![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.871606 |
Categoría: | Red Hat Local Security Checks |
Título: | RedHat Update for kernel RHSA-2016:0715-01 |
Resumen: | The remote host is missing an update for the 'kernel'; package(s) announced via the referenced advisory. |
Descripción: | Summary: The remote host is missing an update for the 'kernel' package(s) announced via the referenced advisory. Vulnerability Insight: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A flaw was found in the way the Linux kernel handled IRET faults during the processing of NMIs. An unprivileged, local user could use this flaw to crash the system or, potentially (although highly unlikely), escalate their privileges on the system. (CVE-2015-5157, Moderate) * A race condition flaw was found in the way the Linux kernel's SCTP implementation handled sctp_accept() during the processing of heartbeat timeout events. A remote attacker could use this flaw to prevent further connections to be accepted by the SCTP server running on the system, resulting in a denial of service. (CVE-2015-8767, Moderate) Bug Fix(es): * When the nvme driver held the queue lock for too long, for example during DMA mapping, a lockup occurred leading to nvme hard-lockup panic. This update fixes the underlying source code, and nvme now works as expected.(BZ#1314209) * Due to a regression, a Unix domain datagram socket could come to a deadlock when sending a datagram to itself. The provided patch adds another 'sk' check to the unix_dgram_sendmsg() function, and the aforementioned deadlock no longer occurs. (BZ#1315696) * Previously, writing a large file using direct I/O in 16 MB chunks sometimes caused a pathological allocation pattern where 16 MB chunks of large free extent were allocated to a file in reversed order. The provided patch avoids the backward allocation, and writing a large file using direct I/O now proceeds successfully. (BZ#1320031) * MD RAID1 devices that repeatedly became hot removed and re-added could become mismatched due to a race condition. This caused them to return stale data, leading to data corruption. The provided set of patches fixes this bug, and hot removals and re-additions of md devices now work as expected. (BZ#1320863) * A couple of previous fixes caused a deadlock on the 'rq' lock leading to a kernel panic on CPU 0. The provided set of patches reverts the relevant commits, thus preventing the panic from occurring. (BZ#1326043) Enhancement(s): * VLAN support has been updated to integrate some of the latest upstream features. This update also makes sure that Null pointer crashes related to VLAN support in bonding mode no longer occur and that tag stripping and insertion work as expected. (BZ#1315706) * This update adds additional model numbers for Broadwell to perf. (BZ#1320035) Affected Software/OS: kernel on Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Workstation (v. 6) Solution: Please Install the Updated Packages. CVSS Score: 7.2 CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-5157 76005 http://www.securityfocus.com/bid/76005 DSA-3313 http://www.debian.org/security/2015/dsa-3313 RHSA-2016:0185 http://rhn.redhat.com/errata/RHSA-2016-0185.html RHSA-2016:0212 http://rhn.redhat.com/errata/RHSA-2016-0212.html RHSA-2016:0224 http://rhn.redhat.com/errata/RHSA-2016-0224.html RHSA-2016:0715 http://rhn.redhat.com/errata/RHSA-2016-0715.html SUSE-SU-2015:1727 http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html SUSE-SU-2015:2108 http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html SUSE-SU-2015:2339 http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html SUSE-SU-2015:2350 http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html SUSE-SU-2016:0354 http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html USN-2687-1 http://www.ubuntu.com/usn/USN-2687-1 USN-2688-1 http://www.ubuntu.com/usn/USN-2688-1 USN-2689-1 http://www.ubuntu.com/usn/USN-2689-1 USN-2690-1 http://www.ubuntu.com/usn/USN-2690-1 USN-2691-1 http://www.ubuntu.com/usn/USN-2691-1 [oss-security] 20150722 Linux x86_64 NMI security issues http://www.openwall.com/lists/oss-security/2015/07/22/7 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9b6e6a8334d56354853f9c255d1395c2ba570e0a http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html https://github.com/torvalds/linux/commit/9b6e6a8334d56354853f9c255d1395c2ba570e0a Common Vulnerability Exposure (CVE) ID: CVE-2015-8767 BugTraq ID: 80268 http://www.securityfocus.com/bid/80268 Debian Security Information: DSA-3448 (Google Search) http://www.debian.org/security/2016/dsa-3448 Debian Security Information: DSA-3503 (Google Search) http://www.debian.org/security/2016/dsa-3503 http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html http://www.openwall.com/lists/oss-security/2016/01/11/4 RedHat Security Advisories: RHSA-2016:0715 RedHat Security Advisories: RHSA-2016:1277 https://access.redhat.com/errata/RHSA-2016:1277 RedHat Security Advisories: RHSA-2016:1301 https://access.redhat.com/errata/RHSA-2016:1301 RedHat Security Advisories: RHSA-2016:1341 https://access.redhat.com/errata/RHSA-2016:1341 SuSE Security Announcement: SUSE-SU-2016:0911 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html SuSE Security Announcement: SUSE-SU-2016:1102 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html SuSE Security Announcement: SUSE-SU-2016:2074 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html SuSE Security Announcement: openSUSE-SU-2016:1008 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html http://www.ubuntu.com/usn/USN-2930-1 http://www.ubuntu.com/usn/USN-2930-2 http://www.ubuntu.com/usn/USN-2930-3 http://www.ubuntu.com/usn/USN-2931-1 http://www.ubuntu.com/usn/USN-2932-1 http://www.ubuntu.com/usn/USN-2967-1 http://www.ubuntu.com/usn/USN-2967-2 |
Copyright | Copyright (C) 2016 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |