[RHSA-2018:2772-01] Important: kernel-alt security and bug fix update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 = Red Hat Security Advisory Synopsis: Important: kernel-alt security and bug fix update Advisory ID: RHSA-2018:2772-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:2772 Issue date:2018-09-25 CVE Names: CVE-2017-18202 = 1. Summary: An update for kernel-alt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, noarch, ppc64le, s390x Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, noarch, ppc64le 3. Description: The kernel-alt packages provide the Linux kernel version 4.x. Security Fix(es): * kernel: Infoleak/use-after-free in __oom_reap_task_mm function in mm/oom_kill.c (CVE-2017-18202) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Previously, on certain little-endian variants of IBM Power Systems, there was no “sysfs spec_store_bypass” file. As a consequence, there was no way to indicate the Speculative Store Bypass Disable (SSBD) mitigation status. This update adds infrastructure code into the kernel to create the /sys/devices/system/cpu/vulnerabilities/* files. As a result, sysfs spec_store_bypass shows whether the SSBD mitigation is disabled or enabled. (BZ#1602340) * Previously, the kernel architectures for IBM z Systems were missing support to display the status of the Spectre v2 mitigations. As a consequence, the /sys/devices/system/cpu/vulnerabilities/spectre_v2 file did not exist. With this update, the kernel now shows the status in the above mentioned file and as a result, the file now reports either "Vulnerable" or "Mitigation: execute trampolines" message. (BZ#1619667) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1549621 - CVE-2017-18202 kernel: Infoleak/use-after-free in __oom_reap_task_mm function in mm/oom_kill.c 6. Package List: Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7): Source: kernel-alt-4.14.0-49.13.1.el7a.src.rpm aarch64: kernel-4.14.0-49.13.1.el7a.aarch64.rpm kernel-debug-4.14.0-49.13.1.el7a.aarch64.rpm kernel-debug-debuginfo-4.14.0-49.13.1.el7a.aarch64.rpm kernel-debug-devel-4.14.0-49.13.1.el7a.aarch64.rpm kernel-debuginfo-4.14.0-49.13.1.el7a.aarch64.rpm kernel-debuginfo-common-aarch64-4.14.0-49.13.1.el7a.aarch64.rpm kernel-devel-4.14.0-49.13.1.el7a.aarch64.rpm kernel-headers-4.14.0-49.13.1.el7a.aarch64.rpm kernel-tools-4.14.0-49.13.1.el7a.aarch64.rpm kernel-tools-debuginfo-4.14.0-49.13.1.el7a.aarch64.rpm kernel-tools-libs-4.14.0-49.13.1.el7a.aarch64.rpm perf-4.14.0-49.13.1.el7a.aarch64.rpm perf-debuginfo-4.14.0-49.13.1.el7a.aarch64.rpm python-perf-4.14.0-49.13.1.el7a.aarch64.rpm python-perf-debuginfo-4.14.0-49.13.1.el7a.aarch64.rpm noarch: kernel-abi-whitelists-4.14.0-49.13.1.el7a.noarch.rpm kernel-doc-4.14.0-49.13.1.el7a.noarch.rpm ppc64le: kernel-4.14.0-49.13.1.el7a.ppc64le.rpm kernel-bootwrapper-4.14.0-49.13.1.el7a.ppc64le.rpm kernel-debug-4.14.0-49.13.1.el7a.ppc64le.rpm kernel-debug-debuginfo-4.14.0-49.13.1.el7a.ppc64le.rpm kernel-debuginfo-4.14.0-49.13.1.el7a.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.14.0-49.13.1.el7a.ppc64le.rpm kernel-devel-4.14.0-49.13.1.el7a.ppc64le.rpm kernel-headers-4.14.0-49.13.1.el7a.ppc64le.rpm kernel-tools-4.14.0-49.13.1.el7a.ppc64le.rpm kernel-tools-debuginfo-4.14.0-49.13.1.el7a.ppc64le.rpm kernel-tools-libs-4.14.0-49.13.1.el7a.ppc64le.rpm perf-4.14.0-49.13.1.el7a.ppc64le.rpm perf-debuginfo-4.14.0-49.13.1.el7a.ppc64le.rpm python-perf-4.14.0-49.13.1.el7a.ppc64le.rpm python-perf-debuginfo-4.14.0-49.13.1.el7a.ppc64le.rpm s390x: kernel-4.14.0-49.13.1.el7a.s390x.rpm kernel-debug-4.14.0-49.13.1.el7a.s390x.rpm kernel-debug-debuginfo-4.14.0-49.13.1.el7a.s390x.rpm kernel-debug-devel-4.14.0-49.13.1.el7a.s390x.rpm kernel-debuginfo-4.14.0-49.13.1.el7a.s390x.rpm kernel-debuginfo-common-s390x-4.14.0-49.13.1.el7a.s390x.rpm kernel-devel-4.14.0-49.13.1.el7a.s390x.rpm kernel-headers-4.14.0-49.13.1.el7a.s390x.rpm kernel-kdump-4.14.0-49.13.1.el7a.s390x.rpm kernel-kdump-debuginfo-4.14.0-49.13.1.el7a.s390x.rpm kernel-kdump-devel-4.14.0-49.13.1
[RHSA-2018:2762-01] Important: qemu-kvm-ma security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 = Red Hat Security Advisory Synopsis: Important: qemu-kvm-ma security update Advisory ID: RHSA-2018:2762-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:2762 Issue date:2018-09-25 CVE Names: CVE-2018-11806 = 1. Summary: An update for qemu-kvm-ma is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x Red Hat Enterprise Linux Server Optional (v. 7) - ppc64 Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - ppc64le, s390x Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64 3. Description: Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Security Fix(es): * QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams (CVE-2018-11806) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Jskz - Zero Day Initiative (trendmicro.com) for reporting this issue. