|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for kernel RHSA-2017:2473-01|
|Summary:||The remote host is missing an update for the 'kernel'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'kernel'
package(s) announced via the referenced advisory.
The kernel packages contain the Linux
kernel, the core of any Linux operating system. Security Fix(es): * A race
condition was found in the Linux kernel, present since v3.14-rc1 through v4.12.
The race happens between threads of inotify_handle_event() and vfs_rename()
while running the rename operation against the same file. As a result of the
race the next slab data or the slab's free list pointer can be corrupted with
attacker-controlled data. (CVE-2017-7533, Important) Red Hat would like to thank
Leilei Lin (Alibaba Group), Fan Wu (The University of Hong Kong), and Shixiong
Zhao (The University of Hong Kong) for reporting this issue. Bug Fix(es): *
Previously, direct I/O read operations going past EOF returned an invalid error
number, instead of reading 0 bytes and returning success, if these operations
were in same XFS block with EOF. Consequently, creating multiple VMs from a Red
Hat Enterprise Linux 7.4 template caused all the VMs to become unresponsive in
the 'Image Locked' state. This update fixes the direct I/O feature of the file
system, and VMs created from a Red Hat Enterprise Linux 7.4 template now work as
kernel on Red Hat Enterprise Linux Server (v. 7)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2017-7533|
BugTraq ID: 100123
Debian Security Information: DSA-3927 (Google Search)
Debian Security Information: DSA-3945 (Google Search)
RedHat Security Advisories: RHSA-2017:2473
RedHat Security Advisories: RHSA-2017:2585
RedHat Security Advisories: RHSA-2017:2669
RedHat Security Advisories: RHSA-2017:2770
RedHat Security Advisories: RHSA-2017:2869
|Copyright||Copyright (C) 2017 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.