055265b3861276e9851b43a2745c83a7717a5a7387553a23bd4
kernel-debug-devel-4.14.0-115.8.1.el7a.aarch64.rpm SHA-256: 020a3a9b6abe0df847427eda85ba4f0fbab4b2d5b1a3092e3ca4be9288f773ed
kernel-debuginfo-4.14.0-115.8.1.el7a.aarch64.rpm SHA-256: c40410e15a59dccdf4eddf830b3696bd3a121cafcebb3d93847780bf0a81486b
kernel-debuginfo-4.14.0-115.8.1.el7a.aarch64.rpm SHA-256: c40410e15a59dccdf4eddf830b3696bd3a121cafcebb3d93847780bf0a81486b
kernel-debuginfo-common-aarch64-4.14.0-115.8.1.el7a.aarch64.rpm SHA-256: 02a9c9906147f50ff5787912a3dd17dfab272bb1d81226b84eea4bedec356c9b
kernel-debuginfo-common-aarch64-4.14.0-115.8.1.el7a.aarch64.rpm SHA-256: 02a9c9906147f50ff5787912a3dd17dfab272bb1d81226b84eea4bedec356c9b
kernel-devel-4.14.0-115.8.1.el7a.aarch64.rpm SHA-256: e592f58166226bbf402ff8f49521a426ee7c3ed635b72461508c4386ad572b39
kernel-doc-4.14.0-115.8.1.el7a.noarch.rpm SHA-256: 0949ef6572e3b1d7ca4a2b0ea6ad555f8f0c4a66e9d2389a7e3c71626c4b3915
kernel-doc-4.14.0-115.8.1.el7a.noarch.rpm SHA-256: 0949ef6572e3b1d7ca4a2b0ea6ad555f8f0c4a66e9d2389a7e3c71626c4b3915
kernel-headers-4.14.0-115.8.1.el7a.aarch64.rpm SHA-256: 0f34a74599cc2fcffec9ebfba92edc41fce41c69aec3e304fa187262a2735e6a
kernel-tools-4.14.0-115.8.1.el7a.aarch64.rpm SHA-256: 4558a092f899bab6d71e77d7ed0beca469145b20a85714756498d67d3034294e
kernel-tools-debuginfo-4.14.0-115.8.1.el7a.aarch64.rpm SHA-256: b87a6a1ae6d8fadb2c6bbecb38a67cdbc6a53a38b711444374a7045999fb5bda
kernel-tools-debuginfo-4.14.0-115.8.1.el7a.aarch64.rpm SHA-256: b87a6a1ae6d8fadb2c6bbecb38a67cdbc6a53a38b711444374a7045999fb5bda
kernel-tools-libs-4.14.0-115.8.1.el7a.aarch64.rpm SHA-256: d5351e542078ea7d5b40451d3488f9f7478472af92fb48ce9579e50bf8218ec8
kernel-tools-libs-devel-4.14.0-115.8.1.el7a.aarch64.rpm SHA-256: 61cd1e07bed4857faf3f03ef3bd897dc0482625cc26a808a72747477bf87788e
perf-4.14.0-115.8.1.el7a.aarch64.rpm SHA-256: 0c13318052b5a5e5f516aa12f9dc922c0ebceb0ad66f078fd54f5aa2666bae51
perf-debuginfo-4.14.0-115.8.1.el7a.aarch64.rpm SHA-256: d0df9a9794ea535880745001879ea31db7b8685bc3798fa1356827e20cee2209
perf-debuginfo-4.14.0-115.8.1.el7a.aarch64.rpm SHA-256: d0df9a9794ea535880745001879ea31db7b8685bc3798fa1356827e20cee2209
python-perf-4.14.0-115.8.1.el7a.aarch64.rpm SHA-256: cd445ffa556a4c4c95a50d63c84f0135754991461c6f8380cb4eaec0d2a7d4ae
python-perf-debuginfo-4.14.0-115.8.1.el7a.aarch64.rpm SHA-256: 4a66332b30591b504a6f77db1c95315bd1785844a34dd6c50238fd9b42be464f
python-perf-debuginfo-4.14.0-115.8.1.el7a.aarch64.rpm SHA-256: 4a66332b30591b504a6f77db1c95315bd1785844a34dd6c50238fd9b42be464f