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1586245 - CVE-2018-11806 QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams 6. Package List: Red Hat Enterprise Linux Server (v. 7): Source: qemu-kvm-ma-2.10.0-21.el7_5.4.src.rpm ppc64: qemu-img-ma-2.10.0-21.el7_5.4.ppc64.rpm qemu-kvm-ma-debuginfo-2.10.0-21.el7_5.4.ppc64.rpm ppc64le: qemu-img-ma-2.10.0-21.el7_5.4.ppc64le.rpm qemu-kvm-common-ma-2.10.0-21.el7_5.4.ppc64le.rpm qemu-kvm-ma-2.10.0-21.el7_5.4.ppc64le.rpm qemu-kvm-ma-debuginfo-2.10.0-21.el7_5.4.ppc64le.rpm qemu-kvm-tools-ma-2.10.0-21.el7_5.4.ppc64le.rpm s390x: qemu-img-ma-2.10.0-21.el7_5.4.s390x.rpm qemu-kvm-common-ma-2.10.0-21.el7_5.4.s390x.rpm qemu-kvm-ma-2.10.0-21.el7_5.4.s390x.rpm qemu-kvm-ma-debuginfo-2.10.0-21.el7_5.4.s390x.rpm qemu-kvm-tools-ma-2.10.0-21.el7_5.4.s390x.rpm Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7): Source: qemu-kvm-ma-2.10.0-21.el7_5.4.src.rpm ppc64le: qemu-img-ma-2.10.0-21.el7_5.4.ppc64le.rpm qemu-kvm-common-ma-2.10.0-21.el7_5.4.ppc64le.rpm qemu-kvm-ma-2.10.0-21.el7_5.4.ppc64le.rpm qemu-kvm-ma-debuginfo-2.10.0-21.el7_5.4.ppc64le.rpm qemu-kvm-tools-ma-2.10.0-21.el7_5.4.ppc64le.rpm s390x: qemu-img-ma-2.10.0-21.el7_5.4.s390x.rpm qemu-kvm-common-ma-2.10.0-21.el7_5.4.s390x.rpm qemu-kvm-ma-2.10.0-21.el7_5.4.s390x.rpm qemu-kvm-ma-debuginfo-2.10.0-21.el7_5.4.s390x.rpm qemu-kvm-tools-ma-2.10.0-21.el7_5.4.s390x.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: qemu-kvm-common-ma-2.10.0-21.el7_5.4.ppc64.rpm qemu-kvm-ma-2.10.0-21.el7_5.4.ppc64.rpm qemu-kvm-ma-debuginfo-2.10.0-21.el7_5.4.ppc64.rpm qemu-kvm-tools-ma-2.10.0-21.el7_5.4.ppc64.rpm Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7): Source: qemu-kvm-ma-2.10.0-21.el7_5.4.src.rpm aarch64: qemu-img-ma-2.10.0-21.el7_5.4.aarch64.rpm qemu-kvm-common-ma-2.10.0-21.el7_5.4.aarch64.rpm qemu-kvm-ma-2.10.0-21.el7_5.4.aarch64.rpm qemu-kvm-ma-debuginfo-2.10.0-21.el7_5.4.aarch64.rpm qemu-kvm-tools-ma-2.10.0-21.el7_5.4.aarch64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-11806 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIVAwUBW6qH8dzjgjWX9erEAQhXTw/9FodVcxnFjg73ps0FQ8OP3JBXFdQGMsDT JICJ3EtSORhDEcNb7fbU8isufcfXGSiuLhJ0LaAb/QKYDO2Ji2hVUnn8rJCjUZ1e FvvIZc6eA+PzM7FWqOZEKHZZLjafnYh3yi2I4ZK0LQr4GobVnvAUGw62iya7Oe6B nkYUcw8pdqzTWUguPvZh2VtyHJLFxakqNFYCdsdFwbj9hGD2pEJTQGYAUXkhdKn8 YRYoV+u3+bunZBDOogKxnShXU5dNpHkmFFvFevQEDc0fDU1l10vVXe7dwfR03se6 xg/Il+FR7Fqq1HNcm9aZvEHDGbEb4sIOTexSZgvOfgJbKxCW7b6KOtW/OFmvqoB9 q3Qxse8h1Awwz
[RHSA-2018:2766-01] Moderate: flatpak security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 = Red Hat Security Advisory Synopsis: Moderate: flatpak security update Advisory ID: RHSA-2018:2766-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:2766 Issue date:2018-09-25 CVE Names: CVE-2018-6560 = 1. Summary: An update for flatpak is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, ppc64le, s390x Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, ppc64le, s390x 3. Description: Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. Security Fix(es): * flatpak: sandbox escape in D-Bus filtering by a crafted authentication handshake (CVE-2018-6560) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1542207 - CVE-2018-6560 flatpak: sandbox escape in D-Bus filtering by a crafted authentication handshake 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: flatpak-0.8.8-4.el7_5.src.rpm x86_64: flatpak-0.8.8-4.el7_5.x86_64.rpm flatpak-debuginfo-0.8.8-4.el7_5.x86_64.rpm flatpak-libs-0.8.8-4.el7_5.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: flatpak-builder-0.8.8-4.el7_5.x86_64.rpm flatpak-debuginfo-0.8.8-4.el7_5.x86_64.rpm flatpak-devel-0.8.8-4.el7_5.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: flatpak-0.8.8-4.el7_5.src.rpm ppc64: flatpak-0.8.8-4.el7_5.ppc64.rpm flatpak-debuginfo-0.8.8-4.el7_5.ppc64.rpm flatpak-libs-0.8.8-4.el7_5.ppc64.rpm ppc64le: flatpak-0.8.8-4.el7_5.ppc64le.rpm flatpak-debuginfo-0.8.8-4.el7_5.ppc64le.rpm flatpak-libs-0.8.8-4.el7_5.ppc64le.rpm s390x: flatpak-0.8.8-4.el7_5.s390x.rpm flatpak-debuginfo-0.8.8-4.el7_5.s390x.rpm flatpak-libs-0.8.8-4.el7_5.s390x.rpm x86_64: flatpak-0.8.8-4.el7_5.x86_64.rpm flatpak-debuginfo-0.8.8-4.el7_5.x86_64.rpm flatpak-libs-0.8.8-4.el7_5.x86_64.rpm Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7): Source: flatpak-0.8.8-4.el7_5.src.rpm aarch64: flatpak-0.8.8-4.el7_5.aarch64.rpm flatpak-debuginfo-0.8.8-4.el7_5.aarch64.rpm flatpak-libs-0.8.8-4.el7_5.aarch64.rpm ppc64le: flatpak-0.8.8-4.el7_5.ppc64le.rpm flatpak-debuginfo-0.8.8-4.el7_5.ppc64le.rpm flatpak-libs-0.8.8-4.el7_5.ppc64le.rpm s390x: flatpak-0.8.8-4.el7_5.s390x.rpm flatpak-debuginfo-0.8.8-4.el7_5.s390x.rpm flatpak-libs-0.8.8-4.el7_5.s390x.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: flatpak-builder-0.8.8-4.el7_5.ppc64.rpm flatpak-debuginfo-0.8.8-4.el7_5.ppc64.rpm flatpak-devel-0.8.8-4.el7_5.ppc64.rpm ppc64le: flatpak-builder-0.8.8-4.el7_5.ppc64le.rpm flatpak-debuginfo-0.8.8-4.el7_5.ppc64le.rpm flatpak-devel-0.8.8-4.el7_5.ppc64le.rpm s390x: flatpak-builder-0.8.8-4.el7_5.s390x.rpm flatpak-debuginfo-0.8.8-4.el7_5.s390x.rpm flatpak-devel-0.8.8-4.el7_5.s390x.rpm x86_64: flatpak-builder-0.8.8-4.el7_5.x86_64.rpm flatpak-debuginfo-0.8.8-4.el7_5.x86_64.rpm flatpak-devel-0.8.8-4.el7_5.x86_64.rpm Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7): aarch64: flatpak-builder-0.8.8-4.el7_5.aarch64.rpm flatpak-debuginfo-0.8.8-4.el7_5.aarch64.rpm flatpak-devel-0.8.8-4.el7_5.aarch64.rpm ppc64le: flatpak-builder-0.8.8-4.el7_5.ppc64le.rpm flatpak-debuginfo-0.8.8-4.el7_5.ppc64le.rpm flatpak-devel-0.8.8-4.el7_5.ppc64le.rpm s390x: flatpak-builder-0.8.8-4.el7_5.s390x.rpm flatpak-debuginfo-0.8.8-4.el7_5.s390x.rpm flatpak-devel-0.8.8-4.el7_5.s390x.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: flatpak-0.8.8-4.el7_5.src.rpm x86_64: flatpak-0.8.8-4.el7_5.x86_64.rpm flatpak-debuginfo-0.8.8-4.el7_5.x86_64.rpm flatpak-libs-0.8.8-4.el7_5.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: flatpak-b
