[RHSA-2018:3083] kernel security, bug fix, and enhancement update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)
kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c (CVE-2017-18344)
kernel: Integer overflow in udl_fb_mmap() can allow attackers to execute code in kernel space (CVE-2018-8781)
kernel: MIDI driver race condition leads to a double-free (CVE-2018-10902)
kernel: Missing check in inode_init_owner() does not clear SGID bit on non-directories for non-members (CVE-2018-13405)
kernel: AIO write triggers integer overflow in some protocols (CVE-2015-8830)
kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation (CVE-2017-0861)
kernel: Handling of might_cancel queueing is not properly pretected against race (CVE-2017-10661)
kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial of service (CVE-2017-17805)
kernel: Inifinite loop vulnerability in madvise_willneed() function allows local denial of service (CVE-2017-18208)
kernel: fuse-backed file mmap-ed onto process cmdline arguments causes denial of service (CVE-2018-1120)
kernel: a null pointer dereference in dccp_write_xmit() leads to a system crash (CVE-2018-1130)
kernel: drivers/block/loop.c mishandles lo_release serialization allowing denial of service (CVE-2018-5344)
kernel: Missing length check of payload in _sctp_make_chunk() function allows denial of service (CVE-2018-5803)
kernel: buffer overflow in drivers/net/wireless/ath/wil6210/wmi.c:wmi_set_ie() may lead to memory corruption (CVE-2018-5848)
kernel: out-of-bound write in ext4_init_block_bitmap function with a crafted ext4 image (CVE-2018-10878)
kernel: Improper validation in bnx2x network card driver can allow for denial of service attacks via crafted packet (CVE-2018-1000026)
kernel: Information leak when handling NM entries containing NUL (CVE-2016-4913)
kernel: Mishandling mutex within libsas allowing local Denial of Service (CVE-2017-18232)
kernel: NULL pointer dereference in ext4_process_freed_data() when mounting crafted ext4 image (CVE-2018-1092)
kernel: NULL pointer dereference in ext4_xattr_inode_hash() causes crash with crafted ext4 image (CVE-2018-1094)
kernel: vhost: Information disclosure in vhost/vhost.c:vhost_new_msg() (CVE-2018-1118)
kernel: Denial of service in resv_map_release function in mm/hugetlb.c (CVE-2018-7740)
kernel: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c (CVE-2018-7757)
kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service (CVE-2018-10322)
kernel: use-after-free detected in ext4_xattr_set_entry with a crafted file (CVE-2018-10879)
kernel: out-of-bound access in ext4_get_group_info() when mounting and operating a crafted ext4 image (CVE-2018-10881)
kernel: stack-out-of-bounds write in jbd2_journal_dirty_metadata function (CVE-2018-10883)
kernel: incorrect memory bounds check in drivers/cdrom/cdrom.c (CVE-2018-10940)
Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5391; Trend Micro Zero Day Initiative for reporting CVE-2018-10902; Qualys Research Labs for reporting CVE-2018-1120; Evgenii Shatokhin (Virtuozzo Team) for reporting CVE-2018-1130; and Wen Xu for reporting CVE-2018-1092 and CVE-2018-1094.
- ID
- RHSA-2018:3083
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2018:3083
- Published
-
2018-10-30T00:00:00
(5 years ago) - Modified
-
2018-10-30T00:00:00
(5 years ago) - Rights
- Copyright 2018 Red Hat, Inc.
- Other Advisories
-
- ALAS-2016-704
- ALAS-2017-937
- ALAS-2018-1038
- ALAS-2018-1049
- ALAS-2018-1058
- ALAS-2018-956
- ALAS-2018-993
- ALAS2-2018-1038
- ALAS2-2018-1050
- ALAS2-2018-1058
- ALAS2-2018-956
- ALAS2-2020-1480
- ALPINE:CVE-2018-7757
- ASA-201801-1
- ASA-201801-2
- ASA-201801-3
- ASA-201801-4
- CISCO-SA-20180824-LINUX-IP-FRAGMENT
- DSA-3607-1
- DSA-4073-1
- DSA-4082-1
- DSA-4187-1
- DSA-4188-1
- DSA-4266-1
- DSA-4272-1
- DSA-4308-1
- ELSA-2016-3596
- ELSA-2017-3636
- ELSA-2017-3637
- ELSA-2018-1854
- ELSA-2018-2390
- ELSA-2018-2846
- ELSA-2018-3083
- ELSA-2018-4025
- ELSA-2018-4161
- ELSA-2018-4164
- ELSA-2018-4172
- ELSA-2018-4195
- ELSA-2018-4196
- ELSA-2018-4211
- ELSA-2018-4214
- ELSA-2018-4265
- ELSA-2018-4268
- ELSA-2018-4269
- ELSA-2018-4299
- ELSA-2018-4300
- ELSA-2018-4301
- ELSA-2018-4304
- ELSA-2019-0415
- ELSA-2019-0717
- ELSA-2019-2473
- ELSA-2019-4315
- ELSA-2019-4316
- ELSA-2019-4317
- ELSA-2019-4509
- ELSA-2019-4510
- ELSA-2019-4532
- ELSA-2019-4533
- ELSA-2019-4570
- ELSA-2019-4575
- ELSA-2019-4576
- ELSA-2019-4594
- ELSA-2019-4596
- ELSA-2019-4600
- ELSA-2019-4642
- ELSA-2019-4710
- ELSA-2021-9534
- FEDORA-2016-06f1572324
- FEDORA-2016-2363b37a98
- FEDORA-2016-f8739a80b0
- FEDORA-2018-03a6606cb5
- FEDORA-2018-0edb45d9db
- FEDORA-2018-1621b2204a
- FEDORA-2018-1c80fea1cd
- FEDORA-2018-1e033dc308
- FEDORA-2018-262eb7c289
- FEDORA-2018-2a0f8b2c9d
- FEDORA-2018-2bce10900e
- FEDORA-2018-2c6bd93875
- FEDORA-2018-2ee3411cb8
- FEDORA-2018-2f6df9abfb
- FEDORA-2018-3857a8b41a
- FEDORA-2018-49bda79bd5
- FEDORA-2018-4ca01704a2
- FEDORA-2018-50075276e8
- FEDORA-2018-537c8312fc
- FEDORA-2018-59e4747e0f
- FEDORA-2018-6367a17aa3
- FEDORA-2018-6e8c330d50
- FEDORA-2018-79d7c3d2df
- FEDORA-2018-7a62047e30
- FEDORA-2018-8422d94975
- FEDORA-2018-8484550fff
- FEDORA-2018-884a105c04
- FEDORA-2018-8ce90c8b24
- FEDORA-2018-8dc60a4feb
- FEDORA-2018-93af520878
- FEDORA-2018-93c2e74446
- FEDORA-2018-94315e9a6b
- FEDORA-2018-9d0e4e40b5
- FEDORA-2018-9f4381d8c4
- FEDORA-2018-a0914af224
- FEDORA-2018-ac3b4c7605
- FEDORA-2018-b57db4753c
- FEDORA-2018-b68776e5b0
- FEDORA-2018-b997780dca
- FEDORA-2018-ba39fc0e07
- FEDORA-2018-bb7aab12cb
- FEDORA-2018-c0a1284064
- FEDORA-2018-c449dc1c9c
- FEDORA-2018-ca0e10fc6e
- FEDORA-2018-cc812838fb
- FEDORA-2018-d77cc41f35
- FEDORA-2018-d82a45d9ab
- FEDORA-2018-d92fde52d7
- FEDORA-2018-db0d3e157e
- FEDORA-2018-ddbaca855e
- FEDORA-2018-e378863e47
- FEDORA-2018-e71875c4aa
- FEDORA-2018-e820fccd83
- FEDORA-2018-e8f793bbfc
- FEDORA-2018-f1b818a5c9
- FEDORA-2018-f8cba144ae
- FEDORA-2019-16de0047d4
- FEDORA-2019-196ab64d65
- FEDORA-2019-1b986880ea
- FEDORA-2019-20a89ca9af
- FEDORA-2019-337484d88b
- FEDORA-2019-3da64f3e61
- FEDORA-2019-4002b91800
- FEDORA-2019-509c133845
- FEDORA-2019-65c6d11eba
- FEDORA-2019-7d3500d712
- FEDORA-2019-a6cd583a8d
- FEDORA-2019-c36afa818c
- FEDORA-2019-ce2933b003
- FEDORA-2022-3a60c34473
- FEDORA-2022-5d0676b098
- GLSA-201805-14
- openSUSE-SU-2021:1477-1
- openSUSE-SU-2021:3876-1
- RHSA-2018:1854
- RHSA-2018:2390
- RHSA-2018:2846
- RHSA-2018:3096
- RHSA-2019:0415
- RHSA-2019:0717
- RHSA-2019:2473
- SSA:2018-142-01
- SSA:2019-030-01
- SSA:2019-169-01
- SUSE-SU-2016:1672-1
- SUSE-SU-2016:1985-1
- SUSE-SU-2016:2245-1
- SUSE-SU-2017:0333-1
- SUSE-SU-2017:2525-1
- SUSE-SU-2017:2694-1
- SUSE-SU-2017:2908-1
- SUSE-SU-2017:2920-1
- SUSE-SU-2017:3265-1
- SUSE-SU-2017:3286-1
- SUSE-SU-2017:3287-1
- SUSE-SU-2017:3288-1
- SUSE-SU-2017:3289-1
- SUSE-SU-2017:3290-1
- SUSE-SU-2017:3291-1
- SUSE-SU-2017:3292-1
- SUSE-SU-2017:3293-1
- SUSE-SU-2017:3296-1
- SUSE-SU-2017:3299-1
- SUSE-SU-2017:3301-1
- SUSE-SU-2017:3302-1
- SUSE-SU-2017:3303-1
- SUSE-SU-2017:3304-1
- SUSE-SU-2017:3305-1
- SUSE-SU-2017:3306-1
- SUSE-SU-2017:3308-1
- SUSE-SU-2017:3309-1
- SUSE-SU-2017:3310-1
- SUSE-SU-2017:3312-1
- SUSE-SU-2017:3313-1
- SUSE-SU-2017:3316-1
- SUSE-SU-2017:3318-1
- SUSE-SU-2017:3320-1
- SUSE-SU-2017:3321-1
- SUSE-SU-2017:3322-1
- SUSE-SU-2017:3323-1
- SUSE-SU-2017:3332-1
- SUSE-SU-2017:3336-1
- SUSE-SU-2017:3337-1
- SUSE-SU-2017:3340-1
- SUSE-SU-2018:0010-1
- SUSE-SU-2018:0011-1
- SUSE-SU-2018:0012-1
- SUSE-SU-2018:0040-1
- SUSE-SU-2018:0180-1
- SUSE-SU-2018:0213-1
- SUSE-SU-2018:0437-1
- SUSE-SU-2018:0525-1
- SUSE-SU-2018:0785-1
- SUSE-SU-2018:0786-1
- SUSE-SU-2018:0834-1
- SUSE-SU-2018:0848-1
- SUSE-SU-2018:0986-1
- SUSE-SU-2018:1048-1
- SUSE-SU-2018:1080-1
- SUSE-SU-2018:1172-1
- SUSE-SU-2018:1173-1
- SUSE-SU-2018:1173-2
- SUSE-SU-2018:1217-1
- SUSE-SU-2018:1220-1
- SUSE-SU-2018:1221-1
- SUSE-SU-2018:1222-1
- SUSE-SU-2018:1224-1
- SUSE-SU-2018:1226-1
- SUSE-SU-2018:1227-1
- SUSE-SU-2018:1228-1
- SUSE-SU-2018:1229-1
- SUSE-SU-2018:1230-1
- SUSE-SU-2018:1231-1
- SUSE-SU-2018:1232-1
- SUSE-SU-2018:1233-1
- SUSE-SU-2018:1234-1
- SUSE-SU-2018:1235-1
- SUSE-SU-2018:1236-1
- SUSE-SU-2018:1237-1
- SUSE-SU-2018:1240-1
- SUSE-SU-2018:1241-1
- SUSE-SU-2018:1242-1
- SUSE-SU-2018:1243-1
- SUSE-SU-2018:1244-1
- SUSE-SU-2018:1245-1
- SUSE-SU-2018:1247-1
- SUSE-SU-2018:1248-1
- SUSE-SU-2018:1250-1
- SUSE-SU-2018:1251-1
- SUSE-SU-2018:1252-1
- SUSE-SU-2018:1253-1
- SUSE-SU-2018:1254-1
- SUSE-SU-2018:1255-1
- SUSE-SU-2018:1256-1
- SUSE-SU-2018:1257-1
- SUSE-SU-2018:1259-1
- SUSE-SU-2018:1260-1
- SUSE-SU-2018:1261-1
- SUSE-SU-2018:1262-1
- SUSE-SU-2018:1263-1
- SUSE-SU-2018:1264-1
- SUSE-SU-2018:1266-1
- SUSE-SU-2018:1267-1
- SUSE-SU-2018:1268-1
- SUSE-SU-2018:1269-1
- SUSE-SU-2018:1270-1
- SUSE-SU-2018:1272-1
- SUSE-SU-2018:1273-1
- SUSE-SU-2018:1309-1
- SUSE-SU-2018:1366-1
- SUSE-SU-2018:1505-1
- SUSE-SU-2018:1506-1
- SUSE-SU-2018:1509-1
- SUSE-SU-2018:1510-1
- SUSE-SU-2018:1511-1
- SUSE-SU-2018:1512-1
- SUSE-SU-2018:1513-1
- SUSE-SU-2018:1514-1
- SUSE-SU-2018:1516-1
- SUSE-SU-2018:1517-1
- SUSE-SU-2018:1518-1
- SUSE-SU-2018:1519-1
- SUSE-SU-2018:1520-1
- SUSE-SU-2018:1521-1
- SUSE-SU-2018:1522-1
- SUSE-SU-2018:1523-1
- SUSE-SU-2018:1524-1
- SUSE-SU-2018:1526-1
- SUSE-SU-2018:1528-1
- SUSE-SU-2018:1529-1
- SUSE-SU-2018:1530-1
- SUSE-SU-2018:1531-1
- SUSE-SU-2018:1532-1
- SUSE-SU-2018:1533-1
- SUSE-SU-2018:1534-1
- SUSE-SU-2018:1535-1
- SUSE-SU-2018:1536-1
- SUSE-SU-2018:1537-1
- SUSE-SU-2018:1538-1
- SUSE-SU-2018:1539-1
- SUSE-SU-2018:1540-1
- SUSE-SU-2018:1541-1
- SUSE-SU-2018:1543-1
- SUSE-SU-2018:1545-1
- SUSE-SU-2018:1546-1
- SUSE-SU-2018:1548-1
- SUSE-SU-2018:1549-1
- SUSE-SU-2018:1636-1
- SUSE-SU-2018:1637-1
- SUSE-SU-2018:1639-1
- SUSE-SU-2018:1640-1
- SUSE-SU-2018:1641-1
- SUSE-SU-2018:1642-1
- SUSE-SU-2018:1643-1
- SUSE-SU-2018:1644-1
- SUSE-SU-2018:1645-1
- SUSE-SU-2018:1648-1
- SUSE-SU-2018:1761-1
- SUSE-SU-2018:1762-1
- SUSE-SU-2018:1772-1
- SUSE-SU-2018:1816-1
- SUSE-SU-2018:1855-1
- SUSE-SU-2018:1855-2
- SUSE-SU-2018:2051-1
- SUSE-SU-2018:2092-1
- SUSE-SU-2018:2150-1
- SUSE-SU-2018:2222-1
- SUSE-SU-2018:2223-1
- SUSE-SU-2018:2328-1
- SUSE-SU-2018:2332-1
- SUSE-SU-2018:2344-1
- SUSE-SU-2018:2344-2
- SUSE-SU-2018:2362-1
- SUSE-SU-2018:2366-1
- SUSE-SU-2018:2374-1
- SUSE-SU-2018:2380-1
- SUSE-SU-2018:2381-1
- SUSE-SU-2018:2384-1
- SUSE-SU-2018:2387-1
- SUSE-SU-2018:2391-1
- SUSE-SU-2018:2413-1
- SUSE-SU-2018:2416-1
- SUSE-SU-2018:2450-1
- SUSE-SU-2018:2472-1
- SUSE-SU-2018:2474-1
- SUSE-SU-2018:2538-1
- SUSE-SU-2018:2539-1
- SUSE-SU-2018:2596-1
- SUSE-SU-2018:2637-1
- SUSE-SU-2018:2775-1
- SUSE-SU-2018:2776-1
- SUSE-SU-2018:2787-1
- SUSE-SU-2018:2858-1
- SUSE-SU-2018:2860-1
- SUSE-SU-2018:2862-1
- SUSE-SU-2018:2864-1
- SUSE-SU-2018:2879-1
- SUSE-SU-2018:2907-1
- SUSE-SU-2018:2908-1
- SUSE-SU-2018:2908-2
- SUSE-SU-2018:2940-1
- SUSE-SU-2018:2960-1
- SUSE-SU-2018:2961-1
- SUSE-SU-2018:2962-1
- SUSE-SU-2018:2963-1
- SUSE-SU-2018:2980-1
- SUSE-SU-2018:2981-1
- SUSE-SU-2018:3003-1
- SUSE-SU-2018:3004-1
- SUSE-SU-2018:3029-1
- SUSE-SU-2018:3083-1
- SUSE-SU-2018:3084-1
- SUSE-SU-2018:3088-1
- SUSE-SU-2018:3659-1
- SUSE-SU-2018:3688-1
- SUSE-SU-2018:3689-1
- SUSE-SU-2018:3773-1
- SUSE-SU-2018:3787-1
- SUSE-SU-2018:3792-1
- SUSE-SU-2018:3860-1
- SUSE-SU-2018:3865-1
- SUSE-SU-2018:3880-1
- SUSE-SU-2018:3881-1
- SUSE-SU-2018:3961-1
- SUSE-SU-2018:4127-1
- SUSE-SU-2018:4153-1
- SUSE-SU-2018:4157-1
- SUSE-SU-2018:4195-1
- SUSE-SU-2018:4208-1
- SUSE-SU-2018:4238-1
- SUSE-SU-2019:0095-1
- SUSE-SU-2019:0148-1
- SUSE-SU-2019:0320-1
- SUSE-SU-2019:0439-1
- SUSE-SU-2019:0541-1
- SUSE-SU-2019:0645-1
- SUSE-SU-2019:0672-1
- SUSE-SU-2019:1287-1
- SUSE-SU-2019:1289-1
- SUSE-SU-2021:0452-1
- SUSE-SU-2021:3723-1
- SUSE-SU-2021:3748-1
- SUSE-SU-2021:3876-1
- SUSE-SU-2021:3929-1
- SUSE-SU-2021:3935-1
- SUSE-SU-2021:3972-1
- SUSE-SU-2023:3333-1
- USN-2968-1
- USN-2968-2
- USN-2969-1
- USN-2970-1
- USN-3016-1
- USN-3016-2
- USN-3016-3
- USN-3016-4
- USN-3017-1
- USN-3017-2
- USN-3017-3
- USN-3018-1
- USN-3018-2
- USN-3019-1
- USN-3020-1
- USN-3021-1
- USN-3021-2
- USN-3470-1
- USN-3470-2
- USN-3583-1
- USN-3583-2
- USN-3617-1
- USN-3617-2
- USN-3617-3
- USN-3619-1
- USN-3619-2
- USN-3620-1
- USN-3620-2
- USN-3632-1
- USN-3653-1
- USN-3653-2
- USN-3654-1
- USN-3654-2
- USN-3655-1
- USN-3655-2
- USN-3656-1
- USN-3657-1
- USN-3674-1
- USN-3674-2
- USN-3676-1
- USN-3676-2
- USN-3677-1
- USN-3677-2
- USN-3678-1
- USN-3678-2
- USN-3678-3
- USN-3678-4
- USN-3695-1
- USN-3695-2
- USN-3697-1
- USN-3697-2
- USN-3698-1
- USN-3698-2
- USN-3740-1
- USN-3740-2
- USN-3741-1
- USN-3741-2
- USN-3742-1
- USN-3742-2
- USN-3752-1
- USN-3752-2
- USN-3752-3
- USN-3753-1
- USN-3753-2
- USN-3754-1
- USN-3762-1
- USN-3762-2
- USN-3776-1
- USN-3776-2
- USN-3847-1
- USN-3847-2
- USN-3847-3
- USN-3848-1
- USN-3848-2
- USN-3849-1
- USN-3849-2
- USN-3871-1
- USN-3871-3
- USN-3871-4
- USN-3871-5
- USN-3879-1
- USN-3879-2
- USN-3910-1
- USN-3910-2
- USN-3933-1
- USN-3933-2
- USN-4163-1
- USN-4163-2
- USN-4578-1
- USN-4579-1
- VU:641765
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/python-perf?arch=x86_64&distro=redhat-7 | redhat | python-perf | < 3.10.0-957.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/python-perf?arch=s390x&distro=redhat-7 | redhat | python-perf | < 3.10.0-957.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/python-perf?arch=ppc64le&distro=redhat-7 | redhat | python-perf | < 3.10.0-957.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/python-perf?arch=ppc64&distro=redhat-7 | redhat | python-perf | < 3.10.0-957.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/perf?arch=x86_64&distro=redhat-7 | redhat | perf | < 3.10.0-957.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/perf?arch=s390x&distro=redhat-7 | redhat | perf | < 3.10.0-957.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/perf?arch=ppc64le&distro=redhat-7 | redhat | perf | < 3.10.0-957.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/perf?arch=ppc64&distro=redhat-7 | redhat | perf | < 3.10.0-957.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 | redhat | kernel | < 3.10.0-957.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=s390x&distro=redhat-7 | redhat | kernel | < 3.10.0-957.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 | redhat | kernel | < 3.10.0-957.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64&distro=redhat-7 | redhat | kernel | < 3.10.0-957.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-tools?arch=x86_64&distro=redhat-7 | redhat | kernel-tools | < 3.10.0-957.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools?arch=ppc64le&distro=redhat-7 | redhat | kernel-tools | < 3.10.0-957.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools?arch=ppc64&distro=redhat-7 | redhat | kernel-tools | < 3.10.0-957.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=x86_64&distro=redhat-7 | redhat | kernel-tools-libs | < 3.10.0-957.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=ppc64le&distro=redhat-7 | redhat | kernel-tools-libs | < 3.10.0-957.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=ppc64&distro=redhat-7 | redhat | kernel-tools-libs | < 3.10.0-957.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-tools-libs-devel | < 3.10.0-957.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=ppc64le&distro=redhat-7 | redhat | kernel-tools-libs-devel | < 3.10.0-957.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=ppc64&distro=redhat-7 | redhat | kernel-tools-libs-devel | < 3.10.0-957.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-kdump?arch=s390x&distro=redhat-7 | redhat | kernel-kdump | < 3.10.0-957.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel-kdump-devel?arch=s390x&distro=redhat-7 | redhat | kernel-kdump-devel | < 3.10.0-957.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel-headers?arch=x86_64&distro=redhat-7 | redhat | kernel-headers | < 3.10.0-957.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-headers?arch=s390x&distro=redhat-7 | redhat | kernel-headers | < 3.10.0-957.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel-headers?arch=ppc64le&distro=redhat-7 | redhat | kernel-headers | < 3.10.0-957.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-headers?arch=ppc64&distro=redhat-7 | redhat | kernel-headers | < 3.10.0-957.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-doc?distro=redhat-7 | redhat | kernel-doc | < 3.10.0-957.el7 | redhat-7 | ||
Affected | pkg:rpm/redhat/kernel-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-devel | < 3.10.0-957.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-devel?arch=s390x&distro=redhat-7 | redhat | kernel-devel | < 3.10.0-957.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel-devel?arch=ppc64le&distro=redhat-7 | redhat | kernel-devel | < 3.10.0-957.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-devel?arch=ppc64&distro=redhat-7 | redhat | kernel-devel | < 3.10.0-957.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-debug?arch=x86_64&distro=redhat-7 | redhat | kernel-debug | < 3.10.0-957.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug?arch=s390x&distro=redhat-7 | redhat | kernel-debug | < 3.10.0-957.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug?arch=ppc64le&distro=redhat-7 | redhat | kernel-debug | < 3.10.0-957.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug?arch=ppc64&distro=redhat-7 | redhat | kernel-debug | < 3.10.0-957.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-debug-devel | < 3.10.0-957.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=s390x&distro=redhat-7 | redhat | kernel-debug-devel | < 3.10.0-957.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=ppc64le&distro=redhat-7 | redhat | kernel-debug-devel | < 3.10.0-957.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=ppc64&distro=redhat-7 | redhat | kernel-debug-devel | < 3.10.0-957.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-bootwrapper?arch=ppc64le&distro=redhat-7 | redhat | kernel-bootwrapper | < 3.10.0-957.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-bootwrapper?arch=ppc64&distro=redhat-7 | redhat | kernel-bootwrapper | < 3.10.0-957.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-abi-whitelists?distro=redhat-7 | redhat | kernel-abi-whitelists | < 3.10.0-957.el7 | redhat-7 | ||
Affected | pkg:rpm/redhat/bpftool?arch=x86_64&distro=redhat-7 | redhat | bpftool | < 3.10.0-957.el7 | redhat-7 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |