[RHSA-2018:2772-01] Important: kernel-alt security and bug fix update

2018-09-25 Thread Security announcements for all Red Hat products and services.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

=
   Red Hat Security Advisory

Synopsis:  Important: kernel-alt security and bug fix update
Advisory ID:   RHSA-2018:2772-01
Product:   Red Hat Enterprise Linux
Advisory URL:  https://access.redhat.com/errata/RHSA-2018:2772
Issue date:2018-09-25
CVE Names: CVE-2017-18202 
=

1. Summary:

An update for kernel-alt is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - 
aarch64, noarch, ppc64le, s390x
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 
7) - aarch64, noarch, ppc64le

3. Description:

The kernel-alt packages provide the Linux kernel version 4.x.

Security Fix(es):

* kernel: Infoleak/use-after-free in __oom_reap_task_mm function in
mm/oom_kill.c (CVE-2017-18202)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Bug Fix(es):

* Previously, on certain little-endian variants of IBM Power Systems, there
was no “sysfs spec_store_bypass” file. As a consequence, there was no way
to indicate the Speculative Store Bypass Disable (SSBD) mitigation status.
This update adds infrastructure code into the kernel to create the
/sys/devices/system/cpu/vulnerabilities/* files. As a result, sysfs
spec_store_bypass shows whether the SSBD mitigation is disabled or enabled.
(BZ#1602340)

* Previously, the kernel architectures for IBM z Systems were missing
support to display the status of the Spectre v2 mitigations. As a
consequence, the /sys/devices/system/cpu/vulnerabilities/spectre_v2 file
did not exist. With this update, the kernel now shows the status in the
above mentioned file and as a result, the file now reports either
"Vulnerable" or "Mitigation: execute trampolines" message. (BZ#1619667)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1549621 - CVE-2017-18202 kernel: Infoleak/use-after-free in __oom_reap_task_mm 
function in mm/oom_kill.c

6. Package List:

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):

Source:
kernel-alt-4.14.0-49.13.1.el7a.src.rpm

aarch64:
kernel-4.14.0-49.13.1.el7a.aarch64.rpm
kernel-debug-4.14.0-49.13.1.el7a.aarch64.rpm
kernel-debug-debuginfo-4.14.0-49.13.1.el7a.aarch64.rpm
kernel-debug-devel-4.14.0-49.13.1.el7a.aarch64.rpm
kernel-debuginfo-4.14.0-49.13.1.el7a.aarch64.rpm
kernel-debuginfo-common-aarch64-4.14.0-49.13.1.el7a.aarch64.rpm
kernel-devel-4.14.0-49.13.1.el7a.aarch64.rpm
kernel-headers-4.14.0-49.13.1.el7a.aarch64.rpm
kernel-tools-4.14.0-49.13.1.el7a.aarch64.rpm
kernel-tools-debuginfo-4.14.0-49.13.1.el7a.aarch64.rpm
kernel-tools-libs-4.14.0-49.13.1.el7a.aarch64.rpm
perf-4.14.0-49.13.1.el7a.aarch64.rpm
perf-debuginfo-4.14.0-49.13.1.el7a.aarch64.rpm
python-perf-4.14.0-49.13.1.el7a.aarch64.rpm
python-perf-debuginfo-4.14.0-49.13.1.el7a.aarch64.rpm

noarch:
kernel-abi-whitelists-4.14.0-49.13.1.el7a.noarch.rpm
kernel-doc-4.14.0-49.13.1.el7a.noarch.rpm

ppc64le:
kernel-4.14.0-49.13.1.el7a.ppc64le.rpm
kernel-bootwrapper-4.14.0-49.13.1.el7a.ppc64le.rpm
kernel-debug-4.14.0-49.13.1.el7a.ppc64le.rpm
kernel-debug-debuginfo-4.14.0-49.13.1.el7a.ppc64le.rpm
kernel-debuginfo-4.14.0-49.13.1.el7a.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.14.0-49.13.1.el7a.ppc64le.rpm
kernel-devel-4.14.0-49.13.1.el7a.ppc64le.rpm
kernel-headers-4.14.0-49.13.1.el7a.ppc64le.rpm
kernel-tools-4.14.0-49.13.1.el7a.ppc64le.rpm
kernel-tools-debuginfo-4.14.0-49.13.1.el7a.ppc64le.rpm
kernel-tools-libs-4.14.0-49.13.1.el7a.ppc64le.rpm
perf-4.14.0-49.13.1.el7a.ppc64le.rpm
perf-debuginfo-4.14.0-49.13.1.el7a.ppc64le.rpm
python-perf-4.14.0-49.13.1.el7a.ppc64le.rpm
python-perf-debuginfo-4.14.0-49.13.1.el7a.ppc64le.rpm

s390x:
kernel-4.14.0-49.13.1.el7a.s390x.rpm
kernel-debug-4.14.0-49.13.1.el7a.s390x.rpm
kernel-debug-debuginfo-4.14.0-49.13.1.el7a.s390x.rpm
kernel-debug-devel-4.14.0-49.13.1.el7a.s390x.rpm
kernel-debuginfo-4.14.0-49.13.1.el7a.s390x.rpm
kernel-debuginfo-common-s390x-4.14.0-49.13.1.el7a.s390x.rpm
kernel-devel-4.14.0-49.13.1.el7a.s390x.rpm
kernel-headers-4.14.0-49.13.1.el7a.s390x.rpm
kernel-kdump-4.14.0-49.13.1.el7a.s390x.rpm
kernel-kdump-debuginfo-4.14.0-49.13.1.el7a.s390x.rpm
kernel-kdump-devel-4.14.0-49.13.1

[RHSA-2018:2762-01] Important: qemu-kvm-ma security update

2018-09-25 Thread Security announcements for all Red Hat products and services.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

=
   Red Hat Security Advisory

Synopsis:  Important: qemu-kvm-ma security update
Advisory ID:   RHSA-2018:2762-01
Product:   Red Hat Enterprise Linux
Advisory URL:  https://access.redhat.com/errata/RHSA-2018:2762
Issue date:2018-09-25
CVE Names: CVE-2018-11806 
=

1. Summary:

An update for qemu-kvm-ma is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - 
ppc64le, s390x
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 
7) - aarch64

3. Description:

Kernel-based Virtual Machine (KVM) is a full virtualization solution for
Linux on a variety of architectures. The qemu-kvm-ma packages provide the
user-space component for running virtual machines that use KVM on the IBM z
Systems, IBM Power, and 64-bit ARM architectures.