[RHSA-2018:2763-01] Important: kernel-rt security and bug fix update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 = Red Hat Security Advisory Synopsis: Important: kernel-rt security and bug fix update Advisory ID: RHSA-2018:2763-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:2763 Issue date:2018-09-25 CVE Names: CVE-2018-14634 = 1. Summary: An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Realtime (v. 7) - noarch, x86_64 Red Hat Enterprise Linux for Real Time for NFV (v. 7) - noarch, x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: Integer overflow in Linux's create_elf_tables function (CVE-2018-14634) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Qualys Research Labs for reporting this issue. Bug Fix(es): * The kernel-rt packages have been upgraded to the 3.10.0-862.14.3 source tree, which provides a number of bug fixes over the previous version. (BZ#1616429) * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1617941) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1616429 - kernel-rt: update to the RHEL7.5.z batch#4 source tree 1617941 - RT system hang due to wrong of rq's nr_running [rhel-7.5.z] 1624498 - CVE-2018-14634 kernel: Integer overflow in Linux's create_elf_tables function 6. Package List: Red Hat Enterprise Linux for Real Time for NFV (v. 7): Source: kernel-rt-3.10.0-862.14.4.rt56.821.el7.src.rpm noarch: kernel-rt-doc-3.10.0-862.14.4.rt56.821.el7.noarch.rpm x86_64: kernel-rt-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm kernel-rt-debug-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm kernel-rt-debug-devel-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm kernel-rt-debug-kvm-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm kernel-rt-debug-kvm-debuginfo-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm kernel-rt-debuginfo-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm kernel-rt-devel-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm kernel-rt-kvm-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm kernel-rt-kvm-debuginfo-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm kernel-rt-trace-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm kernel-rt-trace-devel-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm kernel-rt-trace-kvm-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm kernel-rt-trace-kvm-debuginfo-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm Red Hat Enterprise Linux Realtime (v. 7): Source: kernel-rt-3.10.0-862.14.4.rt56.821.el7.src.rpm noarch: kernel-rt-doc-3.10.0-862.14.4.rt56.821.el7.noarch.rpm x86_64: kernel-rt-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm kernel-rt-debug-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm kernel-rt-debug-devel-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm kernel-rt-devel-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm kernel-rt-trace-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm kernel-rt-trace-devel-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-14634 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQI
[RHSA-2018:2748-01] Important: kernel security and bug fix update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 = Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2018:2748-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:2748 Issue date:2018-09-25 CVE Names: CVE-2018-14634 = 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - noarch, ppc64le, s390x Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - noarch, ppc64le 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Integer overflow in Linux's create_elf_tables function (CVE-2018-14634) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Qualys Research Labs for reporting this issue. Bug Fix(es): These updated kernel packages include also numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article: https://access.redhat.com/articles/3588731 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1624498 - CVE-2018-14634 kernel: Integer overflow in Linux's create_elf_tables function 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: kernel-3.10.0-862.14.4.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-862.14.4.el7.noarch.rpm kernel-doc-3.10.0-862.14.4.el7.noarch.rpm x86_64: kernel-3.10.0-862.14.4.el7.x86_64.rpm kernel-debug-3.10.0-862.14.4.