{"id":"RHSA-2018:0654","summary":"Red Hat Security Advisory: kernel-alt security, bug fix, and enhancement update","modified":"2025-11-22T11:27:57Z","published":"2024-09-16T00:48:58Z","upstream":["CVE-2017-1000255","CVE-2017-1000410","CVE-2017-11473","CVE-2017-12190","CVE-2017-12192","CVE-2017-15129","CVE-2017-15299","CVE-2017-15306","CVE-2017-16939","CVE-2017-17448","CVE-2017-17449","CVE-2017-5753","CVE-2018-1000004","CVE-2018-6927"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0654"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.5_Release_Notes/index.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1473209"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1495089"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1498016"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1498067"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1501794"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1519160"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1519778"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1519780"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1519781"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1525762"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1525768"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1531174"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535315"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1544612"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0654.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-5753"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-5753"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5753"},{"type":"ARTICLE","url":"https://access.redhat.com/security/vulnerabilities/speculativeexecution"},{"type":"ARTICLE","url":"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"},{"type":"ARTICLE","url":"https://meltdownattack.com"},{"type":"ARTICLE","url":"https://spectreattack.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-11473"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-11473"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-11473"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-12190"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-12190"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12190"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-12192"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1493435"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-12192"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12192"},{"type":"ARTICLE","url":"http://seclists.org/oss-sec/2017/q4/63"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-15129"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-15129"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15129"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-15299"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-15299"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15299"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-15306"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1510399"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-15306"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15306"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-16939"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1517220"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-16939"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-16939"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-17448"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-17448"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17448"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-17449"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-17449"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17449"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-1000255"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-1000255"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000255"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-1000410"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-1000410"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000410"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-6927"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-6927"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-6927"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000004"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000004"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000004"}],"affected":[{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}},{"package":{"name":"kernel-abi-whitelists","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-abi-whitelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}},{"package":{"name":"kernel-alt","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-alt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}},{"package":{"name":"kernel-bootwrapper","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-bootwrapper"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}},{"package":{"name":"kernel-headers","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-headers"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}},{"package":{"name":"kernel-kdump","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-kdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}},{"package":{"name":"kernel-kdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-kdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}},{"package":{"name":"kernel-kdump-devel","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-kdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}},{"package":{"name":"python-perf","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/python-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}},{"package":{"name":"python-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/python-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-49.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:0654.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"}]}