Security Fix(es):

* QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams
(CVE-2018-11806)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Red Hat would like to thank Jskz - Zero Day Initiative (trendmicro.com) for
reporting this issue.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1586245 - CVE-2018-11806 QEMU: slirp: heap buffer overflow while reassembling 
fragmented datagrams

6. Package List:

Red Hat Enterprise Linux Server (v. 7):

Source:
qemu-kvm-ma-2.10.0-21.el7_5.4.src.rpm

ppc64:
qemu-img-ma-2.10.0-21.el7_5.4.ppc64.rpm
qemu-kvm-ma-debuginfo-2.10.0-21.el7_5.4.ppc64.rpm

ppc64le:
qemu-img-ma-2.10.0-21.el7_5.4.ppc64le.rpm
qemu-kvm-common-ma-2.10.0-21.el7_5.4.ppc64le.rpm
qemu-kvm-ma-2.10.0-21.el7_5.4.ppc64le.rpm
qemu-kvm-ma-debuginfo-2.10.0-21.el7_5.4.ppc64le.rpm
qemu-kvm-tools-ma-2.10.0-21.el7_5.4.ppc64le.rpm

s390x:
qemu-img-ma-2.10.0-21.el7_5.4.s390x.rpm
qemu-kvm-common-ma-2.10.0-21.el7_5.4.s390x.rpm
qemu-kvm-ma-2.10.0-21.el7_5.4.s390x.rpm
qemu-kvm-ma-debuginfo-2.10.0-21.el7_5.4.s390x.rpm
qemu-kvm-tools-ma-2.10.0-21.el7_5.4.s390x.rpm

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):

Source:
qemu-kvm-ma-2.10.0-21.el7_5.4.src.rpm

ppc64le:
qemu-img-ma-2.10.0-21.el7_5.4.ppc64le.rpm
qemu-kvm-common-ma-2.10.0-21.el7_5.4.ppc64le.rpm
qemu-kvm-ma-2.10.0-21.el7_5.4.ppc64le.rpm
qemu-kvm-ma-debuginfo-2.10.0-21.el7_5.4.ppc64le.rpm
qemu-kvm-tools-ma-2.10.0-21.el7_5.4.ppc64le.rpm

s390x:
qemu-img-ma-2.10.0-21.el7_5.4.s390x.rpm
qemu-kvm-common-ma-2.10.0-21.el7_5.4.s390x.rpm
qemu-kvm-ma-2.10.0-21.el7_5.4.s390x.rpm
qemu-kvm-ma-debuginfo-2.10.0-21.el7_5.4.s390x.rpm
qemu-kvm-tools-ma-2.10.0-21.el7_5.4.s390x.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64:
qemu-kvm-common-ma-2.10.0-21.el7_5.4.ppc64.rpm
qemu-kvm-ma-2.10.0-21.el7_5.4.ppc64.rpm
qemu-kvm-ma-debuginfo-2.10.0-21.el7_5.4.ppc64.rpm
qemu-kvm-tools-ma-2.10.0-21.el7_5.4.ppc64.rpm

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 
7):

Source:
qemu-kvm-ma-2.10.0-21.el7_5.4.src.rpm

aarch64:
qemu-img-ma-2.10.0-21.el7_5.4.aarch64.rpm
qemu-kvm-common-ma-2.10.0-21.el7_5.4.aarch64.rpm
qemu-kvm-ma-2.10.0-21.el7_5.4.aarch64.rpm
qemu-kvm-ma-debuginfo-2.10.0-21.el7_5.4.aarch64.rpm
qemu-kvm-tools-ma-2.10.0-21.el7_5.4.aarch64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-11806
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQIVAwUBW6qH8dzjgjWX9erEAQhXTw/9FodVcxnFjg73ps0FQ8OP3JBXFdQGMsDT
JICJ3EtSORhDEcNb7fbU8isufcfXGSiuLhJ0LaAb/QKYDO2Ji2hVUnn8rJCjUZ1e
FvvIZc6eA+PzM7FWqOZEKHZZLjafnYh3yi2I4ZK0LQr4GobVnvAUGw62iya7Oe6B
nkYUcw8pdqzTWUguPvZh2VtyHJLFxakqNFYCdsdFwbj9hGD2pEJTQGYAUXkhdKn8
YRYoV+u3+bunZBDOogKxnShXU5dNpHkmFFvFevQEDc0fDU1l10vVXe7dwfR03se6
xg/Il+FR7Fqq1HNcm9aZvEHDGbEb4sIOTexSZgvOfgJbKxCW7b6KOtW/OFmvqoB9
q3Qxse8h1Awwz

[RHSA-2018:2766-01] Moderate: flatpak security update

2018-09-25 Thread Security announcements for all Red Hat products and services.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

=
   Red Hat Security Advisory

Synopsis:  Moderate: flatpak security update
Advisory ID:   RHSA-2018:2766-01
Product:   Red Hat Enterprise Linux
Advisory URL:  https://access.redhat.com/errata/RHSA-2018:2766
Issue date:2018-09-25
CVE Names: CVE-2018-6560 
=

1. Summary:

An update for flatpak is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - 
aarch64, ppc64le, s390x
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 
7) - aarch64, ppc64le, s390x

3. Description:

Flatpak is a system for building, distributing, and running sandboxed
desktop applications on Linux.

Security Fix(es):

* flatpak: sandbox escape in D-Bus filtering by a crafted authentication
handshake (CVE-2018-6560)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1542207 - CVE-2018-6560 flatpak: sandbox escape in D-Bus filtering by a crafted 
authentication handshake

6. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source:
flatpak-0.8.8-4.el7_5.src.rpm

x86_64:
flatpak-0.8.8-4.el7_5.x86_64.rpm
flatpak-debuginfo-0.8.8-4.el7_5.x86_64.rpm
flatpak-libs-0.8.8-4.el7_5.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

x86_64:
flatpak-builder-0.8.8-4.el7_5.x86_64.rpm
flatpak-debuginfo-0.8.8-4.el7_5.x86_64.rpm
flatpak-devel-0.8.8-4.el7_5.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source:
flatpak-0.8.8-4.el7_5.src.rpm

ppc64:
flatpak-0.8.8-4.el7_5.ppc64.rpm
flatpak-debuginfo-0.8.8-4.el7_5.ppc64.rpm
flatpak-libs-0.8.8-4.el7_5.ppc64.rpm

ppc64le:
flatpak-0.8.8-4.el7_5.ppc64le.rpm
flatpak-debuginfo-0.8.8-4.el7_5.ppc64le.rpm
flatpak-libs-0.8.8-4.el7_5.ppc64le.rpm

s390x:
flatpak-0.8.8-4.el7_5.s390x.rpm
flatpak-debuginfo-0.8.8-4.el7_5.s390x.rpm
flatpak-libs-0.8.8-4.el7_5.s390x.rpm

x86_64:
flatpak-0.8.8-4.el7_5.x86_64.rpm
flatpak-debuginfo-0.8.8-4.el7_5.x86_64.rpm
flatpak-libs-0.8.8-4.el7_5.x86_64.rpm

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):

Source:
flatpak-0.8.8-4.el7_5.src.rpm

aarch64:
flatpak-0.8.8-4.el7_5.aarch64.rpm
flatpak-debuginfo-0.8.8-4.el7_5.aarch64.rpm
flatpak-libs-0.8.8-4.el7_5.aarch64.rpm

ppc64le:
flatpak-0.8.8-4.el7_5.ppc64le.rpm
flatpak-debuginfo-0.8.8-4.el7_5.ppc64le.rpm
flatpak-libs-0.8.8-4.el7_5.ppc64le.rpm

s390x:
flatpak-0.8.8-4.el7_5.s390x.rpm
flatpak-debuginfo-0.8.8-4.el7_5.s390x.rpm
flatpak-libs-0.8.8-4.el7_5.s390x.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64:
flatpak-builder-0.8.8-4.el7_5.ppc64.rpm
flatpak-debuginfo-0.8.8-4.el7_5.ppc64.rpm
flatpak-devel-0.8.8-4.el7_5.ppc64.rpm

ppc64le:
flatpak-builder-0.8.8-4.el7_5.ppc64le.rpm
flatpak-debuginfo-0.8.8-4.el7_5.ppc64le.rpm
flatpak-devel-0.8.8-4.el7_5.ppc64le.rpm

s390x:
flatpak-builder-0.8.8-4.el7_5.s390x.rpm
flatpak-debuginfo-0.8.8-4.el7_5.s390x.rpm
flatpak-devel-0.8.8-4.el7_5.s390x.rpm

x86_64:
flatpak-builder-0.8.8-4.el7_5.x86_64.rpm
flatpak-debuginfo-0.8.8-4.el7_5.x86_64.rpm
flatpak-devel-0.8.8-4.el7_5.x86_64.rpm

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 
7):

aarch64:
flatpak-builder-0.8.8-4.el7_5.aarch64.rpm
flatpak-debuginfo-0.8.8-4.el7_5.aarch64.rpm
flatpak-devel-0.8.8-4.el7_5.aarch64.rpm

ppc64le:
flatpak-builder-0.8.8-4.el7_5.ppc64le.rpm
flatpak-debuginfo-0.8.8-4.el7_5.ppc64le.rpm
flatpak-devel-0.8.8-4.el7_5.ppc64le.rpm

s390x:
flatpak-builder-0.8.8-4.el7_5.s390x.rpm
flatpak-debuginfo-0.8.8-4.el7_5.s390x.rpm
flatpak-devel-0.8.8-4.el7_5.s390x.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source:
flatpak-0.8.8-4.el7_5.src.rpm

x86_64:
flatpak-0.8.8-4.el7_5.x86_64.rpm
flatpak-debuginfo-0.8.8-4.el7_5.x86_64.rpm
flatpak-libs-0.8.8-4.el7_5.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64:
flatpak-b

[RHSA-2018:2763-01] Important: kernel-rt security and bug fix update

2018-09-25 Thread Security announcements for all Red Hat products and services.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

=
   Red Hat Security Advisory

Synopsis:  Important: kernel-rt security and bug fix update
Advisory ID:   RHSA-2018:2763-01
Product:   Red Hat Enterprise Linux
Advisory URL:  https://access.redhat.com/errata/RHSA-2018:2763
Issue date:2018-09-25
CVE Names: CVE-2018-14634 
=

1. Summary:

An update for kernel-rt is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Realtime (v. 7) - noarch, x86_64
Red Hat Enterprise Linux for Real Time for NFV (v. 7) - noarch, x86_64

3. Description:

The kernel-rt packages provide the Real Time Linux Kernel, which enables
fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: Integer overflow in Linux's create_elf_tables function
(CVE-2018-14634)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Red Hat would like to thank Qualys Research Labs for reporting this issue.

Bug Fix(es):

* The kernel-rt packages have been upgraded to the 3.10.0-862.14.3 source
tree, which provides a number of bug fixes over the previous version.
(BZ#1616429)

* Previously, preemption was enabled too early after a context switch. If a
task was migrated to another CPU after a context switch, a mismatch between
CPU and runqueue during load balancing sometimes occurred. Consequently, a
runnable task on an idle CPU failed to run, and the operating system became
unresponsive. This update disables preemption in the schedule_tail()
function. As a result, CPU migration during post-schedule processing no
longer occurs, which prevents the above mismatch. The operating system no
longer hangs due to this bug. (BZ#1617941)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1616429 - kernel-rt: update to the RHEL7.5.z batch#4 source tree
1617941 - RT system hang due to wrong of rq's nr_running [rhel-7.5.z]
1624498 - CVE-2018-14634 kernel: Integer overflow in Linux's create_elf_tables 
function

6. Package List:

Red Hat Enterprise Linux for Real Time for NFV (v. 7):

Source:
kernel-rt-3.10.0-862.14.4.rt56.821.el7.src.rpm

noarch:
kernel-rt-doc-3.10.0-862.14.4.rt56.821.el7.noarch.rpm

x86_64:
kernel-rt-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm
kernel-rt-debug-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm
kernel-rt-debug-debuginfo-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm
kernel-rt-debug-devel-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm
kernel-rt-debug-kvm-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm
kernel-rt-debug-kvm-debuginfo-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm
kernel-rt-debuginfo-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm
kernel-rt-debuginfo-common-x86_64-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm
kernel-rt-devel-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm
kernel-rt-kvm-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm
kernel-rt-kvm-debuginfo-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm
kernel-rt-trace-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm
kernel-rt-trace-debuginfo-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm
kernel-rt-trace-devel-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm
kernel-rt-trace-kvm-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm
kernel-rt-trace-kvm-debuginfo-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm

Red Hat Enterprise Linux Realtime (v. 7):

Source:
kernel-rt-3.10.0-862.14.4.rt56.821.el7.src.rpm

noarch:
kernel-rt-doc-3.10.0-862.14.4.rt56.821.el7.noarch.rpm

x86_64:
kernel-rt-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm
kernel-rt-debug-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm
kernel-rt-debug-devel-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm
kernel-rt-devel-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm
kernel-rt-trace-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm
kernel-rt-trace-devel-3.10.0-862.14.4.rt56.821.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-14634
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQI

[RHSA-2018:2748-01] Important: kernel security and bug fix update

2018-09-25 Thread Security announcements for all Red Hat products and services.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

=
   Red Hat Security Advisory

Synopsis:  Important: kernel security and bug fix update
Advisory ID:   RHSA-2018:2748-01
Product:   Red Hat Enterprise Linux
Advisory URL:  https://access.redhat.com/errata/RHSA-2018:2748
Issue date:2018-09-25
CVE Names: CVE-2018-14634 
=

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - 
noarch, ppc64le, s390x
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 
7) - noarch, ppc64le

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* kernel: Integer overflow in Linux's create_elf_tables function
(CVE-2018-14634)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Red Hat would like to thank Qualys Research Labs for reporting this issue.