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm kernel-debug-devel-3.10.0-862.14.4.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.14.4.el7.x86_64.rpm kernel-devel-3.10.0-862.14.4.el7.x86_64.rpm kernel-headers-3.10.0-862.14.4.el7.x86_64.rpm kernel-tools-3.10.0-862.14.4.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm kernel-tools-libs-3.10.0-862.14.4.el7.x86_64.rpm perf-3.10.0-862.14.4.el7.x86_64.rpm perf-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm python-perf-3.10.0-862.14.4.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.14.4.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-862.14.4.el7.x86_64.rpm perf-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: kernel-3.10.0-862.14.4.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-862.14.4.el7.noarch.rpm kernel-doc-3.10.0-862.14.4.el7.noarch.rpm x86_64: kernel-3.10.0-862.14.4.el7.x86_64.rpm kernel-debug-3.10.0-862.14.4.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm kernel-debug-devel-3.10.0-862.14.4.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.14.4.el7.x86_64.rpm kernel-devel-3.10.0-862.14.4.el7.x86_64.rpm kernel-headers-3.10.0-862.14.4.el7.x86_64.rpm kernel-tools-3.10.0-862.14.4.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm kernel-tools-libs-3.10.0-862.14.4.el7.x86_64.rpm perf-3.10.0-862.14.4.el7.x86_64.rpm perf-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm python-perf-3.10.0-862.14.4.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v.
[RHSA-2018:2757-01] Moderate: 389-ds-base security and bug fix update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 = Red Hat Security Advisory Synopsis: Moderate: 389-ds-base security and bug fix update Advisory ID: RHSA-2018:2757-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:2757 Issue date:2018-09-25 CVE Names: CVE-2018-10850 CVE-2018-10935 CVE-2018-14624 CVE-2018-14638 = 1. Summary: An update for 389-ds-base is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64le, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, ppc64le Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, ppc64le, s390x 3. Description: 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es): * 389-ds-base: race condition on reference counter leads to DoS using persistent search (CVE-2018-10850) * 389-ds-base: ldapsearch with server side sort allows users to cause a crash (CVE-2018-10935) * 389-ds-base: Server crash through modify command with large DN (CVE-2018-14624) * 389-ds-base: Crash in delete_passwdPolicy when persistent search connections are terminated unexpectedly (CVE-2018-14638) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. The CVE-2018-10850 issue was discovered by Thierry Bordaz (Red Hat) and the CVE-2018-14638 issue was discovered by Viktor Ashirov (Red Hat). Bug Fix(es): * Previously, the nucn-stans framework was enabled by default in Directory Server, but the framework is not stable. As a consequence, deadlocks and file descriptor leaks could occur. This update changes the default value of the nsslapd-enable-nunc-stans parameter to "off". As a result, Directory Server is now stable. (BZ#1614836) * When a search evaluates the "shadowAccount" entry, Directory Server adds the shadow attributes to the entry. If the fine-grained password policy is enabled, the "shadowAccount" entry can contain its own "pwdpolicysubentry" policy attribute. Previously, to retrieve this attribute, the server started an internal search for each "shadowAccount" entry, which was unnecessary because the entry was already known to the server. With this update, Directory Server only starts internal searches if the entry is not known. As a result, the performance of searches, such as response time and throughput, is improved. (BZ#1615924) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, the 389 server service will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1588056 - CVE-2018-10850 389-ds-base: race condition on reference counter leads to DoS using persistent search 1613606 - CVE-2018-10935 389-ds-base: ldapsearch with server side sort allows users to cause a crash 1614836 - Disable nunc-stans by default [rhel-7.5.z] 1614861 - CVE-2018-10935 389-ds-base: ldapsearch with server side sort crashes the ldap server [rhel-7.5.z] 1615924 - Fine grained password policy can impact search performance [rhel-7.5.z] 1619450 - CVE-2018-14624 389-ds-base: Server crash through modify command with large DN 1623247 - CVE-2018-14624 389-ds-base: Server crash through modify command with large DN [rhel-7.5.z] 1626079 - CVE-2018-14638 389-ds-base: Crash in delete_passwdPolicy when persistent search connections are terminated unexpectedly 6. Package List: Red Hat Enterprise Linux Client Optional (v. 7): Source: 389-ds-base-1.3.7.5-28.el7_5.src.rpm x86_64: 389-ds-base-1.3.7.5-28.el7_5.x86_64.rpm 389-ds-base-debuginfo-1.3.7.5-28.el7_5.x86_64.rpm 389-ds-base-devel-1.3.7.5-28.el7_5.x86_64.rpm 389-ds-base-libs-1.3.7.5-28.el7_5.x86_64.rpm 389-ds-base-snmp-1.3.7.5-28.el7_5.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): Source: 389-ds-base-1.3.