Red Hat Enterprise Linux for Power 9 7

SRPM
kernel-alt-4.14.0-115.8.1.el7a.src.rpm SHA-256: 62de88c02dc1c7f04dd2591d960ad10ac6001dc813b8322e5a3bccefe00fb498
ppc64le
kernel-4.14.0-115.8.1.el7a.ppc64le.rpm SHA-256: 8e1339896b39d3ded3b126191bbb9b7183b3951e9860cd18dbb0e0bc2928ffc2
kernel-abi-whitelists-4.14.0-115.8.1.el7a.noarch.rpm SHA-256: 0500d28aed690bfa4504d8c74af94d5a1e995e8efc936f0eb4479dccfcbfa59a
kernel-bootwrapper-4.14.0-115.8.1.el7a.ppc64le.rpm SHA-256: abf12b67cef38303869af61d04dfccd884814f0099694d291d0ed7b638f5e708
kernel-debug-4.14.0-115.8.1.el7a.ppc64le.rpm SHA-256: c4b457940f8387c01460fcba43d8ee063c42894292bdecb623d36c765f2af13e
kernel-debug-debuginfo-4.14.0-115.8.1.el7a.ppc64le.rpm SHA-256: 7267812c3a8e0b479de4ea6301d2dd7de96a82c8c5c88b6ec91df473150318a7
kernel-debug-debuginfo-4.14.0-115.8.1.el7a.ppc64le.rpm SHA-256: 7267812c3a8e0b479de4ea6301d2dd7de96a82c8c5c88b6ec91df473150318a7
kernel-debug-devel-4.14.0-115.8.1.el7a.ppc64le.rpm SHA-256: 43d6fc7d629fd9d4bfdb8d7da11612ffa676cefa7f3516c5758c79de2ec6a60e
kernel-debuginfo-4.14.0-115.8.1.el7a.ppc64le.rpm SHA-256: 7d12d0576e98d7e03957761dd96c113be15ab620f8bdc80fe3e0cd67a025b2c8
kernel-debuginfo-4.14.0-115.8.1.el7a.ppc64le.rpm SHA-256: 7d12d0576e98d7e03957761dd96c113be15ab620f8bdc80fe3e0cd67a025b2c8
kernel-debuginfo-common-ppc64le-4.14.0-115.8.1.el7a.ppc64le.rpm SHA-256: 1875475ea625813f2dbfb11f3d92cd317b70488bae1b88234da54d60ccbd0c31
kernel-debuginfo-common-ppc64le-4.14.0-115.8.1.el7a.ppc64le.rpm SHA-256: 1875475ea625813f2dbfb11f3d92cd317b70488bae1b88234da54d60ccbd0c31
kernel-devel-4.14.0-115.8.1.el7a.ppc64le.rpm SHA-256: 79469da1400d691ee1748c1a63251f5d1db4f48d77a8a3cda75f63c3ddae850e
kernel-doc-4.14.0-115.8.1.el7a.noarch.rpm SHA-256: 0949ef6572e3b1d7ca4a2b0ea6ad555f8f0c4a66e9d2389a7e3c71626c4b3915
kernel-headers-4.14.0-115.8.1.el7a.ppc64le.rpm SHA-256: fd8ddb1dcc753d7e4eb98ed2a8610aa1cd38eb7d40fbddbdd85d155c2dd80fc9
kernel-tools-4.14.0-115.8.1.el7a.ppc64le.rpm SHA-256: 38997909001c2fce402dd11d3940ae77413698099dae35c453315a51fc28f299
kernel-tools-debuginfo-4.14.0-115.8.1.el7a.ppc64le.rpm SHA-256: eb7cef568ffbe77f6c6478b139e31af6ad5766c3be4478da8d38989e8ab15bf4
kernel-tools-debuginfo-4.14.0-115.8.1.el7a.ppc64le.rpm SHA-256: eb7cef568ffbe77f6c6478b139e31af6ad5766c3be4478da8d38989e8ab15bf4
kernel-tools-libs-4.14.0-115.8.1.el7a.ppc64le.rpm SHA-256: f96674fcbac2316c5a81c56b31a943d78d1b08e708f747efa19e366c0c466222
kernel-tools-libs-devel-4.14.0-115.8.1.el7a.ppc64le.rpm SHA-256: c2747bd90feb1e32d8d0f012dc146aa3b99f27e62b8ae32f7d1f28d2552cec3b
perf-4.14.0-115.8.1.el7a.ppc64le.rpm SHA-256: 6e46bcdb8c1f7b4d5ed84971fce5e789ce932db9a1c40dce4783667bb5106e73
perf-debuginfo-4.14.0-115.8.1.el7a.ppc64le.rpm SHA-256: 1d6b00142a21b9a6459f20e60f3d2198152cb151a33ecaa55bbb5254b2e34dbf
perf-debuginfo-4.14.0-115.8.1.el7a.ppc64le.rpm SHA-256: 1d6b00142a21b9a6459f20e60f3d2198152cb151a33ecaa55bbb5254b2e34dbf
python-perf-4.14.0-115.8.1.el7a.ppc64le.rpm SHA-256: 5f00e2ee337b678b01677c1b6c0f22cc0f7a0e4afee0565d7ab386f1c2a23b49
python-perf-debuginfo-4.14.0-115.8.1.el7a.ppc64le.rpm SHA-256: 566bcc426e4b669e8c700574c41e9bbf1ecaaef1480571c4d7016c2f42fd0f04
python-perf-debuginfo-4.14.0-115.8.1.el7a.ppc64le.rpm SHA-256: 566bcc426e4b669e8c700574c41e9bbf1ecaaef1480571c4d7016c2f42fd0f04

