Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.882792
Category:CentOS Local Security Checks
Title:CentOS Update for kernel CESA-2017:2930 centos7
Summary:Check the version of kernel
Description:Summary:
Check the version of kernel

Vulnerability Insight:
The kernel packages contain the Linux kernel,
the core of any Linux operating system.

Security Fix(es):

* Out-of-bounds kernel heap access vulnerability was found in xfrm,
kernel's IP framework for transforming packets. An error dealing with
netlink messages from an unprivileged user leads to arbitrary read/write
and privilege escalation. (CVE-2017-7184, Important)

* A race condition issue leading to a use-after-free flaw was found in the
way the raw packet sockets are implemented in the Linux kernel networking
subsystem handling synchronization. A local user able to open a raw packet
socket (requires the CAP_NET_RAW capability) could use this flaw to elevate
their privileges on the system. (CVE-2017-1000111, Important)

* An exploitable memory corruption flaw was found in the Linux kernel. The
append path can be erroneously switched from UFO to non-UFO in
ip_ufo_append_data() when building an UFO packet with MSG_MORE option. If
unprivileged user namespaces are available, this flaw can be exploited to
gain root privileges. (CVE-2017-1000112, Important)

* A flaw was found in the Linux networking subsystem where a local attacker
with CAP_NET_ADMIN capabilities could cause an out-of-bounds memory access
by creating a smaller-than-expected ICMP header and sending to its
destination via sendto(). (CVE-2016-8399, Moderate)

* Kernel memory corruption due to a buffer overflow was found in
brcmf_cfg80211_mgmt_tx() function in Linux kernels from v3.9-rc1 to
v4.13-rc1. The vulnerability can be triggered by sending a crafted
NL80211_CMD_FRAME packet via netlink. This flaw is unlikely to be triggered
remotely as certain userspace code is needed for this. An unprivileged
local user could use this flaw to induce kernel memory corruption on the
system, leading to a crash. Due to the nature of the flaw, privilege
escalation cannot be fully ruled out, although it is unlikely.
(CVE-2017-7541, Moderate)

* An integer overflow vulnerability in ip6_find_1stfragopt() function was
found. A local attacker that has privileges (of CAP_NET_RAW) to open raw
socket can cause an infinite loop inside the ip6_find_1stfragopt()
function. (CVE-2017-7542, Moderate)

* A kernel data leak due to an out-of-bound read was found in the Linux
kernel in inet_diag_msg_sctp{, l}addr_fill() and sctp_get_sctp_info()
functions present since version 4.7-rc1 through version 4.13. A data leak
happens when these functions fill in sockaddr data structures used to
export socket's diagnostic information. As a result, up to 100 bytes of the
slab data could be leaked to a userspace. (CVE-2017-7558, Moderate)

* The mq_notify function in the Linux ke ...

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
kernel on CentOS 7

Solution:
Please Install the Updated Packages.

CVSS Score:
7.6

CVSS Vector:
AV:N/AC:H/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-8399
BugTraq ID: 94708
http://www.securityfocus.com/bid/94708
RedHat Security Advisories: RHSA-2017:0817
http://rhn.redhat.com/errata/RHSA-2017-0817.html
RedHat Security Advisories: RHSA-2017:0869
https://access.redhat.com/errata/RHSA-2017:0869
RedHat Security Advisories: RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2930
RedHat Security Advisories: RHSA-2017:2931
https://access.redhat.com/errata/RHSA-2017:2931
Common Vulnerability Exposure (CVE) ID: CVE-2017-1000111
BugTraq ID: 100267
http://www.securityfocus.com/bid/100267
Debian Security Information: DSA-3981 (Google Search)
http://www.debian.org/security/2017/dsa-3981
RedHat Security Advisories: RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2918
RedHat Security Advisories: RHSA-2017:3200
https://access.redhat.com/errata/RHSA-2017:3200
http://www.securitytracker.com/id/1039132
Common Vulnerability Exposure (CVE) ID: CVE-2017-1000112
BugTraq ID: 100262
http://www.securityfocus.com/bid/100262
https://www.exploit-db.com/exploits/45147/
https://github.com/xairy/kernel-exploits/tree/master/CVE-2017-1000112
http://seclists.org/oss-sec/2017/q3/277
RedHat Security Advisories: RHSA-2019:1931
https://access.redhat.com/errata/RHSA-2019:1931
RedHat Security Advisories: RHSA-2019:1932
https://access.redhat.com/errata/RHSA-2019:1932
RedHat Security Advisories: RHSA-2019:4159
https://access.redhat.com/errata/RHSA-2019:4159
http://www.securitytracker.com/id/1039162
Common Vulnerability Exposure (CVE) ID: CVE-2017-11176
BugTraq ID: 99919
http://www.securityfocus.com/bid/99919
Debian Security Information: DSA-3927 (Google Search)
http://www.debian.org/security/2017/dsa-3927
Debian Security Information: DSA-3945 (Google Search)
http://www.debian.org/security/2017/dsa-3945
https://www.exploit-db.com/exploits/45553/
RedHat Security Advisories: RHSA-2018:0169
https://access.redhat.com/errata/RHSA-2018:0169
RedHat Security Advisories: RHSA-2018:3822
https://access.redhat.com/errata/RHSA-2018:3822
Common Vulnerability Exposure (CVE) ID: CVE-2017-14106
BugTraq ID: 100878
http://www.securityfocus.com/bid/100878
RedHat Security Advisories: RHSA-2018:2172
https://access.redhat.com/errata/RHSA-2018:2172
http://www.securitytracker.com/id/1039549
SuSE Security Announcement: SUSE-SU-2018:0011 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
Common Vulnerability Exposure (CVE) ID: CVE-2017-7184
BugTraq ID: 97018
http://www.securityfocus.com/bid/97018
http://www.eweek.com/security/ubuntu-linux-falls-on-day-1-of-pwn2own-hacking-competition
https://blog.trendmicro.com/results-pwn2own-2017-day-one/
https://twitter.com/thezdi/status/842126074435665920
http://www.securitytracker.com/id/1038166
Common Vulnerability Exposure (CVE) ID: CVE-2017-7541
1038981
http://www.securitytracker.com/id/1038981
99955
http://www.securityfocus.com/bid/99955
DSA-3927
DSA-3945
RHSA-2017:2863
https://access.redhat.com/errata/RHSA-2017:2863
RHSA-2017:2918
RHSA-2017:2930
RHSA-2017:2931
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8f44c9a41386729fea410e688959ddaa9d51be7c
http://openwall.com/lists/oss-security/2017/07/24/2
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.3
https://bugzilla.novell.com/show_bug.cgi?id=1049645
https://bugzilla.redhat.com/show_bug.cgi?id=1473198
https://github.com/torvalds/linux/commit/8f44c9a41386729fea410e688959ddaa9d51be7c
https://source.android.com/security/bulletin/2017-11-01
https://www.spinics.net/lists/stable/msg180994.html
Common Vulnerability Exposure (CVE) ID: CVE-2017-7542
99953
http://www.securityfocus.com/bid/99953
RHSA-2018:0169
USN-3583-1
https://usn.ubuntu.com/3583-1/
USN-3583-2
https://usn.ubuntu.com/3583-2/
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6399f1fae4ec29fab5ec76070435555e256ca3a6
https://github.com/torvalds/linux/commit/6399f1fae4ec29fab5ec76070435555e256ca3a6
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
Common Vulnerability Exposure (CVE) ID: CVE-2017-7558
100466
http://www.securityfocus.com/bid/100466
1039221
http://www.securitytracker.com/id/1039221
DSA-3981
https://www.debian.org/security/2017/dsa-3981
[linux-netdev] 20170823 [PATCH net] sctp: Avoid out-of-bounds reads from address storage
https://marc.info/?l=linux-netdev&m=150348777122761&w=2
[oss-security] 20170823 CVE-2017-7558: Linux kernel: sctp: out-of-bounds read in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info()
http://seclists.org/oss-sec/2017/q3/338
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7558
CopyrightCopyright (C) 2017 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.