[RHSA-2018:2768-01] Moderate: nss security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 = Red Hat Security Advisory Synopsis: Moderate: nss security update Advisory ID: RHSA-2018:2768-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:2768 Issue date:2018-09-25 CVE Names: CVE-2018-12384 = 1. Summary: An update for nss is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, ppc64le, s390x Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, ppc64le, s390x 3. Description: Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es): * nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello (CVE-2018-12384) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting this issue. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, applications using NSS (for example, Firefox) must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1622089 - CVE-2018-12384 nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: nss-3.36.0-7.el7_5.src.rpm x86_64: nss-3.36.0-7.el7_5.i686.rpm nss-3.36.0-7.el7_5.x86_64.rpm nss-debuginfo-3.36.0-7.el7_5.i686.rpm nss-debuginfo-3.36.0-7.el7_5.x86_64.rpm nss-sysinit-3.36.0-7.el7_5.x86_64.rpm nss-tools-3.36.0-7.el7_5.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: nss-debuginfo-3.36.0-7.el7_5.i686.rpm nss-debuginfo-3.36.0-7.el7_5.x86_64.rpm nss-devel-3.36.0-7.el7_5.i686.rpm nss-devel-3.36.0-7.el7_5.x86_64.rpm nss-pkcs11-devel-3.36.0-7.el7_5.i686.rpm nss-pkcs11-devel-3.36.0-7.el7_5.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: nss-3.36.0-7.el7_5.src.rpm x86_64: nss-3.36.0-7.el7_5.i686.rpm nss-3.36.0-7.el7_5.x86_64.rpm nss-debuginfo-3.36.0-7.el7_5.i686.rpm nss-debuginfo-3.36.0-7.el7_5.x86_64.rpm nss-sysinit-3.36.0-7.el7_5.x86_64.rpm nss-tools-3.36.0-7.el7_5.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: nss-debuginfo-3.36.0-7.el7_5.i686.rpm nss-debuginfo-3.36.0-7.el7_5.x86_64.rpm nss-devel-3.36.0-7.el7_5.i686.rpm nss-devel-3.36.0-7.el7_5.x86_64.rpm nss-pkcs11-devel-3.36.0-7.el7_5.i686.rpm nss-pkcs11-devel-3.36.0-7.el7_5.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: nss-3.36.0-7.el7_5.src.rpm ppc64: nss-3.36.0-7.el7_5.ppc.rpm nss-3.36.0-7.el7_5.ppc64.rpm nss-debuginfo-3.36.0-7.el7_5.ppc.rpm nss-debuginfo-3.36.0-7.el7_5.ppc64.rpm nss-devel-3.36.0-7.el7_5.ppc.rpm nss-devel-3.36.0-7.el7_5.ppc64.rpm nss-sysinit-3.36.0-7.el7_5.ppc64.rpm nss-tools-3.36.0-7.el7_5.ppc64.rpm ppc64le: nss-3.36.0-7.el7_5.ppc64le.rpm nss-debuginfo-3.36.0-7.el7_5.ppc64le.rpm nss-devel-3.36.0-7.el7_5.ppc64le.rpm nss-sysinit-3.36.0-7.el7_5.ppc64le.rpm nss-tools-3.36.0-7.el7_5.ppc64le.rpm s390x: nss-3.36.0-7.el7_5.s390.rpm nss-3.36.0-7.el7_5.s390x.rpm nss-debuginfo-3.36.0-7.el7_5.s390.rpm nss-debuginfo-3.36.0-7.el7_5.s390x.rpm nss-devel-3.36.0-7.el7_5.s390.rpm nss-devel-3.36.0-7.el7_5.s390x.rpm nss-sysinit-3.36.0-7.el7_5.s390x.rpm nss-tools-3.36.0-7.el7_5.s390x.rpm x86_64: nss-3.36.0-7.el7_5.i686.rpm nss-3.36.0-7.el7_5.x86_64.rpm nss-debuginfo-3.36.0-7.el7_5.i686.rpm nss-debuginfo-3.36.0-7.el7_5.x86_64.rpm nss-devel-3.36.0-7.el7_5.i686.rpm nss-devel-3.36.0-7.el7_5.x86_64.rpm nss-sysinit-3.36.0-7.el7_5.x86_64.rpm nss-tools-3.36.0-7.el7_5.x86_64.rpm Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7): Source: nss-3.36.0-7.el7_5.src.r
[RHSA-2018:2791-01] Important: kernel security and bug fix update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 = Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2018:2791-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:2791 Issue date:2018-09-25 CVE Names: CVE-2018-5390 CVE-2018-5391 CVE-2018-10675 = 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 6.4) - noarch, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 6.4) - x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) * A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391) * kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390 and CVE-2018-5391. Bug Fix(es): * After updating the system to prevent the L1 Terminal Fault (L1TF) vulnerability, only one thread was detected on systems that offer processing of two threads on a single processor core. With this update, the "__max_smt_threads()" function has been fixed. As a result, both threads are now detected correctly in the described situation. (BZ#1625330) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1575065 - CVE-2018-10675 kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact 1601704 - CVE-2018-5390 kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack) 1609664 - CVE-2018-5391 kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) 6. Package List: Red Hat Enterprise Linux Server AUS (v. 6.4): Source: kernel-2.6.32-358.93.1.el6.src.rpm noarch: kernel-doc-2.6.32-358.93.1.el6.noarch.rpm kernel-firmware-2.6.32-358.93.1.el6.noarch.rpm x86_64: kernel-2.6.32-358.93.1.el6.x86_64.rpm kernel-debug-2.6.32-358.93.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-358.93.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-358.93.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-358.93.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-358.93.1.el6.x86_64.rpm kernel-devel-2.6.32-358.93.1.el6.x86_64.rpm kernel-headers-2.6.32-358.93.1.el6.x86_64.rpm perf-2.6.32-358.93.1.el6.x86_64.rpm perf-debuginfo-2.6.32-358.93.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-358.93.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 6.4): Source: kernel-2.6.32-358.93.1.el6.src.rpm x86_64: kernel-debug-debuginfo-2.6.32-358.93.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-358.93.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-358.93.1.el6.x86_64.rpm perf-debuginfo-2.6.32-358.93.1.el6.x86_64.rpm python-perf-2.6.32-358.93.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-358.93.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redh
[RHSA-2018:2789-01] Important: kernel-rt security and bug fix update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 = Red Hat Security Advisory Synopsis: Important: kernel-rt security and bug fix update Advisory ID: RHSA-2018:2789-01 Product: Red Hat Enterprise MRG for RHEL-6 Advisory URL: https://access.redhat.com/errata/RHSA-2018:2789 Issue date:2018-09-25 CVE Names: CVE-2018-5390 = 1. Summary: An update for kernel-rt is now available for Red Hat Enterprise MRG 2. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat MRG Realtime for RHEL 6 Server v.2 - noarch, x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting this issue. Bug Fix(es): * The kernel-rt packages have been upgraded to the 3.10.0-693.39.1 source tree, which provides a number of bug fixes over the previous version. (BZ#1616431) * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1618466) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1601704 - CVE-2018-5390 kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack) 1616431 - update the MRG 2.5.z 3.10 kernel-rt sources 1618466 - RT system hang due to wrong of rq's nr_running [MRG-RT] 6. Package List: Red Hat MRG Realtime for RHEL 6 Server v.2: Source: kernel-rt-3.10.0-693.39.1.rt56.629.el6rt.src.rpm noarch: kernel-rt-doc-3.10.0-693.39.1.rt56.629.el6rt.noarch.rpm kernel-rt-firmware-3.10.0-693.39.1.rt56.629.el6rt.noarch.rpm x86_64: kernel-rt-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm kernel-rt-debug-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm kernel-rt-debug-devel-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm kernel-rt-debuginfo-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm kernel-rt-devel-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm kernel-rt-trace-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm kernel-rt-trace-devel-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm kernel-rt-vanilla-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm kernel-rt-vanilla-debuginfo-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm kernel-rt-vanilla-devel-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-5390 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIVAwUBW6qY8tzjgjWX9erEAQjRShAAnmRkv6mo27RSa3mR4eLxu7ropKwD9Zfm YfD67ILqkL5SQc1XGK/q3HAsIrIK3HEvfvzeuBG7Z1HMKZPIfPDZdXD+AjQmsdvG oQumulHt8Ykcx798cCj6d0ZBpzu1se15tfiDlyyaSVscV+yYrGYatZkn1llqVEl5 Ab5sWkE3zHlm9aEWJn4WVluhjbOCb4LuUGyYBkMKpC4uF7bYLGQHG3nJ33YYKx
[RHSA-2018:2790-01] Important: kernel security and bug fix update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 = Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2018:2790-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:2790 Issue date:2018-09-25 CVE Names: CVE-2018-5390 = 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 7.2) - noarch, x86_64 Red Hat Enterprise Linux Server E4S (v. 7.2) - noarch, ppc64le, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 7.2) - x86_64 Red Hat Enterprise Linux Server Optional E4S (v. 7.2) - ppc64le, x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 7.2) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.2) - noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting this issue. Bug Fix(es): * Previously, the early microcode updater in the kernel was trying to perform a microcode update on virtualized guests. As a consequence, the virtualized guests sometimes mishandled the request to perform the microcode update and became unresponsive in the early boot stage. This update applies an upstream patch to avoid the early microcode update when running under a hypervisor. As a result, no kernel freezes appear in the described scenario. (BZ#1618386) 4. Solution: For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1601704 - CVE-2018-5390 kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack) 6. Package List: Red Hat Enterprise Linux Server AUS (v. 7.2): Source: kernel-3.10.0-327.73.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.73.1.el7.noarch.rpm kernel-doc-3.10.0-327.73.1.el7.noarch.rpm x86_64: kernel-3.10.0-327.73.1.el7.x86_64.rpm kernel-debug-3.10.0-327.73.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.73.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.73.1.el7.x86_64.rpm kernel-devel-3.10.0-327.73.1.el7.x86_64.rpm kernel-headers-3.10.0-327.73.1.el7.x86_64.rpm kernel-tools-3.10.0-327.73.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.73.1.el7.x86_64.rpm perf-3.10.0-327.73.1.el7.x86_64.rpm perf-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm python-perf-3.10.0-327.73.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm Red Hat Enterprise Linux Server E4S (v. 7.2): Source: kernel-3.10.0-327.73.