Bug Fix(es):

These updated kernel packages include also numerous bug fixes. Space
precludes documenting all of the bug fixes in this advisory. See the
descriptions in the related Knowledge Article:

https://access.redhat.com/articles/3588731

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1624498 - CVE-2018-14634 kernel: Integer overflow in Linux's create_elf_tables 
function

6. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source:
kernel-3.10.0-862.14.4.el7.src.rpm

noarch:
kernel-abi-whitelists-3.10.0-862.14.4.el7.noarch.rpm
kernel-doc-3.10.0-862.14.4.el7.noarch.rpm

x86_64:
kernel-3.10.0-862.14.4.el7.x86_64.rpm
kernel-debug-3.10.0-862.14.4.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm
kernel-debug-devel-3.10.0-862.14.4.el7.x86_64.rpm
kernel-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-862.14.4.el7.x86_64.rpm
kernel-devel-3.10.0-862.14.4.el7.x86_64.rpm
kernel-headers-3.10.0-862.14.4.el7.x86_64.rpm
kernel-tools-3.10.0-862.14.4.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm
kernel-tools-libs-3.10.0-862.14.4.el7.x86_64.rpm
perf-3.10.0-862.14.4.el7.x86_64.rpm
perf-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm
python-perf-3.10.0-862.14.4.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

x86_64:
kernel-debug-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm
kernel-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-862.14.4.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-862.14.4.el7.x86_64.rpm
perf-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source:
kernel-3.10.0-862.14.4.el7.src.rpm

noarch:
kernel-abi-whitelists-3.10.0-862.14.4.el7.noarch.rpm
kernel-doc-3.10.0-862.14.4.el7.noarch.rpm

x86_64:
kernel-3.10.0-862.14.4.el7.x86_64.rpm
kernel-debug-3.10.0-862.14.4.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm
kernel-debug-devel-3.10.0-862.14.4.el7.x86_64.rpm
kernel-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-862.14.4.el7.x86_64.rpm
kernel-devel-3.10.0-862.14.4.el7.x86_64.rpm
kernel-headers-3.10.0-862.14.4.el7.x86_64.rpm
kernel-tools-3.10.0-862.14.4.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm
kernel-tools-libs-3.10.0-862.14.4.el7.x86_64.rpm
perf-3.10.0-862.14.4.el7.x86_64.rpm
perf-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm
python-perf-3.10.0-862.14.4.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-862.14.4.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v.

[RHSA-2018:2757-01] Moderate: 389-ds-base security and bug fix update

2018-09-25 Thread Security announcements for all Red Hat products and services.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

=
   Red Hat Security Advisory

Synopsis:  Moderate: 389-ds-base security and bug fix update
Advisory ID:   RHSA-2018:2757-01
Product:   Red Hat Enterprise Linux
Advisory URL:  https://access.redhat.com/errata/RHSA-2018:2757
Issue date:2018-09-25
CVE Names: CVE-2018-10850 CVE-2018-10935 CVE-2018-14624 
   CVE-2018-14638 
=

1. Summary:

An update for 389-ds-base is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64le, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - 
aarch64, ppc64le
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 
7) - aarch64, ppc64le, s390x

3. Description:

389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The
base packages include the Lightweight Directory Access Protocol (LDAP)
server and command-line utilities for server administration.

Security Fix(es):

* 389-ds-base: race condition on reference counter leads to DoS using
persistent search (CVE-2018-10850)

* 389-ds-base: ldapsearch with server side sort allows users to cause a
crash (CVE-2018-10935)

* 389-ds-base: Server crash through modify command with large DN
(CVE-2018-14624)

* 389-ds-base: Crash in delete_passwdPolicy when persistent search
connections are terminated unexpectedly (CVE-2018-14638)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

The CVE-2018-10850 issue was discovered by Thierry Bordaz (Red Hat) and the
CVE-2018-14638 issue was discovered by Viktor Ashirov (Red Hat).

Bug Fix(es):

* Previously, the nucn-stans framework was enabled by default in Directory
Server, but the framework is not stable. As a consequence, deadlocks and
file descriptor leaks could occur. This update changes the default value of
the nsslapd-enable-nunc-stans parameter to "off". As a result, Directory
Server is now stable. (BZ#1614836)

* When a search evaluates the "shadowAccount" entry, Directory Server adds
the shadow attributes to the entry. If the fine-grained password policy is
enabled, the "shadowAccount" entry can contain its own "pwdpolicysubentry"
policy attribute. Previously, to retrieve this attribute, the server
started an internal search for each "shadowAccount" entry, which was
unnecessary because the entry was already known to the server. With this
update, Directory Server only starts internal searches if the entry is not
known. As a result, the performance of searches, such as response time and
throughput, is improved. (BZ#1615924)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, the 389 server service will be restarted
automatically.

5. Bugs fixed (https://bugzilla.redhat.com/):

1588056 - CVE-2018-10850 389-ds-base: race condition on reference counter leads 
to DoS using persistent search
1613606 - CVE-2018-10935 389-ds-base: ldapsearch with server side sort allows 
users to cause a crash
1614836 - Disable nunc-stans by default [rhel-7.5.z]
1614861 - CVE-2018-10935 389-ds-base: ldapsearch with server side sort crashes 
the ldap server [rhel-7.5.z]
1615924 - Fine grained password policy can impact search performance 
[rhel-7.5.z]
1619450 - CVE-2018-14624 389-ds-base: Server crash through modify command with 
large DN
1623247 - CVE-2018-14624 389-ds-base: Server crash through modify command with 
large DN [rhel-7.5.z]
1626079 - CVE-2018-14638 389-ds-base: Crash in delete_passwdPolicy when 
persistent search connections are terminated unexpectedly

6. Package List:

Red Hat Enterprise Linux Client Optional (v. 7):

Source:
389-ds-base-1.3.7.5-28.el7_5.src.rpm

x86_64:
389-ds-base-1.3.7.5-28.el7_5.x86_64.rpm
389-ds-base-debuginfo-1.3.7.5-28.el7_5.x86_64.rpm
389-ds-base-devel-1.3.7.5-28.el7_5.x86_64.rpm
389-ds-base-libs-1.3.7.5-28.el7_5.x86_64.rpm
389-ds-base-snmp-1.3.7.5-28.el7_5.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

Source:
389-ds-base-1.3.

[RHSA-2018:2768-01] Moderate: nss security update

2018-09-25 Thread Security announcements for all Red Hat products and services.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

=
   Red Hat Security Advisory

Synopsis:  Moderate: nss security update
Advisory ID:   RHSA-2018:2768-01
Product:   Red Hat Enterprise Linux
Advisory URL:  https://access.redhat.com/errata/RHSA-2018:2768
Issue date:2018-09-25
CVE Names: CVE-2018-12384 
=

1. Summary:

An update for nss is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - 
aarch64, ppc64le, s390x
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 
7) - aarch64, ppc64le, s390x

3. Description:

Network Security Services (NSS) is a set of libraries designed to support
the cross-platform development of security-enabled client and server
applications.

Security Fix(es):

* nss: ServerHello.random is all zeros when handling a v2-compatible
ClientHello (CVE-2018-12384)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Red Hat would like to thank the Mozilla project for reporting this issue.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, applications using NSS (for example, Firefox)
must be restarted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1622089 - CVE-2018-12384 nss: ServerHello.random is all zeros when handling a 
v2-compatible ClientHello

6. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source:
nss-3.36.0-7.el7_5.src.rpm

x86_64:
nss-3.36.0-7.el7_5.i686.rpm
nss-3.36.0-7.el7_5.x86_64.rpm
nss-debuginfo-3.36.0-7.el7_5.i686.rpm
nss-debuginfo-3.36.0-7.el7_5.x86_64.rpm
nss-sysinit-3.36.0-7.el7_5.x86_64.rpm
nss-tools-3.36.0-7.el7_5.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

x86_64:
nss-debuginfo-3.36.0-7.el7_5.i686.rpm
nss-debuginfo-3.36.0-7.el7_5.x86_64.rpm
nss-devel-3.36.0-7.el7_5.i686.rpm
nss-devel-3.36.0-7.el7_5.x86_64.rpm
nss-pkcs11-devel-3.36.0-7.el7_5.i686.rpm
nss-pkcs11-devel-3.36.0-7.el7_5.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source:
nss-3.36.0-7.el7_5.src.rpm

x86_64:
nss-3.36.0-7.el7_5.i686.rpm
nss-3.36.0-7.el7_5.x86_64.rpm
nss-debuginfo-3.36.0-7.el7_5.i686.rpm
nss-debuginfo-3.36.0-7.el7_5.x86_64.rpm
nss-sysinit-3.36.0-7.el7_5.x86_64.rpm
nss-tools-3.36.0-7.el7_5.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

x86_64:
nss-debuginfo-3.36.0-7.el7_5.i686.rpm
nss-debuginfo-3.36.0-7.el7_5.x86_64.rpm
nss-devel-3.36.0-7.el7_5.i686.rpm
nss-devel-3.36.0-7.el7_5.x86_64.rpm
nss-pkcs11-devel-3.36.0-7.el7_5.i686.rpm
nss-pkcs11-devel-3.36.0-7.el7_5.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source:
nss-3.36.0-7.el7_5.src.rpm

ppc64:
nss-3.36.0-7.el7_5.ppc.rpm
nss-3.36.0-7.el7_5.ppc64.rpm
nss-debuginfo-3.36.0-7.el7_5.ppc.rpm
nss-debuginfo-3.36.0-7.el7_5.ppc64.rpm
nss-devel-3.36.0-7.el7_5.ppc.rpm
nss-devel-3.36.0-7.el7_5.ppc64.rpm
nss-sysinit-3.36.0-7.el7_5.ppc64.rpm
nss-tools-3.36.0-7.el7_5.ppc64.rpm

ppc64le:
nss-3.36.0-7.el7_5.ppc64le.rpm
nss-debuginfo-3.36.0-7.el7_5.ppc64le.rpm
nss-devel-3.36.0-7.el7_5.ppc64le.rpm
nss-sysinit-3.36.0-7.el7_5.ppc64le.rpm
nss-tools-3.36.0-7.el7_5.ppc64le.rpm

s390x:
nss-3.36.0-7.el7_5.s390.rpm
nss-3.36.0-7.el7_5.s390x.rpm
nss-debuginfo-3.36.0-7.el7_5.s390.rpm
nss-debuginfo-3.36.0-7.el7_5.s390x.rpm
nss-devel-3.36.0-7.el7_5.s390.rpm
nss-devel-3.36.0-7.el7_5.s390x.rpm
nss-sysinit-3.36.0-7.el7_5.s390x.rpm
nss-tools-3.36.0-7.el7_5.s390x.rpm

x86_64:
nss-3.36.0-7.el7_5.i686.rpm
nss-3.36.0-7.el7_5.x86_64.rpm
nss-debuginfo-3.36.0-7.el7_5.i686.rpm
nss-debuginfo-3.36.0-7.el7_5.x86_64.rpm
nss-devel-3.36.0-7.el7_5.i686.rpm
nss-devel-3.36.0-7.el7_5.x86_64.rpm
nss-sysinit-3.36.0-7.el7_5.x86_64.rpm
nss-tools-3.36.0-7.el7_5.x86_64.rpm

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):

Source:
nss-3.36.0-7.el7_5.src.r

[RHSA-2018:2791-01] Important: kernel security and bug fix update

2018-09-25 Thread Security announcements for all Red Hat products and services.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

=
   Red Hat Security Advisory

Synopsis:  Important: kernel security and bug fix update
Advisory ID:   RHSA-2018:2791-01
Product:   Red Hat Enterprise Linux
Advisory URL:  https://access.redhat.com/errata/RHSA-2018:2791
Issue date:2018-09-25
CVE Names: CVE-2018-5390 CVE-2018-5391 CVE-2018-10675 
=

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 6.4
Advanced Update Support.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Server AUS (v. 6.4) - noarch, x86_64
Red Hat Enterprise Linux Server Optional AUS (v. 6.4) - x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* A flaw named SegmentSmack was found in the way the Linux kernel handled
specially crafted TCP packets. A remote attacker could use this flaw to
trigger time and calculation expensive calls to tcp_collapse_ofo_queue()
and tcp_prune_ofo_queue() functions by sending specially modified packets
within ongoing TCP sessions which could lead to a CPU saturation and hence
a denial of service on the system. Maintaining the denial of service
condition requires continuous two-way TCP sessions to a reachable open
port, thus the attacks cannot be performed using spoofed IP addresses.
(CVE-2018-5390)

* A flaw named FragmentSmack was found in the way the Linux kernel handled
reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use
this flaw to trigger time and calculation expensive fragment reassembly
algorithm by sending specially crafted packets which could lead to a CPU
saturation and hence a denial of service on the system. (CVE-2018-5391)

* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS
or other unspecified impact (CVE-2018-10675)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department
of Communications and Networking and Nokia Bell Labs) for reporting
CVE-2018-5390 and CVE-2018-5391.

Bug Fix(es):

* After updating the system to prevent the L1 Terminal Fault (L1TF)
vulnerability, only one thread was detected on systems that offer
processing of two threads on a single processor core. With this update, the
"__max_smt_threads()" function has been fixed. As a result, both threads
are now detected correctly in the described situation. (BZ#1625330)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1575065 - CVE-2018-10675 kernel: mm: use-after-free in do_get_mempolicy 
function allows local DoS or other unspecified impact
1601704 - CVE-2018-5390 kernel: TCP segments with random offsets allow a remote 
denial of service (SegmentSmack)
1609664 - CVE-2018-5391 kernel: IP fragments with random offsets allow a remote 
denial of service (FragmentSmack)

6. Package List:

Red Hat Enterprise Linux Server AUS (v. 6.4):

Source:
kernel-2.6.32-358.93.1.el6.src.rpm

noarch:
kernel-doc-2.6.32-358.93.1.el6.noarch.rpm
kernel-firmware-2.6.32-358.93.1.el6.noarch.rpm

x86_64:
kernel-2.6.32-358.93.1.el6.x86_64.rpm
kernel-debug-2.6.32-358.93.1.el6.x86_64.rpm
kernel-debug-debuginfo-2.6.32-358.93.1.el6.x86_64.rpm
kernel-debug-devel-2.6.32-358.93.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-358.93.1.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-358.93.1.el6.x86_64.rpm
kernel-devel-2.6.32-358.93.1.el6.x86_64.rpm
kernel-headers-2.6.32-358.93.1.el6.x86_64.rpm
perf-2.6.32-358.93.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-358.93.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-358.93.1.el6.x86_64.rpm

Red Hat Enterprise Linux Server Optional AUS (v. 6.4):

Source:
kernel-2.6.32-358.93.1.el6.src.rpm

x86_64:
kernel-debug-debuginfo-2.6.32-358.93.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-358.93.1.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-358.93.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-358.93.1.el6.x86_64.rpm
python-perf-2.6.32-358.93.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-358.93.1.el6.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redh

[RHSA-2018:2789-01] Important: kernel-rt security and bug fix update

2018-09-25 Thread Security announcements for all Red Hat products and services.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

=
   Red Hat Security Advisory

Synopsis:  Important: kernel-rt security and bug fix update
Advisory ID:   RHSA-2018:2789-01
Product:   Red Hat Enterprise MRG for RHEL-6
Advisory URL:  https://access.redhat.com/errata/RHSA-2018:2789
Issue date:2018-09-25
CVE Names: CVE-2018-5390 
=

1. Summary:

An update for kernel-rt is now available for Red Hat Enterprise MRG 2.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat MRG Realtime for RHEL 6 Server v.2 - noarch, x86_64

3. Description:

The kernel-rt packages provide the Real Time Linux Kernel, which enables
fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* A flaw named SegmentSmack was found in the way the Linux kernel handled
specially crafted TCP packets. A remote attacker could use this flaw to
trigger time and calculation expensive calls to tcp_collapse_ofo_queue()
and tcp_prune_ofo_queue() functions by sending specially modified packets
within ongoing TCP sessions which could lead to a CPU saturation and hence
a denial of service on the system. Maintaining the denial of service
condition requires continuous two-way TCP sessions to a reachable open
port, thus the attacks cannot be performed using spoofed IP addresses.
(CVE-2018-5390)

Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department
of Communications and Networking and Nokia Bell Labs) for reporting this
issue.

Bug Fix(es):

* The kernel-rt packages have been upgraded to the 3.10.0-693.39.1 source
tree, which provides a number of bug fixes over the previous version.
(BZ#1616431)

* Previously, preemption was enabled too early after a context switch. If a
task was migrated to another CPU after a context switch, a mismatch between
CPU and runqueue during load balancing sometimes occurred. Consequently, a
runnable task on an idle CPU failed to run, and the operating system became
unresponsive. This update disables preemption in the schedule_tail()
function. As a result, CPU migration during post-schedule processing no
longer occurs, which prevents the above mismatch. The operating system no
longer hangs due to this bug. (BZ#1618466)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1601704 - CVE-2018-5390 kernel: TCP segments with random offsets allow a remote 
denial of service (SegmentSmack)
1616431 - update the MRG 2.5.z 3.10 kernel-rt sources
1618466 - RT system hang due to wrong of rq's nr_running [MRG-RT]

6. Package List:

Red Hat MRG Realtime for RHEL 6 Server v.2:

Source:
kernel-rt-3.10.0-693.39.1.rt56.629.el6rt.src.rpm

noarch:
kernel-rt-doc-3.10.0-693.39.1.rt56.629.el6rt.noarch.rpm
kernel-rt-firmware-3.10.0-693.39.1.rt56.629.el6rt.noarch.rpm

x86_64:
kernel-rt-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm
kernel-rt-debug-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm
kernel-rt-debug-debuginfo-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm
kernel-rt-debug-devel-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm
kernel-rt-debuginfo-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm
kernel-rt-debuginfo-common-x86_64-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm
kernel-rt-devel-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm
kernel-rt-trace-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm
kernel-rt-trace-debuginfo-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm
kernel-rt-trace-devel-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm
kernel-rt-vanilla-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm
kernel-rt-vanilla-debuginfo-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm
kernel-rt-vanilla-devel-3.10.0-693.39.1.rt56.629.el6rt.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-5390
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQIVAwUBW6qY8tzjgjWX9erEAQjRShAAnmRkv6mo27RSa3mR4eLxu7ropKwD9Zfm
YfD67ILqkL5SQc1XGK/q3HAsIrIK3HEvfvzeuBG7Z1HMKZPIfPDZdXD+AjQmsdvG
oQumulHt8Ykcx798cCj6d0ZBpzu1se15tfiDlyyaSVscV+yYrGYatZkn1llqVEl5
Ab5sWkE3zHlm9aEWJn4WVluhjbOCb4LuUGyYBkMKpC4uF7bYLGQHG3nJ33YYKx

[RHSA-2018:2790-01] Important: kernel security and bug fix update

2018-09-25 Thread Security announcements for all Red Hat products and services.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

=
   Red Hat Security Advisory

Synopsis:  Important: kernel security and bug fix update
Advisory ID:   RHSA-2018:2790-01
Product:   Red Hat Enterprise Linux
Advisory URL:  https://access.redhat.com/errata/RHSA-2018:2790
Issue date:2018-09-25
CVE Names: CVE-2018-5390 
=

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 7.2
Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update
Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP
Solutions.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Server AUS (v. 7.2) - noarch, x86_64
Red Hat Enterprise Linux Server E4S (v. 7.2) - noarch, ppc64le, x86_64
Red Hat Enterprise Linux Server Optional AUS (v. 7.2) - x86_64
Red Hat Enterprise Linux Server Optional E4S (v. 7.2) - ppc64le, x86_64
Red Hat Enterprise Linux Server Optional TUS (v. 7.2) - x86_64
Red Hat Enterprise Linux Server TUS (v. 7.2) - noarch, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* A flaw named SegmentSmack was found in the way the Linux kernel handled
specially crafted TCP packets. A remote attacker could use this flaw to
trigger time and calculation expensive calls to tcp_collapse_ofo_queue()
and tcp_prune_ofo_queue() functions by sending specially modified packets
within ongoing TCP sessions which could lead to a CPU saturation and hence
a denial of service on the system. Maintaining the denial of service
condition requires continuous two-way TCP sessions to a reachable open
port, thus the attacks cannot be performed using spoofed IP addresses.
(CVE-2018-5390)

Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department
of Communications and Networking and Nokia Bell Labs) for reporting this
issue.

Bug Fix(es):

* Previously, the early microcode updater in the kernel was trying to
perform a microcode update on virtualized guests. As a consequence, the
virtualized guests sometimes mishandled the request to perform the
microcode update and became unresponsive in the early boot stage. This
update applies an upstream patch to avoid the early microcode update when
running under a hypervisor. As a result, no kernel freezes appear in the
described scenario. (BZ#1618386)

4. Solution:

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1601704 - CVE-2018-5390 kernel: TCP segments with random offsets allow a remote 
denial of service (SegmentSmack)

6. Package List:

Red Hat Enterprise Linux Server AUS (v. 7.2):

Source:
kernel-3.10.0-327.73.1.el7.src.rpm

noarch:
kernel-abi-whitelists-3.10.0-327.73.1.el7.noarch.rpm
kernel-doc-3.10.0-327.73.1.el7.noarch.rpm

x86_64:
kernel-3.10.0-327.73.1.el7.x86_64.rpm
kernel-debug-3.10.0-327.73.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-327.73.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-327.73.1.el7.x86_64.rpm
kernel-devel-3.10.0-327.73.1.el7.x86_64.rpm
kernel-headers-3.10.0-327.73.1.el7.x86_64.rpm
kernel-tools-3.10.0-327.73.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-327.73.1.el7.x86_64.rpm
perf-3.10.0-327.73.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm
python-perf-3.10.0-327.73.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-327.73.1.el7.x86_64.rpm

