- Issued:
- 2019-07-30
- Updated:
- 2019-07-30
RHSA-2019:1973 - Important: kernel-alt security and bug fix update
Synopsis
Important: kernel-alt security and bug fix update
Type/Severity
Security Advisory Important
Topic
An update for kernel-alt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel-alt packages provide the Linux kernel version 4.x.
Security Fix(es):
- Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
-
Pegas1.1 - 7.5-alt s390x kernel oops in update_cfs_rq_h_load (BZ#1557242)
-
race of lockd/nfsd inetaddr notifiers with pointers change (BZ#1637541)
-
lockd: possible double unregister of inetaddr notifiers (BZ#1637542)
-
[Huawei AArch64 7.6 Bug] During the virtual machine migration process, NFS may trigger a system panic. (BZ#1671943)
-
RHEL-Alt-7.6 - jit'd java code on power9 ppc64le experiences stack corruption (BZ#1707630)
Users of kernel-alt are advised to upgrade to these updated packages, which fix these bugs.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for Power 9 | 7 | ppc64le |
| Red Hat Enterprise Linux for IBM System z (Structure A) | 7 | s390x |
| Red Hat Enterprise Linux for ARM 64 | 7 | aarch64 |
Updated Packages
- perf-4.14.0-115.10.1.el7a.s390x.rpm
- kernel-debug-debuginfo-4.14.0-115.10.1.el7a.s390x.rpm
- kernel-debug-4.14.0-115.10.1.el7a.ppc64le.rpm
- kernel-debug-devel-4.14.0-115.10.1.el7a.s390x.rpm
- kernel-alt-4.14.0-115.10.1.el7a.src.rpm
- kernel-debug-debuginfo-4.14.0-115.10.1.el7a.ppc64le.rpm
- kernel-devel-4.14.0-115.10.1.el7a.ppc64le.rpm
- kernel-debug-devel-4.14.0-115.10.1.el7a.aarch64.rpm
- kernel-debuginfo-4.14.0-115.10.1.el7a.ppc64le.rpm
- kernel-debuginfo-common-s390x-4.14.0-115.10.1.el7a.s390x.rpm
- kernel-debug-4.14.0-115.10.1.el7a.aarch64.rpm
- kernel-tools-libs-4.14.0-115.10.1.el7a.ppc64le.rpm
- perf-4.14.0-115.10.1.el7a.aarch64.rpm
- kernel-debug-debuginfo-4.14.0-115.10.1.el7a.aarch64.rpm
- kernel-tools-4.14.0-115.10.1.el7a.ppc64le.rpm
- kernel-debuginfo-4.14.0-115.10.1.el7a.aarch64.rpm
- kernel-debuginfo-4.14.0-115.10.1.el7a.s390x.rpm
- perf-4.14.0-115.10.1.el7a.ppc64le.rpm
- perf-debuginfo-4.14.0-115.10.1.el7a.aarch64.rpm
- kernel-tools-4.14.0-115.10.1.el7a.aarch64.rpm
- kernel-4.14.0-115.10.1.el7a.aarch64.rpm
- kernel-tools-debuginfo-4.14.0-115.10.1.el7a.ppc64le.rpm
- kernel-tools-libs-4.14.0-115.10.1.el7a.aarch64.rpm
- python-perf-4.14.0-115.10.1.el7a.aarch64.rpm
- python-perf-4.14.0-115.10.1.el7a.ppc64le.rpm
- python-perf-debuginfo-4.14.0-115.10.1.el7a.ppc64le.rpm
- kernel-4.14.0-115.10.1.el7a.ppc64le.rpm
- perf-debuginfo-4.14.0-115.10.1.el7a.s390x.rpm
- python-perf-4.14.0-115.10.1.el7a.s390x.rpm
- python-perf-debuginfo-4.14.0-115.10.1.el7a.aarch64.rpm
- kernel-tools-libs-devel-4.14.0-115.10.1.el7a.aarch64.rpm
- kernel-debug-4.14.0-115.10.1.el7a.s390x.rpm
- kernel-debuginfo-common-aarch64-4.14.0-115.10.1.el7a.aarch64.rpm
- kernel-doc-4.14.0-115.10.1.el7a.noarch.rpm
- perf-debuginfo-4.14.0-115.10.1.el7a.ppc64le.rpm
- kernel-headers-4.14.0-115.10.1.el7a.aarch64.rpm
- kernel-debuginfo-common-ppc64le-4.14.0-115.10.1.el7a.ppc64le.rpm
- kernel-kdump-devel-4.14.0-115.10.1.el7a.s390x.rpm
- python-perf-debuginfo-4.14.0-115.10.1.el7a.s390x.rpm
- kernel-headers-4.14.0-115.10.1.el7a.s390x.rpm
- kernel-4.14.0-115.10.1.el7a.s390x.rpm
- kernel-headers-4.14.0-115.10.1.el7a.ppc64le.rpm
- kernel-kdump-debuginfo-4.14.0-115.10.1.el7a.s390x.rpm
- kernel-kdump-4.14.0-115.10.1.el7a.s390x.rpm
- kernel-tools-libs-devel-4.14.0-115.10.1.el7a.ppc64le.rpm
- kernel-bootwrapper-4.14.0-115.10.1.el7a.ppc64le.rpm
- kernel-abi-whitelists-4.14.0-115.10.1.el7a.noarch.rpm
- kernel-devel-4.14.0-115.10.1.el7a.aarch64.rpm
- kernel-debug-devel-4.14.0-115.10.1.el7a.ppc64le.rpm
- kernel-devel-4.14.0-115.10.1.el7a.s390x.rpm
- kernel-tools-debuginfo-4.14.0-115.10.1.el7a.aarch64.rpm
Fixes
CVEs
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.