Red Hat Enterprise Linux for IBM System z (Structure A) 7

SRPM
kernel-alt-4.14.0-115.8.1.el7a.src.rpm SHA-256: 62de88c02dc1c7f04dd2591d960ad10ac6001dc813b8322e5a3bccefe00fb498
s390x
kernel-4.14.0-115.8.1.el7a.s390x.rpm SHA-256: 82cbccf28c888f0a5590f564a92a29e2f36eff5c2814ba413fcd6fea85120823
kernel-abi-whitelists-4.14.0-115.8.1.el7a.noarch.rpm SHA-256: 0500d28aed690bfa4504d8c74af94d5a1e995e8efc936f0eb4479dccfcbfa59a
kernel-debug-4.14.0-115.8.1.el7a.s390x.rpm SHA-256: dcfa3ebe6310d380d13342eb297b4bae8754263326ae1b2c3522d1cd4df9291b
kernel-debug-debuginfo-4.14.0-115.8.1.el7a.s390x.rpm SHA-256: 67d12980993057a90a39cf2a5113de71863d7a85b125ab2ef73074ebd58eb04c
kernel-debug-devel-4.14.0-115.8.1.el7a.s390x.rpm SHA-256: 753d561fde207e29bef03147a5c6c9f1b306f514a51434aac48146996ee0bfdc
kernel-debuginfo-4.14.0-115.8.1.el7a.s390x.rpm SHA-256: aa991768408649a6ea4d3570496c8d916e4d8979c4eb0328090c6adaa9c2c634
kernel-debuginfo-common-s390x-4.14.0-115.8.1.el7a.s390x.rpm SHA-256: 65dc8a1ed2d7635e5a7222ad8e7bef1f5e983228ca4dfcc21bc06dd023412acd
kernel-devel-4.14.0-115.8.1.el7a.s390x.rpm SHA-256: 6538d96ade44cca0396b92f9eb205834d5e887b5d7ed7fb97bc7987c8fd4f7ba
kernel-doc-4.14.0-115.8.1.el7a.noarch.rpm SHA-256: 0949ef6572e3b1d7ca4a2b0ea6ad555f8f0c4a66e9d2389a7e3c71626c4b3915
kernel-headers-4.14.0-115.8.1.el7a.s390x.rpm SHA-256: d670a55ea511daa2453dcb857d5b2427d52733f000778781074fcc685974d0b7
kernel-kdump-4.14.0-115.8.1.el7a.s390x.rpm SHA-256: f9d7de930c219a9bd2845744c22ad9c07ed7d3f3aac555a29da72384266028a3
kernel-kdump-debuginfo-4.14.0-115.8.1.el7a.s390x.rpm SHA-256: a33545317d199eb70341e450fee65e9d6e48a659f5113190144036478e138553
kernel-kdump-devel-4.14.0-115.8.1.el7a.s390x.rpm SHA-256: cc4a002ca85ed5e70ac6936e79e208aef5338f52032c82b65ddabaa7319f599f
perf-4.14.0-115.8.1.el7a.s390x.rpm SHA-256: 1baa8bc72a5a7018832d63facb7f25d0779e2b5085ea30806ace933e1fc7b00a
perf-debuginfo-4.14.0-115.8.1.el7a.s390x.rpm SHA-256: 731dc9395247499a981b7f647683b38d6d439c112076d0f75f39708ba1e2010f
python-perf-4.14.0-115.8.1.el7a.s390x.rpm SHA-256: fefce13938a0ed2aa8a176ef736f6d5e841da9f2fb340b48803be1927fffd2a0
python-perf-debuginfo-4.14.0-115.8.1.el7a.s390x.rpm SHA-256: 2ae7075b0c7bf022e6b5ae8de7d288b8ecefe85d724aa710ea47988d1fe8d610

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility