![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.871884 |
Kategorie: | Red Hat Local Security Checks |
Titel: | RedHat Update for kernel RHSA-2017:2473-01 |
Zusammenfassung: | The remote host is missing an update for the 'kernel'; package(s) announced via the referenced advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'kernel' package(s) announced via the referenced advisory. Vulnerability Insight: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A race condition was found in the Linux kernel, present since v3.14-rc1 through v4.12. The race happens between threads of inotify_handle_event() and vfs_rename() while running the rename operation against the same file. As a result of the race the next slab data or the slab's free list pointer can be corrupted with attacker-controlled data. (CVE-2017-7533, Important) Red Hat would like to thank Leilei Lin (Alibaba Group), Fan Wu (The University of Hong Kong), and Shixiong Zhao (The University of Hong Kong) for reporting this issue. Bug Fix(es): * Previously, direct I/O read operations going past EOF returned an invalid error number, instead of reading 0 bytes and returning success, if these operations were in same XFS block with EOF. Consequently, creating multiple VMs from a Red Hat Enterprise Linux 7.4 template caused all the VMs to become unresponsive in the 'Image Locked' state. This update fixes the direct I/O feature of the file system, and VMs created from a Red Hat Enterprise Linux 7.4 template now work as expected. (BZ#1475669) Affected Software/OS: kernel on Red Hat Enterprise Linux Server (v. 7) Solution: Please Install the Updated Packages. CVSS Score: 6.9 CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-7533 100123 http://www.securityfocus.com/bid/100123 1039075 http://www.securitytracker.com/id/1039075 DSA-3927 http://www.debian.org/security/2017/dsa-3927 DSA-3945 http://www.debian.org/security/2017/dsa-3945 RHSA-2017:2473 https://access.redhat.com/errata/RHSA-2017:2473 RHSA-2017:2585 https://access.redhat.com/errata/RHSA-2017:2585 RHSA-2017:2669 https://access.redhat.com/errata/RHSA-2017:2669 RHSA-2017:2770 https://access.redhat.com/errata/RHSA-2017:2770 RHSA-2017:2869 https://access.redhat.com/errata/RHSA-2017:2869 [oss-security] 20190627 Re: linux-distros membership application - Microsoft http://www.openwall.com/lists/oss-security/2019/06/27/7 [oss-security] 20190628 Re: linux-distros membership application - Microsoft http://www.openwall.com/lists/oss-security/2019/06/28/1 http://www.openwall.com/lists/oss-security/2019/06/28/2 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=49d31c2f389acfe83417083e1208422b4091cd9e http://openwall.com/lists/oss-security/2017/08/03/2 https://bugzilla.redhat.com/show_bug.cgi?id=1468283 https://github.com/torvalds/linux/commit/49d31c2f389acfe83417083e1208422b4091cd9e https://patchwork.kernel.org/patch/9755753/ https://patchwork.kernel.org/patch/9755757/ https://source.android.com/security/bulletin/2017-12-01 https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1408967.html |
Copyright | Copyright (C) 2017 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |