[RHSA-2018:1062] kernel security, bug fix, and enhancement update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
hw: cpu: speculative execution permission faults handling (CVE-2017-5754, Important, KVM for Power)
kernel: Buffer overflow in firewire driver via crafted incoming packets (CVE-2016-8633, Important)
kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824, Important)
Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register (CVE-2017-12154, Important)
kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166, Important)
kernel: media: use-after-free in [tuner-xc2028] media driver (CVE-2016-7913, Moderate)
kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl() (CVE-2017-7294, Moderate)
kernel: Incorrect type conversion for size during dma allocation (CVE-2017-9725, Moderate)
kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190, Moderate)
kernel: vfs: BUG in truncate_inode_pages_range() and fuse client (CVE-2017-15121, Moderate)
kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c (CVE-2017-15126, Moderate)
kernel: net: double-free and memory corruption in get_net_ns_by_id() (CVE-2017-15129, Moderate)
kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265, Moderate)
kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure (CVE-2017-17448, Moderate)
kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity (CVE-2017-17449, Moderate)
kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow (CVE-2017-17558, Moderate)
kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c (CVE-2017-18017, Moderate)
kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service (CVE-2017-18203, Moderate)
kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ (CVE-2017-1000252, Moderate)
Kernel: KVM: DoS via write flood to I/O port 0x80 (CVE-2017-1000407, Moderate)
kernel: Stack information leak in the EFS element (CVE-2017-1000410, Moderate)
kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass (CVE-2018-5750, Moderate)
kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004, Moderate)
- kernel: multiple Low security impact security issues (CVE-2016-3672, CVE-2017-14140, CVE-2017-15116, CVE-2017-15127, CVE-2018-6927, Low)
Red Hat would like to thank Eyal Itkin for reporting CVE-2016-8633; Google Project Zero for reporting CVE-2017-5754; Mohamed Ghannam for reporting CVE-2017-8824; Jim Mattson (Google.com) for reporting CVE-2017-12154; Vitaly Mayatskih for reporting CVE-2017-12190; Andrea Arcangeli (Engineering) for reporting CVE-2017-15126; Kirill Tkhai for reporting CVE-2017-15129; Jan H. Schönherr (Amazon) for reporting CVE-2017-1000252; and Armis Labs for reporting CVE-2017-1000410. The CVE-2017-15121 issue was discovered by Miklos Szeredi (Red Hat) and the CVE-2017-15116 issue was discovered by ChunYu Wang (Red Hat).
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.5 Release Notes linked from the References section.
- ID
- RHSA-2018:1062
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2018:1062
- Published
-
2018-04-10T00:00:00
(6 years ago) - Modified
-
2018-04-10T00:00:00
