[RHBA-2018:0042] dracut bug fix update
Severity
Important
Affected Packages
40
CVEs
1
The dracut packages contain an event-driven initial RAM file system (initramfs) generator infrastructure based on the udev device manager. The virtual file system, initramfs, is loaded together with the kernel at boot time and initializes the system, so it can read and boot from the root partition.
This update fixes the following bug:
- Microcode on AMD family 16h processors was not updated early in the boot process. With this bug fix, the issue is addressed. (BZ#1526943)
Users of dracut are advised to upgrade to these updated packages, which fix this bug.
- ID
- RHBA-2018:0042
- Severity
- important
- URL
- https://access.redhat.com/errata/RHBA-2018:0042
- Published
-
2018-01-04T00:00:00
(6 years ago) - Modified
-
2019-08-13T00:00:00
(5 years ago) - Rights
- Copyright 2019 Red Hat, Inc.
- Other Advisories
-
- ALAS-2018-939
- ALAS-2018-942
- ALAS2-2018-939
- ALAS2-2018-942
- ALAS2-2018-952
- ALAS2-2018-953
- ALAS2-2018-962
- ALPINE:CVE-2017-5715
- ASA-201801-10
- CISCO-SA-20180104-CPUSIDECHANNEL
- DSA-4187-1
- DSA-4188-1
- DSA-4201-1
- DSA-4213-1
- ELSA-2018-0007
- ELSA-2018-0008
- ELSA-2018-0012
- ELSA-2018-0013
- ELSA-2018-0023
- ELSA-2018-0024
- ELSA-2018-0029
- ELSA-2018-0030
- ELSA-2018-1196
- ELSA-2018-4004
- ELSA-2018-4020
- ELSA-2018-4022
- ELSA-2018-4285
- ELSA-2018-4289
- ELSA-2019-4585
- ELSA-2019-4668
- ELSA-2019-4710
- ELSA-2019-4785
- FEDORA-2018-0590e4af13
- FEDORA-2018-2b053454a4
- FEDORA-2018-690989736a
- FEDORA-2018-6c1be5e1c8
- FEDORA-2018-9f02e5ed7b
- FREEBSD:1CE95BC7-3278-11E8-B527-00012E582166
- FREEBSD:74DAA370-2797-11E8-95EC-A4BADB2F4699
- FREEBSD:FBE10A8A-05A1-11EA-9DFA-F8B156AC3FF9
- GLSA-201804-08
- GLSA-201810-06
- RHSA-2018:0016
- RHSA-2018:0023
- RHSA-2018:1062
- RHSA-2018:1319
- SSA:2018-016-01
- SSA:2018-037-01
- SUSE-SU-2018:0007-1
- SUSE-SU-2018:0008-1
- SUSE-SU-2018:0010-1
- SUSE-SU-2018:0011-1
- SUSE-SU-2018:0012-1
- SUSE-SU-2018:0019-1
- SUSE-SU-2018:0020-1
- SUSE-SU-2018:0031-1
- SUSE-SU-2018:0036-1
- SUSE-SU-2018:0039-1
- SUSE-SU-2018:0040-1
- SUSE-SU-2018:0041-1
- SUSE-SU-2018:0051-1
- SUSE-SU-2018:0056-1
- SUSE-SU-2018:0068-1
- SUSE-SU-2018:0069-1
- SUSE-SU-2018:0113-1
- SUSE-SU-2018:0114-1
- SUSE-SU-2018:0115-1
- SUSE-SU-2018:0131-1
- SUSE-SU-2018:0171-1
- SUSE-SU-2018:0180-1
- SUSE-SU-2018:0213-1
- SUSE-SU-2018:0219-1
- SUSE-SU-2018:0285-1
- SUSE-SU-2018:0383-1
- SUSE-SU-2018:0416-1
- SUSE-SU-2018:0437-1
- SUSE-SU-2018:0438-1
- SUSE-SU-2018:0472-1
- SUSE-SU-2018:0482-1
- SUSE-SU-2018:0525-1
- SUSE-SU-2018:0552-1
- SUSE-SU-2018:0552-2
- SUSE-SU-2018:0555-1
- SUSE-SU-2018:0601-1
- SUSE-SU-2018:0609-1
- SUSE-SU-2018:0638-1
- SUSE-SU-2018:0660-1
- SUSE-SU-2018:0678-1
- SUSE-SU-2018:0705-1
- SUSE-SU-2018:0708-1
- SUSE-SU-2018:0757-1
- SUSE-SU-2018:0762-1
- SUSE-SU-2018:0831-1
- SUSE-SU-2018:0838-1
- SUSE-SU-2018:0841-1
- SUSE-SU-2018:0861-1
- SUSE-SU-2018:0909-1
- SUSE-SU-2018:0920-1
- SUSE-SU-2018:0986-1
- SUSE-SU-2018:1077-1
- SUSE-SU-2018:1080-1
- SUSE-SU-2018:1295-1
- SUSE-SU-2018:1308-1
- SUSE-SU-2018:1363-1
- SUSE-SU-2018:1368-1
- SUSE-SU-2018:1376-1
- SUSE-SU-2018:1386-1
- SUSE-SU-2018:1465-1
- SUSE-SU-2018:1486-1
- SUSE-SU-2018:1498-1
- SUSE-SU-2018:1503-1
- SUSE-SU-2018:1567-1
- SUSE-SU-2018:1570-1
- SUSE-SU-2018:1571-1
- SUSE-SU-2018:1571-2
- SUSE-SU-2018:1603-1
- SUSE-SU-2018:1658-1
- SUSE-SU-2018:1699-1
- SUSE-SU-2018:1699-2
- SUSE-SU-2018:1759-1
- SUSE-SU-2018:1784-1
- SUSE-SU-2018:1822-1
- SUSE-SU-2018:2082-1
- SUSE-SU-2018:2092-1
- SUSE-SU-2018:2141-1
- SUSE-SU-2018:2189-1
- SUSE-SU-2018:2528-1
- SUSE-SU-2018:2631-1
- SUSE-SU-2018:2631-2
- USN-3516-1
- USN-3530-1
- USN-3531-1
- USN-3531-3
- USN-3540-1
- USN-3540-2
- USN-3541-1
- USN-3541-2
- USN-3542-1
- USN-3542-2
- USN-3549-1
- USN-3560-1
- USN-3561-1
- USN-3580-1
- USN-3581-1
- USN-3581-2
- USN-3582-1
- USN-3582-2
- USN-3594-1
- USN-3597-1
- USN-3597-2
- USN-3620-2
- USN-3690-1
- USN-3777-3
- VU:584653
- XSA-254
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 1519780 | https://bugzilla.redhat.com/1519780 | |
RHSA | RHBA-2018:0042 | https://access.redhat.com/errata/RHBA-2018:0042 | |
CVE | CVE-2017-5715 | https://access.redhat.com/security/cve/CVE-2017-5715 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/dracut?arch=x86_64&distro=redhat-7.4 | redhat | dracut | < 033-502.el7_4.1 | redhat-7.4 | x86_64 | |
Affected | pkg:rpm/redhat/dracut?arch=s390x&distro=redhat-7.4 | redhat | dracut | < 033-502.el7_4.1 | redhat-7.4 | s390x | |
Affected | pkg:rpm/redhat/dracut?arch=ppc64le&distro=redhat-7.4 | redhat | dracut | < 033-502.el7_4.1 | redhat-7.4 | ppc64le | |
Affected | pkg:rpm/redhat/dracut?arch=ppc64&distro=redhat-7.4 | redhat | dracut | < 033-502.el7_4.1 | redhat-7.4 | ppc64 | |
Affected | pkg:rpm/redhat/dracut?arch=aarch64&distro=redhat-7.4 | redhat | dracut | < 033-502.el7_4.1 | redhat-7.4 | aarch64 | |
Affected | pkg:rpm/redhat/dracut-tools?arch=x86_64&distro=redhat-7.4 | redhat | dracut-tools | < 033-502.el7_4.1 | redhat-7.4 | x86_64 | |
Affected | pkg:rpm/redhat/dracut-tools?arch=s390x&distro=redhat-7.4 | redhat | dracut-tools | < 033-502.el7_4.1 | redhat-7.4 | s390x | |
Affected | pkg:rpm/redhat/dracut-tools?arch=ppc64le&distro=redhat-7.4 | redhat | dracut-tools | < 033-502.el7_4.1 | redhat-7.4 | ppc64le | |
Affected | pkg:rpm/redhat/dracut-tools?arch=ppc64&distro=redhat-7.4 | redhat | dracut-tools | < 033-502.el7_4.1 | redhat-7.4 | ppc64 | |
Affected | pkg:rpm/redhat/dracut-tools?arch=aarch64&distro=redhat-7.4 | redhat | dracut-tools | < 033-502.el7_4.1 | redhat-7.4 | aarch64 | |
Affected | pkg:rpm/redhat/dracut-network?arch=x86_64&distro=redhat-7.4 | redhat | dracut-network | < 033-502.el7_4.1 | redhat-7.4 | x86_64 | |
Affected | pkg:rpm/redhat/dracut-network?arch=s390x&distro=redhat-7.4 | redhat | dracut-network | < 033-502.el7_4.1 | redhat-7.4 | s390x | |
Affected | pkg:rpm/redhat/dracut-network?arch=ppc64le&distro=redhat-7.4 | redhat | dracut-network | < 033-502.el7_4.1 | redhat-7.4 | ppc64le | |
Affected | pkg:rpm/redhat/dracut-network?arch=ppc64&distro=redhat-7.4 | redhat | dracut-network | < 033-502.el7_4.1 | redhat-7.4 | ppc64 | |
Affected | pkg:rpm/redhat/dracut-network?arch=aarch64&distro=redhat-7.4 | redhat | dracut-network | < 033-502.el7_4.1 | redhat-7.4 | aarch64 | |
Affected | pkg:rpm/redhat/dracut-fips?arch=x86_64&distro=redhat-7.4 | redhat | dracut-fips | < 033-502.el7_4.1 | redhat-7.4 | x86_64 | |
Affected | pkg:rpm/redhat/dracut-fips?arch=s390x&distro=redhat-7.4 | redhat | dracut-fips | < 033-502.el7_4.1 | redhat-7.4 | s390x | |
Affected | pkg:rpm/redhat/dracut-fips?arch=ppc64le&distro=redhat-7.4 | redhat | dracut-fips | < 033-502.el7_4.1 | redhat-7.4 | ppc64le | |
Affected | pkg:rpm/redhat/dracut-fips?arch=ppc64&distro=redhat-7.4 | redhat | dracut-fips | < 033-502.el7_4.1 | redhat-7.4 | ppc64 | |
Affected | pkg:rpm/redhat/dracut-fips?arch=aarch64&distro=redhat-7.4 | redhat | dracut-fips | < 033-502.el7_4.1 | redhat-7.4 | aarch64 | |
Affected | pkg:rpm/redhat/dracut-fips-aesni?arch=x86_64&distro=redhat-7.4 | redhat | dracut-fips-aesni | < 033-502.el7_4.1 | redhat-7.4 | x86_64 | |
Affected | pkg:rpm/redhat/dracut-fips-aesni?arch=s390x&distro=redhat-7.4 | redhat | dracut-fips-aesni | < 033-502.el7_4.1 | redhat-7.4 | s390x | |
Affected | pkg:rpm/redhat/dracut-fips-aesni?arch=ppc64le&distro=redhat-7.4 | redhat | dracut-fips-aesni | < 033-502.el7_4.1 | redhat-7.4 | ppc64le | |
Affected | pkg:rpm/redhat/dracut-fips-aesni?arch=ppc64&distro=redhat-7.4 | redhat | dracut-fips-aesni | < 033-502.el7_4.1 | redhat-7.4 | ppc64 | |
Affected | pkg:rpm/redhat/dracut-fips-aesni?arch=aarch64&distro=redhat-7.4 | redhat | dracut-fips-aesni | < 033-502.el7_4.1 | redhat-7.4 | aarch64 | |
Affected | pkg:rpm/redhat/dracut-config-rescue?arch=x86_64&distro=redhat-7.4 | redhat | dracut-config-rescue | < 033-502.el7_4.1 | redhat-7.4 | x86_64 | |
Affected | pkg:rpm/redhat/dracut-config-rescue?arch=s390x&distro=redhat-7.4 | redhat | dracut-config-rescue | < 033-502.el7_4.1 | redhat-7.4 | s390x | |
Affected | pkg:rpm/redhat/dracut-config-rescue?arch=ppc64le&distro=redhat-7.4 | redhat | dracut-config-rescue | < 033-502.el7_4.1 | redhat-7.4 | ppc64le | |
Affected | pkg:rpm/redhat/dracut-config-rescue?arch=ppc64&distro=redhat-7.4 | redhat | dracut-config-rescue | < 033-502.el7_4.1 | redhat-7.4 | ppc64 | |
Affected | pkg:rpm/redhat/dracut-config-rescue?arch=aarch64&distro=redhat-7.4 | redhat | dracut-config-rescue | < 033-502.el7_4.1 | redhat-7.4 | aarch64 | |
Affected | pkg:rpm/redhat/dracut-config-generic?arch=x86_64&distro=redhat-7.4 | redhat | dracut-config-generic | < 033-502.el7_4.1 | redhat-7.4 | x86_64 | |
Affected | pkg:rpm/redhat/dracut-config-generic?arch=s390x&distro=redhat-7.4 | redhat | dracut-config-generic | < 033-502.el7_4.1 | redhat-7.4 | s390x | |
Affected | pkg:rpm/redhat/dracut-config-generic?arch=ppc64le&distro=redhat-7.4 | redhat | dracut-config-generic | < 033-502.el7_4.1 | redhat-7.4 | ppc64le | |
Affected | pkg:rpm/redhat/dracut-config-generic?arch=ppc64&distro=redhat-7.4 | redhat | dracut-config-generic | < 033-502.el7_4.1 | redhat-7.4 | ppc64 | |
Affected | pkg:rpm/redhat/dracut-config-generic?arch=aarch64&distro=redhat-7.4 | redhat | dracut-config-generic | < 033-502.el7_4.1 | redhat-7.4 | aarch64 | |
Affected | pkg:rpm/redhat/dracut-caps?arch=x86_64&distro=redhat-7.4 | redhat | dracut-caps | < 033-502.el7_4.1 | redhat-7.4 | x86_64 | |
Affected | pkg:rpm/redhat/dracut-caps?arch=s390x&distro=redhat-7.4 | redhat | dracut-caps | < 033-502.el7_4.1 | redhat-7.4 | s390x | |
Affected | pkg:rpm/redhat/dracut-caps?arch=ppc64le&distro=redhat-7.4 | redhat | dracut-caps | < 033-502.el7_4.1 | redhat-7.4 | ppc64le | |
Affected | pkg:rpm/redhat/dracut-caps?arch=ppc64&distro=redhat-7.4 | redhat | dracut-caps | < 033-502.el7_4.1 | redhat-7.4 | ppc64 | |
Affected | pkg:rpm/redhat/dracut-caps?arch=aarch64&distro=redhat-7.4 | redhat | dracut-caps | < 033-502.el7_4.1 | redhat-7.4 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |