Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.871884
Kategorie:Red Hat Local Security Checks
Titel:RedHat Update for kernel RHSA-2017:2473-01
Zusammenfassung:The remote host is missing an update for the 'kernel'; package(s) announced via the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'kernel'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The kernel packages contain the Linux
kernel, the core of any Linux operating system. Security Fix(es): * A race
condition was found in the Linux kernel, present since v3.14-rc1 through v4.12.
The race happens between threads of inotify_handle_event() and vfs_rename()
while running the rename operation against the same file. As a result of the
race the next slab data or the slab's free list pointer can be corrupted with
attacker-controlled data. (CVE-2017-7533, Important) Red Hat would like to thank
Leilei Lin (Alibaba Group), Fan Wu (The University of Hong Kong), and Shixiong
Zhao (The University of Hong Kong) for reporting this issue. Bug Fix(es): *
Previously, direct I/O read operations going past EOF returned an invalid error
number, instead of reading 0 bytes and returning success, if these operations
were in same XFS block with EOF. Consequently, creating multiple VMs from a Red
Hat Enterprise Linux 7.4 template caused all the VMs to become unresponsive in
the 'Image Locked' state. This update fixes the direct I/O feature of the file
system, and VMs created from a Red Hat Enterprise Linux 7.4 template now work as
expected. (BZ#1475669)

Affected Software/OS:
kernel on Red Hat Enterprise Linux Server (v. 7)

Solution:
Please Install the Updated Packages.

CVSS Score:
6.9

CVSS Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2017-7533
100123
http://www.securityfocus.com/bid/100123
1039075
http://www.securitytracker.com/id/1039075
DSA-3927
http://www.debian.org/security/2017/dsa-3927
DSA-3945
http://www.debian.org/security/2017/dsa-3945
RHSA-2017:2473
https://access.redhat.com/errata/RHSA-2017:2473
RHSA-2017:2585
https://access.redhat.com/errata/RHSA-2017:2585
RHSA-2017:2669
https://access.redhat.com/errata/RHSA-2017:2669
RHSA-2017:2770
https://access.redhat.com/errata/RHSA-2017:2770
RHSA-2017:2869
https://access.redhat.com/errata/RHSA-2017:2869
[oss-security] 20190627 Re: linux-distros membership application - Microsoft
http://www.openwall.com/lists/oss-security/2019/06/27/7
[oss-security] 20190628 Re: linux-distros membership application - Microsoft
http://www.openwall.com/lists/oss-security/2019/06/28/1
http://www.openwall.com/lists/oss-security/2019/06/28/2
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=49d31c2f389acfe83417083e1208422b4091cd9e
http://openwall.com/lists/oss-security/2017/08/03/2
https://bugzilla.redhat.com/show_bug.cgi?id=1468283
https://github.com/torvalds/linux/commit/49d31c2f389acfe83417083e1208422b4091cd9e
https://patchwork.kernel.org/patch/9755753/
https://patchwork.kernel.org/patch/9755757/
https://source.android.com/security/bulletin/2017-12-01
https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1408967.html
CopyrightCopyright (C) 2017 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.