(6 years ago) - Rights
- Copyright 2018 Red Hat, Inc.
- Other Advisories
-
- ALAS-2016-694
- ALAS-2017-914
- ALAS-2017-925
- ALAS-2017-937
- ALAS-2018-939
- ALAS-2018-942
- ALAS-2018-944
- ALAS-2018-956
- ALAS-2018-993
- ALAS2-2018-939
- ALAS2-2018-942
- ALAS2-2018-952
- ALAS2-2018-953
- ALAS2-2018-956
- ALAS2-2018-962
- ALPINE:CVE-2017-5715
- ALPINE:CVE-2017-5754
- ASA-201801-1
- ASA-201801-10
- ASA-201801-2
- ASA-201801-3
- ASA-201801-4
- ASA-201801-6
- CISCO-SA-20180104-CPUSIDECHANNEL
- DSA-3607-1
- DSA-3981-1
- DSA-4073-1
- DSA-4078-1
- DSA-4082-1
- DSA-4120-1
- DSA-4187-1
- DSA-4188-1
- DSA-4201-1
- DSA-4213-1
- ELSA-2017-3533
- ELSA-2017-3534
- ELSA-2017-3535
- ELSA-2017-3635
- ELSA-2017-3651
- ELSA-2017-3657
- ELSA-2017-3658
- ELSA-2018-0007
- ELSA-2018-0008
- ELSA-2018-0012
- ELSA-2018-0013
- ELSA-2018-0023
- ELSA-2018-0024
- ELSA-2018-0029
- ELSA-2018-0030
- ELSA-2018-0292
- ELSA-2018-1062
- ELSA-2018-1196
- ELSA-2018-1319
- ELSA-2018-1854
- ELSA-2018-2390
- ELSA-2018-4004
- ELSA-2018-4006
- ELSA-2018-4017
- ELSA-2018-4020
- ELSA-2018-4022
- ELSA-2018-4025
- ELSA-2018-4040
- ELSA-2018-4041
- ELSA-2018-4108
- ELSA-2018-4109
- ELSA-2018-4110
- ELSA-2018-4114
- ELSA-2018-4134
- ELSA-2018-4161
- ELSA-2018-4164
- ELSA-2018-4193
- ELSA-2018-4268
- ELSA-2018-4285
- ELSA-2018-4289
- ELSA-2018-4307
- ELSA-2019-4315
- ELSA-2019-4316
- ELSA-2019-4317
- ELSA-2019-4585
- ELSA-2019-4596
- ELSA-2019-4619
- ELSA-2019-4644
- ELSA-2019-4668
- ELSA-2019-4710
- ELSA-2019-4742
- ELSA-2019-4785
- ELSA-2020-5912
- ELSA-2022-9852
- ELSA-2022-9969
- FEDORA-2016-373c063e79
- FEDORA-2016-76706f51a7
- FEDORA-2016-8e858f96b8
- FEDORA-2017-129969aa8a
- FEDORA-2017-7369ea045c
- FEDORA-2017-aa9927961f
- FEDORA-2017-ba6b6e71f7
- FEDORA-2017-c110ac0eb1
- FEDORA-2017-cafcdbdde5
- FEDORA-2017-e07d7fb18e
- FEDORA-2018-0590e4af13
- FEDORA-2018-1c80fea1cd
- FEDORA-2018-1e033dc308
- FEDORA-2018-2a0f8b2c9d
- FEDORA-2018-2b053454a4
- FEDORA-2018-2ee3411cb8
- FEDORA-2018-2f6df9abfb
- FEDORA-2018-49bda79bd5
- FEDORA-2018-4ca01704a2
- FEDORA-2018-6367a17aa3
- FEDORA-2018-690989736a
- FEDORA-2018-6c1be5e1c8
- FEDORA-2018-79d7c3d2df
- FEDORA-2018-8484550fff
- FEDORA-2018-884a105c04
- FEDORA-2018-93c2e74446
- FEDORA-2018-94315e9a6b
- FEDORA-2018-9d0e4e40b5
- FEDORA-2018-9f02e5ed7b
- FEDORA-2018-b57db4753c
- FEDORA-2018-b68776e5b0
- FEDORA-2018-b997780dca
- FEDORA-2018-c0a1284064
- FEDORA-2018-c449dc1c9c
- FEDORA-2018-d09a73ce72
- FEDORA-2018-d77cc41f35
- FEDORA-2018-d82b617d6c
- FEDORA-2018-e71875c4aa
- FEDORA-2018-e8f793bbfc
- FREEBSD:1CE95BC7-3278-11E8-B527-00012E582166
- FREEBSD:74DAA370-2797-11E8-95EC-A4BADB2F4699
- FREEBSD:FBE10A8A-05A1-11EA-9DFA-F8B156AC3FF9
- GLSA-201804-08
- GLSA-201810-06
- RHBA-2018:0042
- RHSA-2018:0016
- RHSA-2018:0023
- RHSA-2018:0412
- RHSA-2018:0676
- RHSA-2018:1319
- RHSA-2018:1854
- RHSA-2018:2390
- SSA:2018-016-01
- SSA:2018-037-01
- SSA:2018-142-01
- SUSE-SU-2016:1690-1
- SUSE-SU-2016:1937-1
- SUSE-SU-2016:2105-1
- SUSE-SU-2017:0181-1
- SUSE-SU-2017:0333-1
- SUSE-SU-2017:0407-1
- SUSE-SU-2017:0437-1
- SUSE-SU-2017:0464-1
- SUSE-SU-2017:0471-1
- SUSE-SU-2017:0494-1
- SUSE-SU-2017:1059-1
- SUSE-SU-2017:1060-1
- SUSE-SU-2017:1064-1
- SUSE-SU-2017:1102-1
- SUSE-SU-2017:1183-1
- SUSE-SU-2017:1247-1
- SUSE-SU-2017:1277-1
- SUSE-SU-2017:1279-1
- SUSE-SU-2017:1280-1
- SUSE-SU-2017:1283-1
- SUSE-SU-2017:1284-1
- SUSE-SU-2017:1288-1
- SUSE-SU-2017:1289-1
- SUSE-SU-2017:1290-1
- SUSE-SU-2017:1293-1
- SUSE-SU-2017:1294-1
- SUSE-SU-2017:1295-1
- SUSE-SU-2017:1297-1
- SUSE-SU-2017:1301-1
- SUSE-SU-2017:1303-1
- SUSE-SU-2017:1308-1
- SUSE-SU-2017:1360-1
- SUSE-SU-2017:1990-1
- SUSE-SU-2017:2342-1
- SUSE-SU-2017:2525-1
- SUSE-SU-2017:2694-1
- SUSE-SU-2017:2769-1
- SUSE-SU-2017:2770-1
- SUSE-SU-2017:2771-1
- SUSE-SU-2017:2772-1
- SUSE-SU-2017:2773-1
- SUSE-SU-2017:2774-1
- SUSE-SU-2017:2775-1
- SUSE-SU-2017:2776-1
- SUSE-SU-2017:2777-1
- SUSE-SU-2017:2778-1
- SUSE-SU-2017:2779-1
- SUSE-SU-2017:2780-1
- SUSE-SU-2017:2781-1
- SUSE-SU-2017:2782-1
- SUSE-SU-2017:2783-1
- SUSE-SU-2017:2784-1
- SUSE-SU-2017:2785-1
- SUSE-SU-2017:2786-1
- SUSE-SU-2017:2787-1
- SUSE-SU-2017:2788-1
- SUSE-SU-2017:2790-1
- SUSE-SU-2017:2791-1
- SUSE-SU-2017:2792-1
- SUSE-SU-2017:2793-1
- SUSE-SU-2017:2796-1
- SUSE-SU-2017:2797-1
- SUSE-SU-2017:2801-1
- SUSE-SU-2017:2847-1
- SUSE-SU-2017:2869-1
- SUSE-SU-2017:2908-1
- SUSE-SU-2017:2920-1
- SUSE-SU-2017:2956-1
- SUSE-SU-2017:3165-1
- SUSE-SU-2017:3265-1
- SUSE-SU-2017:3267-1
- SUSE-SU-2017:3398-1
- SUSE-SU-2017:3410-1
- SUSE-SU-2018:0007-1
- SUSE-SU-2018:0008-1
- SUSE-SU-2018:0010-1
- SUSE-SU-2018:0011-1
- SUSE-SU-2018:0012-1
- SUSE-SU-2018:0019-1
- SUSE-SU-2018:0020-1
- SUSE-SU-2018:0031-1
- SUSE-SU-2018:0036-1
- SUSE-SU-2018:0039-1
- SUSE-SU-2018:0040-1
- SUSE-SU-2018:0041-1
- SUSE-SU-2018:0051-1
- SUSE-SU-2018:0056-1
- SUSE-SU-2018:0068-1
- SUSE-SU-2018:0069-1
- SUSE-SU-2018:0113-1
- SUSE-SU-2018:0114-1
- SUSE-SU-2018:0115-1
- SUSE-SU-2018:0131-1
- SUSE-SU-2018:0171-1
- SUSE-SU-2018:0180-1
- SUSE-SU-2018:0213-1
- SUSE-SU-2018:0219-1
- SUSE-SU-2018:0285-1
- SUSE-SU-2018:0383-1
- SUSE-SU-2018:0416-1
- SUSE-SU-2018:0437-1
- SUSE-SU-2018:0438-1
- SUSE-SU-2018:0472-1
- SUSE-SU-2018:0482-1
- SUSE-SU-2018:0525-1
- SUSE-SU-2018:0552-1
- SUSE-SU-2018:0552-2
- SUSE-SU-2018:0555-1
- SUSE-SU-2018:0601-1
- SUSE-SU-2018:0609-1
- SUSE-SU-2018:0638-1
- SUSE-SU-2018:0660-1
- SUSE-SU-2018:0678-1
- SUSE-SU-2018:0705-1
- SUSE-SU-2018:0708-1
- SUSE-SU-2018:0757-1
- SUSE-SU-2018:0762-1
- SUSE-SU-2018:0785-1
- SUSE-SU-2018:0786-1
- SUSE-SU-2018:0831-1
- SUSE-SU-2018:0834-1
- SUSE-SU-2018:0838-1
- SUSE-SU-2018:0841-1
- SUSE-SU-2018:0848-1
- SUSE-SU-2018:0861-1
- SUSE-SU-2018:0909-1
- SUSE-SU-2018:0920-1
- SUSE-SU-2018:0986-1
- SUSE-SU-2018:0988-1
- SUSE-SU-2018:0989-1
- SUSE-SU-2018:0990-1
- SUSE-SU-2018:0992-1
- SUSE-SU-2018:0993-1
- SUSE-SU-2018:0994-1
- SUSE-SU-2018:0995-1
- SUSE-SU-2018:0996-1
- SUSE-SU-2018:0997-1
- SUSE-SU-2018:0998-1
- SUSE-SU-2018:0999-1
- SUSE-SU-2018:1000-1
- SUSE-SU-2018:1001-1
- SUSE-SU-2018:1002-1
- SUSE-SU-2018:1003-1
- SUSE-SU-2018:1004-1
- SUSE-SU-2018:1005-1
- SUSE-SU-2018:1006-1
- SUSE-SU-2018:1007-1
- SUSE-SU-2018:1008-1
- SUSE-SU-2018:1009-1
- SUSE-SU-2018:1010-1
- SUSE-SU-2018:1011-1
- SUSE-SU-2018:1012-1
- SUSE-SU-2018:1013-1
- SUSE-SU-2018:1014-1
- SUSE-SU-2018:1015-1
- SUSE-SU-2018:1016-1
- SUSE-SU-2018:1018-1
- SUSE-SU-2018:1019-1
- SUSE-SU-2018:1020-1
- SUSE-SU-2018:1021-1
- SUSE-SU-2018:1022-1
- SUSE-SU-2018:1023-1
- SUSE-SU-2018:1024-1
- SUSE-SU-2018:1025-1
- SUSE-SU-2018:1026-1
- SUSE-SU-2018:1027-1
- SUSE-SU-2018:1028-1
- SUSE-SU-2018:1029-1
- SUSE-SU-2018:1030-1
- SUSE-SU-2018:1031-1
- SUSE-SU-2018:1032-1
- SUSE-SU-2018:1033-1
- SUSE-SU-2018:1034-1
- SUSE-SU-2018:1077-1
- SUSE-SU-2018:1080-1
- SUSE-SU-2018:1172-1
- SUSE-SU-2018:1220-1
- SUSE-SU-2018:1221-1
- SUSE-SU-2018:1295-1
- SUSE-SU-2018:1308-1
- SUSE-SU-2018:1309-1
- SUSE-SU-2018:1363-1
- SUSE-SU-2018:1368-1
- SUSE-SU-2018:1376-1
- SUSE-SU-2018:1386-1
- SUSE-SU-2018:1465-1
- SUSE-SU-2018:1486-1
- SUSE-SU-2018:1498-1
- SUSE-SU-2018:1503-1
- SUSE-SU-2018:1505-1
- SUSE-SU-2018:1506-1
- SUSE-SU-2018:1509-1
- SUSE-SU-2018:1510-1
- SUSE-SU-2018:1511-1
- SUSE-SU-2018:1512-1
- SUSE-SU-2018:1514-1
- SUSE-SU-2018:1516-1
- SUSE-SU-2018:1517-1
- SUSE-SU-2018:1518-1
- SUSE-SU-2018:1519-1
- SUSE-SU-2018:1520-1
- SUSE-SU-2018:1521-1
- SUSE-SU-2018:1522-1
- SUSE-SU-2018:1524-1
- SUSE-SU-2018:1526-1
- SUSE-SU-2018:1528-1
- SUSE-SU-2018:1529-1
- SUSE-SU-2018:1530-1
- SUSE-SU-2018:1531-1
- SUSE-SU-2018:1532-1
- SUSE-SU-2018:1533-1
- SUSE-SU-2018:1534-1
- SUSE-SU-2018:1535-1
- SUSE-SU-2018:1536-1
- SUSE-SU-2018:1537-1
- SUSE-SU-2018:1538-1
- SUSE-SU-2018:1540-1
- SUSE-SU-2018:1541-1
- SUSE-SU-2018:1543-1
- SUSE-SU-2018:1545-1
- SUSE-SU-2018:1546-1
- SUSE-SU-2018:1548-1
- SUSE-SU-2018:1549-1
- SUSE-SU-2018:1567-1
- SUSE-SU-2018:1570-1
- SUSE-SU-2018:1571-1
- SUSE-SU-2018:1571-2
- SUSE-SU-2018:1603-1
- SUSE-SU-2018:1637-1
- SUSE-SU-2018:1639-1
- SUSE-SU-2018:1640-1
- SUSE-SU-2018:1641-1
- SUSE-SU-2018:1642-1
- SUSE-SU-2018:1643-1
- SUSE-SU-2018:1644-1
- SUSE-SU-2018:1645-1
- SUSE-SU-2018:1648-1
- SUSE-SU-2018:1658-1
- SUSE-SU-2018:1699-1
- SUSE-SU-2018:1699-2
- SUSE-SU-2018:1759-1
- SUSE-SU-2018:1761-1
- SUSE-SU-2018:1762-1
- SUSE-SU-2018:1784-1
- SUSE-SU-2018:1816-1
- SUSE-SU-2018:1822-1
- SUSE-SU-2018:1855-1
- SUSE-SU-2018:1855-2
- SUSE-SU-2018:2082-1
- SUSE-SU-2018:2092-1
- SUSE-SU-2018:2141-1
- SUSE-SU-2018:2189-1
- SUSE-SU-2018:2332-1
- SUSE-SU-2018:2366-1
- SUSE-SU-2018:2528-1
- SUSE-SU-2018:2631-1
- SUSE-SU-2018:2631-2
- SUSE-SU-2018:2637-1
- SUSE-SU-2018:3230-1
- SUSE-SU-2018:3746-1
- SUSE-SU-2018:3869-1
- SUSE-SU-2019:1289-1
- SUSE-SU-2023:0634-1
- USN-2965-1
- USN-2965-2
- USN-2965-3
- USN-2965-4
- USN-2989-1
- USN-2996-1
- USN-2997-1
- USN-2998-1
- USN-3000-1
- USN-3001-1
- USN-3002-1
- USN-3003-1
- USN-3004-1
- USN-3161-1
- USN-3161-2
- USN-3161-3
- USN-3161-4
- USN-3162-1
- USN-3162-2
- USN-3291-1
- USN-3291-2
- USN-3291-3
- USN-3293-1
- USN-3312-1
- USN-3312-2
- USN-3342-1
- USN-3342-2
- USN-3343-1
- USN-3343-2
- USN-3444-1
- USN-3444-2
- USN-3445-1
- USN-3445-2
- USN-3468-1
- USN-3468-2
- USN-3468-3
- USN-3469-1
- USN-3469-2
- USN-3485-1
- USN-3485-2
- USN-3485-3
- USN-3487-1
- USN-3516-1
- USN-3522-1
- USN-3522-2
- USN-3523-1
- USN-3523-2
- USN-3524-1
- USN-3524-2
- USN-3525-1
- USN-3530-1
- USN-3531-1
- USN-3531-3
- USN-3540-1
- USN-3540-2
- USN-3541-1
- USN-3541-2
- USN-3542-1
- USN-3542-2
- USN-3549-1
- USN-3560-1
- USN-3561-1
- USN-3580-1
- USN-3581-1
- USN-3581-2
- USN-3581-3
- USN-3582-1
- USN-3582-2
- USN-3583-1
- USN-3583-2
- USN-3594-1
- USN-3597-1
- USN-3597-2
- USN-3617-1
- USN-3617-2
- USN-3617-3
- USN-3619-1
- USN-3619-2
- USN-3620-1
- USN-3620-2
- USN-3631-1
- USN-3631-2
- USN-3632-1
- USN-3653-1
- USN-3653-2
- USN-3655-1
- USN-3655-2
- USN-3657-1
- USN-3690-1
- USN-3697-1
- USN-3697-2
- USN-3698-1
- USN-3698-2
- USN-3754-1
- USN-3777-3
- USN-3798-1
- USN-3798-2
- USN-3880-1
- USN-3880-2
- USN-3933-1
- USN-3933-2
- VU:584653
- XSA-254
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/python-perf?arch=x86_64&distro=redhat-7 | redhat | python-perf | < 3.10.0-862.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/python-perf?arch=s390x&distro=redhat-7 | redhat | python-perf | < 3.10.0-862.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/python-perf?arch=ppc64le&distro=redhat-7 | redhat | python-perf | < 3.10.0-862.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/python-perf?arch=ppc64&distro=redhat-7 | redhat | python-perf | < 3.10.0-862.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/perf?arch=x86_64&distro=redhat-7 | redhat | perf | < 3.10.0-862.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/perf?arch=s390x&distro=redhat-7 | redhat | perf | < 3.10.0-862.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/perf?arch=ppc64le&distro=redhat-7 | redhat | perf | < 3.10.0-862.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/perf?arch=ppc64&distro=redhat-7 | redhat | perf | < 3.10.0-862.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 | redhat | kernel | < 3.10.0-862.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=s390x&distro=redhat-7 | redhat | kernel | < 3.10.0-862.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 | redhat | kernel | < 3.10.0-862.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64&distro=redhat-7 | redhat | kernel | < 3.10.0-862.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-tools?arch=x86_64&distro=redhat-7 | redhat | kernel-tools | < 3.10.0-862.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools?arch=ppc64le&distro=redhat-7 | redhat | kernel-tools | < 3.10.0-862.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools?arch=ppc64&distro=redhat-7 | redhat | kernel-tools | < 3.10.0-862.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=x86_64&distro=redhat-7 | redhat | kernel-tools-libs | < 3.10.0-862.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=ppc64le&distro=redhat-7 | redhat | kernel-tools-libs | < 3.10.0-862.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=ppc64&distro=redhat-7 | redhat | kernel-tools-libs | < 3.10.0-862.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-tools-libs-devel | < 3.10.0-862.