![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.871730 |
Category: | Red Hat Local Security Checks |
Title: | RedHat Update for kernel RHSA-2016:2962-01 |
Summary: | The remote host is missing an update for the 'kernel'; package(s) announced via the referenced advisory. |
Description: | Summary: The remote host is missing an update for the 'kernel' package(s) announced via the referenced advisory. Vulnerability Insight: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allows remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important) Bug Fix(es): * Previously, guest virtual machines (VMs) on a Hyper-V server cluster got in some cases rebooted during the graceful node failover test, because the host kept sending heartbeat packets independently of guests responding to them. This update fixes the bug by properly responding to all the heartbeat messages in the queue, even if they are pending. As a result, guest VMs no longer get rebooted under the described circumstances. (BZ#1391167) Affected Software/OS: kernel on Red Hat Enterprise Linux (v. 5 server) Solution: Please Install the Updated Packages. CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-7117 BugTraq ID: 93304 http://www.securityfocus.com/bid/93304 RedHat Security Advisories: RHSA-2016:2962 http://rhn.redhat.com/errata/RHSA-2016-2962.html RedHat Security Advisories: RHSA-2017:0031 http://rhn.redhat.com/errata/RHSA-2017-0031.html RedHat Security Advisories: RHSA-2017:0036 http://rhn.redhat.com/errata/RHSA-2017-0036.html RedHat Security Advisories: RHSA-2017:0065 http://rhn.redhat.com/errata/RHSA-2017-0065.html RedHat Security Advisories: RHSA-2017:0086 http://rhn.redhat.com/errata/RHSA-2017-0086.html RedHat Security Advisories: RHSA-2017:0091 http://rhn.redhat.com/errata/RHSA-2017-0091.html RedHat Security Advisories: RHSA-2017:0113 http://rhn.redhat.com/errata/RHSA-2017-0113.html RedHat Security Advisories: RHSA-2017:0196 http://rhn.redhat.com/errata/RHSA-2017-0196.html RedHat Security Advisories: RHSA-2017:0215 http://rhn.redhat.com/errata/RHSA-2017-0215.html RedHat Security Advisories: RHSA-2017:0216 http://rhn.redhat.com/errata/RHSA-2017-0216.html RedHat Security Advisories: RHSA-2017:0217 http://rhn.redhat.com/errata/RHSA-2017-0217.html RedHat Security Advisories: RHSA-2017:0270 http://rhn.redhat.com/errata/RHSA-2017-0270.html |
Copyright | Copyright (C) 2016 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |