Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.871884
Category:Red Hat Local Security Checks
Title:RedHat Update for kernel RHSA-2017:2473-01
Summary:The remote host is missing an update for the 'kernel'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'kernel'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The kernel packages contain the Linux
kernel, the core of any Linux operating system. Security Fix(es): * A race
condition was found in the Linux kernel, present since v3.14-rc1 through v4.12.
The race happens between threads of inotify_handle_event() and vfs_rename()
while running the rename operation against the same file. As a result of the
race the next slab data or the slab's free list pointer can be corrupted with
attacker-controlled data. (CVE-2017-7533, Important) Red Hat would like to thank
Leilei Lin (Alibaba Group), Fan Wu (The University of Hong Kong), and Shixiong
Zhao (The University of Hong Kong) for reporting this issue. Bug Fix(es): *
Previously, direct I/O read operations going past EOF returned an invalid error
number, instead of reading 0 bytes and returning success, if these operations
were in same XFS block with EOF. Consequently, creating multiple VMs from a Red
Hat Enterprise Linux 7.4 template caused all the VMs to become unresponsive in
the 'Image Locked' state. This update fixes the direct I/O feature of the file
system, and VMs created from a Red Hat Enterprise Linux 7.4 template now work as
expected. (BZ#1475669)

Affected Software/OS:
kernel on Red Hat Enterprise Linux Server (v. 7)

Solution:
Please Install the Updated Packages.

CVSS Score:
6.9

CVSS Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-7533
BugTraq ID: 100123
http://www.securityfocus.com/bid/100123
Debian Security Information: DSA-3927 (Google Search)
http://www.debian.org/security/2017/dsa-3927
Debian Security Information: DSA-3945 (Google Search)
http://www.debian.org/security/2017/dsa-3945
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=49d31c2f389acfe83417083e1208422b4091cd9e
http://openwall.com/lists/oss-security/2017/08/03/2
https://bugzilla.redhat.com/show_bug.cgi?id=1468283
https://github.com/torvalds/linux/commit/49d31c2f389acfe83417083e1208422b4091cd9e
https://patchwork.kernel.org/patch/9755753/
https://patchwork.kernel.org/patch/9755757/
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1408967.html
http://www.openwall.com/lists/oss-security/2019/06/27/7
http://www.openwall.com/lists/oss-security/2019/06/28/1
http://www.openwall.com/lists/oss-security/2019/06/28/2
RedHat Security Advisories: RHSA-2017:2473
https://access.redhat.com/errata/RHSA-2017:2473
RedHat Security Advisories: RHSA-2017:2585
https://access.redhat.com/errata/RHSA-2017:2585
RedHat Security Advisories: RHSA-2017:2669
https://access.redhat.com/errata/RHSA-2017:2669
RedHat Security Advisories: RHSA-2017:2770
https://access.redhat.com/errata/RHSA-2017:2770
RedHat Security Advisories: RHSA-2017:2869
https://access.redhat.com/errata/RHSA-2017:2869
http://www.securitytracker.com/id/1039075
CopyrightCopyright (C) 2017 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.