|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for kernel RHSA-2017:1308-01|
|Summary:||The remote host is missing an update for the 'kernel'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'kernel'
package(s) announced via the referenced advisory.
The kernel packages contain the Linux kernel,
the core of any Linux operating system.
* It was found that the packet_set_ring() function of the Linux kernel's
networking implementation did not properly validate certain block-size
data. A local attacker with CAP_NET_RAW capability could use this flaw to
trigger a buffer overflow, resulting in the crash of the system. Due to the
nature of the flaw, privilege escalation cannot be fully ruled out.
* Mounting a crafted EXT4 image read-only leads to an attacker controlled
memory corruption and SLAB-Out-of-Bounds reads. (CVE-2016-10208, Moderate)
* A flaw was found in the Linux kernel's implementation of seq_file where a
local attacker could manipulate memory in the put() function pointer. This
could lead to memory corruption and possible privileged escalation.
* A vulnerability was found in the Linux kernel. An unprivileged local user
could trigger oops in shash_async_export() by attempting to force the
in-kernel hashing algorithms into decrypting an empty data set.
* It was reported that with Linux kernel, earlier than version v4.10-rc8,
an application may trigger a BUG_ON in sctp_wait_for_sndbuf if the socket
tx buffer is full, a thread is waiting on it to queue more data, and
meanwhile another thread peels off the association being used by the first
thread. (CVE-2017-5986, Moderate)
Red Hat would like to thank Igor Redko (Virtuozzo kernel team) for
This update also fixes several bugs and adds various enhancements.
Documentation for these changes is available from the Technical Notes
document linked to in the References section.
kernel on Red Hat Enterprise Linux Server (v. 7)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2016-7910|
BugTraq ID: 94135
RedHat Security Advisories: RHSA-2017:0892
RedHat Security Advisories: RHSA-2017:1297
RedHat Security Advisories: RHSA-2017:1298
RedHat Security Advisories: RHSA-2017:1308
Common Vulnerability Exposure (CVE) ID: CVE-2016-8646
BugTraq ID: 94309
Common Vulnerability Exposure (CVE) ID: CVE-2017-5986
BugTraq ID: 96222
Debian Security Information: DSA-3804 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2017-7308
BugTraq ID: 97234
RedHat Security Advisories: RHSA-2018:1854
|Copyright||Copyright (C) 2017 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.