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.73.1.el7.noarch.rpm kernel-doc-3.10.0-327.73.1.el7.noarch.rpm ppc64le: kernel-3.10.0-327.73.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-327.73.1.el7.ppc64le.rpm kernel-debug-3.10.0-327.73.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-327.73.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-327.73.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-327.73.1.el7.ppc64le.rpm kernel-devel-3.10.0-327.73.1.el7.ppc64le.rpm kernel-headers-3.10.0-327.73.1.el7.ppc64le.rpm kernel-tools-3.10.0-327.73.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-327.73.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-327.73.1.el7.ppc64le.rpm perf-3.10.0-327.73.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-327.73.1.el7.ppc64le.rpm python-perf-3.10.0-327.73.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-327.73.1.el7.ppc64le.rpm x86_64: kernel-3.10.0-327.73.1.el7.x86_64.rpm kernel-debug-3
[RHSA-2018:2776-01] Important: kernel security and bug fix update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 = Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2018:2776-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:2776 Issue date:2018-09-25 CVE Names: CVE-2018-5390 = 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux ComputeNode EUS (v. 7.4) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.4) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.4) - ppc64, ppc64le, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting this issue. Bug Fix(es): * Previously, making the total buffer size bigger than the memory size for early allocation through the trace_buf_size boot option, made the system become unresponsive at the boot stage. This update introduces a change in the early memory allocation. As a result, the system no longer hangs in the above described scenario. (BZ#1588365) * When inserting objects with the same keys, made the rhlist implementation corrupt the chain pointers. As a consequence, elements were missing on removal and traversal. This patch updates the chain pointers correctly. As a result, there are no missing elements on removal and traversal in the above-described scenario. (BZ#1601008) * Previously, the kernel source code was missing support to report the Speculative Store Bypass Disable (SSBD) vulnerability status on IBM Power Systems and the little-endian variants of IBM Power Systems. As a consequence, the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file incorrectly reported "Not affected" on both CPU architectures. This fix updates the kernel source code to properly report the SSBD status either as "Vulnerable" or "Mitigation: Kernel entry/exit barrier (TYPE)" where TYPE is one of "eieio", "hwsync", "fallback", or "unknown". (BZ#1612352) * Previously, the early microcode updater in the kernel was trying to perform a microcode update on virtualized guests. As a consequence, the virtualized guests sometimes mishandled the request to perform the microcode update and became unresponsive in the early boot stage. This update applies an upstream patch to avoid the early microcode update when running under a hypervisor. As a result, no kernel freezes appear in the described scenario. (BZ#1618389) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1601704 - CVE-2018-5390 kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack) 6. Package List: Red Hat Enterprise Linux ComputeNode EUS (v. 7.4): Source: kernel-3.10.0-693.39.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-693.39.1.el7.noarch.rpm kernel-doc-3.10.0-693.39.1.el7.noarch.rpm x86_64: kernel-3.10.0-693.39.1.el7.x86_64.rpm kernel-debug-3.10.0-693.39.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.39.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.39.1.el7.x86_64.rpm kernel-devel-3.10.0-693.39.1.el7.x86_64.rpm kernel-headers-3.10.0-693.39.1.el7.x86_64.rpm kernel-tools-3.10.0-693.39.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.39.1.el7.x86_64.rpm perf-3.10.0-693.3
[RHSA-2018:2785-01] Important: kernel security and bug fix update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 = Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2018:2785-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:2785 Issue date:2018-09-25 CVE Names: CVE-2018-5390 CVE-2018-5391 CVE-2018-10675 = 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7.3 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux ComputeNode EUS (v. 7.3) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.3) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.3) - ppc64, ppc64le, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) * A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391) * kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390 and CVE-2018-5391. Bug Fix(es): * On systems running Red Hat Enterprise Linux 7 with Red Hat OpenShift Container Platform 3.5, a node sometimes got into "NodeNotReady" state after a CPU softlockup. Consequently, the node was not available. This update fixes an irq latency source in memory compaction. As a result, nodes no longer get into "NodeNotReady" state under the described circumstances. (BZ#1596281) * Previously, the kernel source code was missing support to report the Speculative Store Bypass Disable (SSBD) vulnerability status on IBM Power Systems and the little-endian variants of IBM Power Systems. As a consequence, the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file incorrectly reported "Not affected" on both CPU architectures. This fix updates the kernel source code to properly report the SSBD status either as "Vulnerable" or "Mitigation: Kernel entry/exit barrier (TYPE)" where TYPE is one of "eieio", "hwsync", "fallback", or "unknown". (BZ#1612351) * The hypervisors of Red Hat Enterprise Linux 7 virtual machines (VMs) in certain circumstances mishandled the microcode update in the kernel. As a consequence, the VMs sometimes became unresponsive when booting. This update applies an upstream patch to avoid early microcode update when running under a hypervisor. As a result, kernel hangs no longer occur in the described scenario. (BZ#1618388) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1575065 - CVE-2018-10675 kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact 1601704 - CVE-2018-5390 kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack) 1609664 - CVE-2018-5391 kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) 6. Package List: Red Hat Enterprise Linux ComputeNode EUS (v. 7.3): Source: kernel-3.10.0-514.58.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-514.58.1.el7.noarch.rpm ke
[RHSA-2018:2654-01] Important: OpenShift Container Platform 3.6 security and bug fix update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 = Red Hat Security Advisory Synopsis: Important: OpenShift Container Platform 3.6 security and bug fix update Advisory ID: RHSA-2018:2654-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2018:2654 Issue date:2018-09-26 CVE Names: CVE-2018-14632 = 1. Summary: Red Hat OpenShift Container Platform release 3.6.173.0.130 is now available with updates to packages that fix one security issue and several bugs. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenShift Container Platform 3.6 - noarch, x86_64 3. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 3.6.173.0.130. See the following advisory for the container images for this release: https://access.redhat.com/errata/RHBA-2018:2655 This update fixes the following bug: * atomic-openshift: oc patch with json causes masterapi service crash (CVE-2018-14632) All OpenShift Container Platform 3.6 users are advised to upgrade to these updated packages. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Lars Haugan for reporting this issue. Bug Fix(es): * Retries have been added to shared-resource-viewer update logic avoiding problems with object contention. (BZ#1507119) * Certificate expiry playbook run error (BZ#1509859) * Running metrics playbook for cleanup with Ansible 2.2.3 fails about field 'args' including invalid value (BZ#1550680) 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. See the following documentation, which will be updated shortly for release 3.6.173.0.130, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/3.6/release_notes/ocp_3_6_rel ease_notes.html This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258. 5. Bugs fixed (https://bugzilla.redhat.com/): 1507119 - oc apply and replace terminate upgrades if a resource update is contentious 1509859 - Certificate expiry playbook run error 1550680 - Running metrics playbook for cleanup with Ansible 2.2.3 fails about field 'args' including invalid value 1625885 - CVE-2018-14632 atomic-openshift: oc patch with json causes masterapi service crash 6. Package List: Red Hat OpenShift Container Platform 3.6: Source: atomic-openshift-3.6.173.0.130-1.git.0.8d78a39.el7.src.rpm openshift-ansible-3.6.173.0.130-1.git.0.22ddff9.el7.src.rpm python-paramiko-2.1.1-4.el7.src.rpm noarch: atomic-openshift-docker-excluder-3.6.173.0.130-1.git.0.8d78a39.el7.noarch.rpm atomic-openshift-excluder-3.6.173.0.130-1.git.0.8d78a39.el7.noarch.rpm atomic-openshift-utils-3.6.173.0.130-1.git.0.22ddff9.el7.noarch.rpm openshift-ansible-3.6.173.0.130-1.git.0.22ddff9.el7.noarch.rpm openshift-ansible-callback-plugins-3.6.173.0.130-1.git.0.22ddff9.el7.noarch.rpm openshift-ansible-docs-3.6.173.0.130-1.git.0.22ddff9.el7.noarch.rpm openshift-ansible-filter-plugins-3.6.173.0.130-1.git.0.22ddff9.el7.noarch.rpm openshift-ansible-lookup-plugins-3.6.173.0.130-1.git.0.22ddff9.el7.noarch.rpm openshift-ansible-playbooks-3.6.173.0.130-1.git.0.22ddff9.el7.noarch.rpm openshift-ansible-roles-3.6.173.0.130-1.git.0.22ddff9.el7.noarch.rpm python-paramiko-2.1.1-4.el7.noarch.rpm python-paramiko-doc-2.1.1-4.el7.noarch.rpm x86_64: atomic-openshift-3.6.173.0.130-1.git.0.8d78a39.el7.x86_64.rpm atomic-openshift-clients-3.6.173.0.130-1.git.0.8d78a39.el7.x86_64.rpm atomic-openshift-clients-redistributable-3.6.173.0.130-1.git.0.8d78a39.el7.x86_64.rpm atomic-openshift-cluster-capacity-3.6.173.0.130-1.git.0.8d78a39.el7.x86_64.rpm atomic-openshift-dockerregistry-3.6.173.0.130-1.git.0.8d78a39.el7.x86_64.rpm atomic-openshift-federation-services-3.6.173.0.130-1.git.0.8d78a39.el7.x86_64.rpm atomic-openshift-master-3.6.173.0.130-1.git.0.8d78a39.el7.x86_64.rpm atomic-openshift-node-3.6.173.0.130-1.git.0.8d78a39.el7.x86_64.rpm atomic-openshift-pod-3.6.173.0.130-1.git.0.8d78a39.el7.x86_64.rpm atomic-openshift-sdn-ovs-3.6.173.0.130-1.git.0.8d