Red Hat Enterprise Linux Server E4S (v. 7.2):

Source:
kernel-3.10.0-327.73.1.el7.src.rpm

noarch:
kernel-abi-whitelists-3.10.0-327.73.1.el7.noarch.rpm
kernel-doc-3.10.0-327.73.1.el7.noarch.rpm

ppc64le:
kernel-3.10.0-327.73.1.el7.ppc64le.rpm
kernel-bootwrapper-3.10.0-327.73.1.el7.ppc64le.rpm
kernel-debug-3.10.0-327.73.1.el7.ppc64le.rpm
kernel-debug-debuginfo-3.10.0-327.73.1.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-327.73.1.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-327.73.1.el7.ppc64le.rpm
kernel-devel-3.10.0-327.73.1.el7.ppc64le.rpm
kernel-headers-3.10.0-327.73.1.el7.ppc64le.rpm
kernel-tools-3.10.0-327.73.1.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-327.73.1.el7.ppc64le.rpm
kernel-tools-libs-3.10.0-327.73.1.el7.ppc64le.rpm
perf-3.10.0-327.73.1.el7.ppc64le.rpm
perf-debuginfo-3.10.0-327.73.1.el7.ppc64le.rpm
python-perf-3.10.0-327.73.1.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-327.73.1.el7.ppc64le.rpm

x86_64:
kernel-3.10.0-327.73.1.el7.x86_64.rpm
kernel-debug-3

[RHSA-2018:2776-01] Important: kernel security and bug fix update

2018-09-25 Thread Security announcements for all Red Hat products and services.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

=
   Red Hat Security Advisory

Synopsis:  Important: kernel security and bug fix update
Advisory ID:   RHSA-2018:2776-01
Product:   Red Hat Enterprise Linux
Advisory URL:  https://access.redhat.com/errata/RHSA-2018:2776
Issue date:2018-09-25
CVE Names: CVE-2018-5390 
=

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 7.4
Extended Update Support.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux ComputeNode EUS (v. 7.4) - noarch, x86_64
Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4) - x86_64
Red Hat Enterprise Linux Server EUS (v. 7.4) - noarch, ppc64, ppc64le, s390x, 
x86_64
Red Hat Enterprise Linux Server Optional EUS (v. 7.4) - ppc64, ppc64le, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* A flaw named SegmentSmack was found in the way the Linux kernel handled
specially crafted TCP packets. A remote attacker could use this flaw to
trigger time and calculation expensive calls to tcp_collapse_ofo_queue()
and tcp_prune_ofo_queue() functions by sending specially modified packets
within ongoing TCP sessions which could lead to a CPU saturation and hence
a denial of service on the system. Maintaining the denial of service
condition requires continuous two-way TCP sessions to a reachable open
port, thus the attacks cannot be performed using spoofed IP addresses.
(CVE-2018-5390)

Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department
of Communications and Networking and Nokia Bell Labs) for reporting this
issue.

Bug Fix(es):

* Previously, making the total buffer size bigger than the memory size for
early allocation through the trace_buf_size boot option, made the system
become unresponsive at the boot stage. This update introduces a change in
the early memory allocation. As a result, the system no longer hangs in the
above described scenario. (BZ#1588365)

* When inserting objects with the same keys, made the rhlist implementation
corrupt the chain pointers. As a consequence, elements were missing on
removal and traversal. This patch updates the chain pointers correctly. As
a result, there are no missing elements on removal and traversal in the
above-described scenario. (BZ#1601008)

* Previously, the kernel source code was missing support to report the
Speculative Store Bypass Disable (SSBD) vulnerability status on IBM Power
Systems and the little-endian variants of IBM Power Systems. As a
consequence, the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass
file incorrectly reported "Not affected" on both CPU architectures. This
fix updates the kernel source code to properly report the SSBD status
either as "Vulnerable" or "Mitigation: Kernel entry/exit barrier (TYPE)"
where TYPE is one of "eieio", "hwsync", "fallback", or "unknown".
(BZ#1612352)

* Previously, the early microcode updater in the kernel was trying to
perform a microcode update on virtualized guests. As a consequence, the
virtualized guests sometimes mishandled the request to perform the
microcode update and became unresponsive in the early boot stage. This
update applies an upstream patch to avoid the early microcode update when
running under a hypervisor. As a result, no kernel freezes appear in the
described scenario. (BZ#1618389)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1601704 - CVE-2018-5390 kernel: TCP segments with random offsets allow a remote 
denial of service (SegmentSmack)

6. Package List:

Red Hat Enterprise Linux ComputeNode EUS (v. 7.4):

Source:
kernel-3.10.0-693.39.1.el7.src.rpm

noarch:
kernel-abi-whitelists-3.10.0-693.39.1.el7.noarch.rpm
kernel-doc-3.10.0-693.39.1.el7.noarch.rpm

x86_64:
kernel-3.10.0-693.39.1.el7.x86_64.rpm
kernel-debug-3.10.0-693.39.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-693.39.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-693.39.1.el7.x86_64.rpm
kernel-devel-3.10.0-693.39.1.el7.x86_64.rpm
kernel-headers-3.10.0-693.39.1.el7.x86_64.rpm
kernel-tools-3.10.0-693.39.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-693.39.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-693.39.1.el7.x86_64.rpm
perf-3.10.0-693.3

[RHSA-2018:2785-01] Important: kernel security and bug fix update

2018-09-25 Thread Security announcements for all Red Hat products and services.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

=
   Red Hat Security Advisory

Synopsis:  Important: kernel security and bug fix update
Advisory ID:   RHSA-2018:2785-01
Product:   Red Hat Enterprise Linux
Advisory URL:  https://access.redhat.com/errata/RHSA-2018:2785
Issue date:2018-09-25
CVE Names: CVE-2018-5390 CVE-2018-5391 CVE-2018-10675 
=

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 7.3
Extended Update Support.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux ComputeNode EUS (v. 7.3) - noarch, x86_64
Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3) - x86_64
Red Hat Enterprise Linux Server EUS (v. 7.3) - noarch, ppc64, ppc64le, s390x, 
x86_64
Red Hat Enterprise Linux Server Optional EUS (v. 7.3) - ppc64, ppc64le, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* A flaw named SegmentSmack was found in the way the Linux kernel handled
specially crafted TCP packets. A remote attacker could use this flaw to
trigger time and calculation expensive calls to tcp_collapse_ofo_queue()
and tcp_prune_ofo_queue() functions by sending specially modified packets
within ongoing TCP sessions which could lead to a CPU saturation and hence
a denial of service on the system. Maintaining the denial of service
condition requires continuous two-way TCP sessions to a reachable open
port, thus the attacks cannot be performed using spoofed IP addresses.
(CVE-2018-5390)

* A flaw named FragmentSmack was found in the way the Linux kernel handled
reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use
this flaw to trigger time and calculation expensive fragment reassembly
algorithm by sending specially crafted packets which could lead to a CPU
saturation and hence a denial of service on the system. (CVE-2018-5391)

* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS
or other unspecified impact (CVE-2018-10675)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department
of Communications and Networking and Nokia Bell Labs) for reporting
CVE-2018-5390 and CVE-2018-5391.