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=ppc64le&distro=redhat-7 | redhat | kernel-tools-libs-devel | < 3.10.0-862.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=ppc64&distro=redhat-7 | redhat | kernel-tools-libs-devel | < 3.10.0-862.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-kdump?arch=s390x&distro=redhat-7 | redhat | kernel-kdump | < 3.10.0-862.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel-kdump-devel?arch=s390x&distro=redhat-7 | redhat | kernel-kdump-devel | < 3.10.0-862.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel-headers?arch=x86_64&distro=redhat-7 | redhat | kernel-headers | < 3.10.0-862.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-headers?arch=s390x&distro=redhat-7 | redhat | kernel-headers | < 3.10.0-862.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel-headers?arch=ppc64le&distro=redhat-7 | redhat | kernel-headers | < 3.10.0-862.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-headers?arch=ppc64&distro=redhat-7 | redhat | kernel-headers | < 3.10.0-862.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-doc?distro=redhat-7 | redhat | kernel-doc | < 3.10.0-862.el7 | redhat-7 | ||
Affected | pkg:rpm/redhat/kernel-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-devel | < 3.10.0-862.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-devel?arch=s390x&distro=redhat-7 | redhat | kernel-devel | < 3.10.0-862.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel-devel?arch=ppc64le&distro=redhat-7 | redhat | kernel-devel | < 3.10.0-862.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-devel?arch=ppc64&distro=redhat-7 | redhat | kernel-devel | < 3.10.0-862.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-debug?arch=x86_64&distro=redhat-7 | redhat | kernel-debug | < 3.10.0-862.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug?arch=s390x&distro=redhat-7 | redhat | kernel-debug | < 3.10.0-862.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug?arch=ppc64le&distro=redhat-7 | redhat | kernel-debug | < 3.10.0-862.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug?arch=ppc64&distro=redhat-7 | redhat | kernel-debug | < 3.10.0-862.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-debug-devel | < 3.10.0-862.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=s390x&distro=redhat-7 | redhat | kernel-debug-devel | < 3.10.0-862.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=ppc64le&distro=redhat-7 | redhat | kernel-debug-devel | < 3.10.0-862.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=ppc64&distro=redhat-7 | redhat | kernel-debug-devel | < 3.10.0-862.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-bootwrapper?arch=ppc64le&distro=redhat-7 | redhat | kernel-bootwrapper | < 3.10.0-862.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-bootwrapper?arch=ppc64&distro=redhat-7 | redhat | kernel-bootwrapper | < 3.10.0-862.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-abi-whitelists?distro=redhat-7 | redhat | kernel-abi-whitelists | < 3.10.0-862.el7 | redhat-7 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |