Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.871796
Category:Red Hat Local Security Checks
Title:RedHat Update for kernel RHSA-2017:0933-01
Summary:The remote host is missing an update for the 'kernel'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'kernel'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The kernel packages contain the Linux
kernel, the core of any Linux operating system.

These updated kernel packages include several security issues and numerous
bug fixes. Space precludes documenting all of these bug fixes in this
advisory. To see the complete list of bug fixes, users are directed to the
related Knowledge Article.

Security Fix(es):

* A race condition flaw was found in the N_HLDC Linux kernel driver when
accessing n_hdlc.tbuf list that can lead to double free. A local,
unprivileged user able to set the HDLC line discipline on the tty device
could use this flaw to increase their privileges on the system.
(CVE-2017-2636, Important)

* A flaw was found in the Linux kernel key management subsystem in which a
local attacker could crash the kernel or corrupt the stack and additional
memory (denial of service) by supplying a specially crafted RSA key. This
flaw panics the machine during the verification of the RSA key.
(CVE-2016-8650, Moderate)

* A flaw was found in the Linux kernel's implementation of setsockopt for
the BUFFORCE setsockopt() system call. Users with non-namespace
CAP_NET_ADMIN are able to trigger this call and create a situation in which
the sockets sendbuff data size could be negative. This could adversely
affect memory allocations and create situations where the system could
crash or cause memory corruption. (CVE-2016-9793, Moderate)

* A flaw was found in the Linux kernel's handling of clearing SELinux
attributes on /proc/pid/attr files. An empty (null) write to this file can
crash the system by causing the system to attempt to access unmapped kernel
memory. (CVE-2017-2618, Moderate)

Red Hat would like to thank Alexander Popov for reporting CVE-2017-2636 and
Ralf Spenneberg for reporting CVE-2016-8650. The CVE-2017-2618 issue was
discovered by Paul Moore (Red Hat Engineering).

Affected Software/OS:
kernel on
Red Hat Enterprise Linux Server (v. 7)

Solution:
Please Install the Updated Packages.

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-8650
1037968
http://www.securitytracker.com/id/1037968
20161115 OS-S 2016-21 - Local DoS: Linux Kernel Nullpointer Dereference via keyctl
http://seclists.org/fulldisclosure/2016/Nov/76
94532
http://www.securityfocus.com/bid/94532
RHSA-2017:0931
https://access.redhat.com/errata/RHSA-2017:0931
RHSA-2017:0932
https://access.redhat.com/errata/RHSA-2017:0932
RHSA-2017:0933
https://access.redhat.com/errata/RHSA-2017:0933
RHSA-2018:1854
https://access.redhat.com/errata/RHSA-2018:1854
[oss-security] 20161125 Linux kernel: CVE-2016-8650 : Local denial of service with in key subsystem
http://www.openwall.com/lists/oss-security/2016/11/24/8
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5527fffff3f002b0a6b376163613b82f69de073
https://bugzilla.redhat.com/show_bug.cgi?id=1395187
https://github.com/torvalds/linux/commit/f5527fffff3f002b0a6b376163613b82f69de073
https://source.android.com/security/bulletin/2017-03-01.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-9793
BugTraq ID: 94655
http://www.securityfocus.com/bid/94655
https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-9793
http://www.openwall.com/lists/oss-security/2016/12/03/1
RedHat Security Advisories: RHSA-2017:0931
RedHat Security Advisories: RHSA-2017:0932
RedHat Security Advisories: RHSA-2017:0933
Common Vulnerability Exposure (CVE) ID: CVE-2017-2618
96272
http://www.securityfocus.com/bid/96272
DSA-3791
https://www.debian.org/security/2017/dsa-3791
[selinux] 20170131 [PATCH] selinux: fix off-by-one in setprocattr
https://marc.info/?l=selinux&m=148588165923772&w=2
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2618
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=0c461cb727d146c9ef2d3e86214f498b78b7d125
Common Vulnerability Exposure (CVE) ID: CVE-2017-2636
1037963
http://www.securitytracker.com/id/1037963
96732
http://www.securityfocus.com/bid/96732
DSA-3804
http://www.debian.org/security/2017/dsa-3804
RHSA-2017:0892
https://access.redhat.com/errata/RHSA-2017:0892
RHSA-2017:0986
https://access.redhat.com/errata/RHSA-2017:0986
RHSA-2017:1125
https://access.redhat.com/errata/RHSA-2017:1125
RHSA-2017:1126
https://access.redhat.com/errata/RHSA-2017:1126
RHSA-2017:1232
https://access.redhat.com/errata/RHSA-2017:1232
RHSA-2017:1233
https://access.redhat.com/errata/RHSA-2017:1233
RHSA-2017:1488
https://access.redhat.com/errata/RHSA-2017:1488
[oss-security] 20170307 Linux kernel: CVE-2017-2636: local privilege escalation flaw in n_hdlc
http://www.openwall.com/lists/oss-security/2017/03/07/6
https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html
https://bugzilla.redhat.com/show_bug.cgi?id=1428319
CopyrightCopyright (C) 2017 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.