Bug Fix(es):

* On systems running Red Hat Enterprise Linux 7 with Red Hat OpenShift
Container Platform 3.5, a node sometimes got into "NodeNotReady" state
after a CPU softlockup. Consequently, the node was not available. This
update fixes an irq latency source in memory compaction. As a result, nodes
no longer get into "NodeNotReady" state under the described circumstances.
(BZ#1596281)

* Previously, the kernel source code was missing support to report the
Speculative Store Bypass Disable (SSBD) vulnerability status on IBM Power
Systems and the little-endian variants of IBM Power Systems. As a
consequence, the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass
file incorrectly reported "Not affected" on both CPU architectures. This
fix updates the kernel source code to properly report the SSBD status
either as "Vulnerable" or "Mitigation: Kernel entry/exit barrier (TYPE)"
where TYPE is one of "eieio", "hwsync", "fallback", or "unknown".
(BZ#1612351)

* The hypervisors of Red Hat Enterprise Linux 7 virtual machines (VMs) in
certain circumstances mishandled the microcode update in the kernel. As a
consequence, the VMs sometimes became unresponsive when booting. This
update applies an upstream patch to avoid early microcode update when
running under a hypervisor. As a result, kernel hangs no longer occur in
the described scenario. (BZ#1618388)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1575065 - CVE-2018-10675 kernel: mm: use-after-free in do_get_mempolicy 
function allows local DoS or other unspecified impact
1601704 - CVE-2018-5390 kernel: TCP segments with random offsets allow a remote 
denial of service (SegmentSmack)
1609664 - CVE-2018-5391 kernel: IP fragments with random offsets allow a remote 
denial of service (FragmentSmack)

6. Package List:

Red Hat Enterprise Linux ComputeNode EUS (v. 7.3):

Source:
kernel-3.10.0-514.58.1.el7.src.rpm

noarch:
kernel-abi-whitelists-3.10.0-514.58.1.el7.noarch.rpm
ke

[RHSA-2018:2654-01] Important: OpenShift Container Platform 3.6 security and bug fix update

2018-09-25 Thread Security announcements for all Red Hat products and services.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

=
   Red Hat Security Advisory

Synopsis:  Important: OpenShift Container Platform 3.6 security and bug 
fix update
Advisory ID:   RHSA-2018:2654-01
Product:   Red Hat OpenShift Enterprise
Advisory URL:  https://access.redhat.com/errata/RHSA-2018:2654
Issue date:2018-09-26
CVE Names: CVE-2018-14632 
=

1. Summary:

Red Hat OpenShift Container Platform release 3.6.173.0.130 is now available
with updates to packages that fix one security issue and several bugs.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat OpenShift Container Platform 3.6 - noarch, x86_64

3. Description:

Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 3.6.173.0.130. See the following advisory for the container images
for this release:

https://access.redhat.com/errata/RHBA-2018:2655

This update fixes the following bug:

* atomic-openshift: oc patch with json causes masterapi service crash
(CVE-2018-14632)

All OpenShift Container Platform 3.6 users are advised to upgrade to these
updated packages.

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Red Hat would like to thank Lars Haugan for reporting this issue.

Bug Fix(es):
 
* Retries have been added to shared-resource-viewer update
logic avoiding problems with object contention. (BZ#1507119)
 
* Certificate expiry playbook run error (BZ#1509859)

* Running metrics playbook for cleanup with Ansible 2.2.3 fails about field
'args' including invalid value (BZ#1550680)

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

See the following documentation, which will be updated shortly for release
3.6.173.0.130, for important instructions on how to upgrade your cluster
and fully apply this asynchronous errata update:

https://docs.openshift.com/container-platform/3.6/release_notes/ocp_3_6_rel
ease_notes.html

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258.

5. Bugs fixed (https://bugzilla.redhat.com/):

1507119 - oc apply and replace terminate upgrades if a resource update is 
contentious
1509859 - Certificate expiry playbook run error
1550680 - Running metrics playbook for cleanup with Ansible 2.2.3 fails about 
field 'args' including invalid value
1625885 - CVE-2018-14632 atomic-openshift: oc patch with json causes masterapi 
service crash

6. Package List:

Red Hat OpenShift Container Platform 3.6:

Source:
atomic-openshift-3.6.173.0.130-1.git.0.8d78a39.el7.src.rpm
openshift-ansible-3.6.173.0.130-1.git.0.22ddff9.el7.src.rpm
python-paramiko-2.1.1-4.el7.src.rpm

noarch:
atomic-openshift-docker-excluder-3.6.173.0.130-1.git.0.8d78a39.el7.noarch.rpm
atomic-openshift-excluder-3.6.173.0.130-1.git.0.8d78a39.el7.noarch.rpm
atomic-openshift-utils-3.6.173.0.130-1.git.0.22ddff9.el7.noarch.rpm
openshift-ansible-3.6.173.0.130-1.git.0.22ddff9.el7.noarch.rpm
openshift-ansible-callback-plugins-3.6.173.0.130-1.git.0.22ddff9.el7.noarch.rpm
openshift-ansible-docs-3.6.173.0.130-1.git.0.22ddff9.el7.noarch.rpm
openshift-ansible-filter-plugins-3.6.173.0.130-1.git.0.22ddff9.el7.noarch.rpm
openshift-ansible-lookup-plugins-3.6.173.0.130-1.git.0.22ddff9.el7.noarch.rpm
openshift-ansible-playbooks-3.6.173.0.130-1.git.0.22ddff9.el7.noarch.rpm
openshift-ansible-roles-3.6.173.0.130-1.git.0.22ddff9.el7.noarch.rpm
python-paramiko-2.1.1-4.el7.noarch.rpm
python-paramiko-doc-2.1.1-4.el7.noarch.rpm

x86_64:
atomic-openshift-3.6.173.0.130-1.git.0.8d78a39.el7.x86_64.rpm
atomic-openshift-clients-3.6.173.0.130-1.git.0.8d78a39.el7.x86_64.rpm
atomic-openshift-clients-redistributable-3.6.173.0.130-1.git.0.8d78a39.el7.x86_64.rpm
atomic-openshift-cluster-capacity-3.6.173.0.130-1.git.0.8d78a39.el7.x86_64.rpm
atomic-openshift-dockerregistry-3.6.173.0.130-1.git.0.8d78a39.el7.x86_64.rpm
atomic-openshift-federation-services-3.6.173.0.130-1.git.0.8d78a39.el7.x86_64.rpm
atomic-openshift-master-3.6.173.0.130-1.git.0.8d78a39.el7.x86_64.rpm
atomic-openshift-node-3.6.173.0.130-1.git.0.8d78a39.el7.x86_64.rpm
atomic-openshift-pod-3.6.173.0.130-1.git.0.8d78a39.el7.x86_64.rpm
atomic-openshift-sdn-ovs-3.6.173.0.130-1.git.0.8d