RHEL 7 : kernel (RHSA-2017:1842)

high Nessus Plugin ID 102143

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2017:1842 advisory.

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* An use-after-free flaw was found in the Linux kernel which enables a race condition in the L2TPv3 IP Encapsulation feature. A local user could use this flaw to escalate their privileges or crash the system.
(CVE-2016-10200, Important)

* A flaw was found that can be triggered in keyring_search_iterator in keyring.c if type->match is NULL. A local user could use this flaw to crash the system or, potentially, escalate their privileges.
(CVE-2017-2647, Important)

* It was found that the NFSv4 server in the Linux kernel did not properly validate layout type when processing NFSv4 pNFS LAYOUTGET and GETDEVICEINFO operands. A remote attacker could use this flaw to soft- lockup the system and thus cause denial of service. (CVE-2017-8797, Important)

This update also fixes multiple Moderate and Low impact security issues:

* CVE-2015-8839, CVE-2015-8970, CVE-2016-9576, CVE-2016-7042, CVE-2016-7097, CVE-2016-8645, CVE-2016-9576, CVE-2016-9588, CVE-2016-9806, CVE-2016-10088, CVE-2016-10147, CVE-2017-2596, CVE-2017-2671, CVE-2017-5970, CVE-2017-6001, CVE-2017-6951, CVE-2017-7187, CVE-2017-7616, CVE-2017-7889, CVE-2017-8890, CVE-2017-9074, CVE-2017-8890, CVE-2017-9075, CVE-2017-8890, CVE-2017-9076, CVE-2017-8890, CVE-2017-9077, CVE-2017-9242, CVE-2014-7970, CVE-2014-7975, CVE-2016-6213, CVE-2016-9604, CVE-2016-9685

Documentation for these issues is available from the Release Notes document linked from the References section.

Red Hat would like to thank Igor Redko (Virtuozzo) and Andrey Ryabinin (Virtuozzo) for reporting CVE-2017-2647; Igor Redko (Virtuozzo) and Vasily Averin (Virtuozzo) for reporting CVE-2015-8970; Marco Grassi for reporting CVE-2016-8645; and Dmitry Vyukov (Google Inc.) for reporting CVE-2017-2596. The CVE-2016-7042 issue was discovered by Ondrej Kozina (Red Hat); the CVE-2016-7097 issue was discovered by Andreas Gruenbacher (Red Hat) and Jan Kara (SUSE); the CVE-2016-6213 and CVE-2016-9685 issues were discovered by Qian Cai (Red Hat); and the CVE-2016-9604 issue was discovered by David Howells (Red Hat).

Additional Changes:

For detailed information on other changes in this release, see the Red Hat Enterprise Linux 7.4 Release Notes linked from the References section.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?957fd856

http://www.nessus.org/u?e109ca23

https://access.redhat.com/errata/RHSA-2017:1842

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=1151095

https://bugzilla.redhat.com/show_bug.cgi?id=1151108

https://bugzilla.redhat.com/show_bug.cgi?id=1178491

https://bugzilla.redhat.com/show_bug.cgi?id=1283257

https://bugzilla.redhat.com/show_bug.cgi?id=1297929

https://bugzilla.redhat.com/show_bug.cgi?id=1322495

https://bugzilla.redhat.com/show_bug.cgi?id=1323577

https://bugzilla.redhat.com/show_bug.cgi?id=1330000

https://bugzilla.redhat.com/show_bug.cgi?id=1349647

https://bugzilla.redhat.com/show_bug.cgi?id=1352741

https://bugzilla.redhat.com/show_bug.cgi?id=1356471

https://bugzilla.redhat.com/show_bug.cgi?id=1368577

https://bugzilla.redhat.com/show_bug.cgi?id=1368938

https://bugzilla.redhat.com/show_bug.cgi?id=1371693

https://bugzilla.redhat.com/show_bug.cgi?id=1371714

https://bugzilla.redhat.com/show_bug.cgi?id=1373966

https://bugzilla.redhat.com/show_bug.cgi?id=1404200

https://bugzilla.redhat.com/show_bug.cgi?id=1404924

https://bugzilla.redhat.com/show_bug.cgi?id=1406885

https://bugzilla.redhat.com/show_bug.cgi?id=1412210

https://bugzilla.redhat.com/show_bug.cgi?id=1412234

https://bugzilla.redhat.com/show_bug.cgi?id=1415780

https://bugzilla.redhat.com/show_bug.cgi?id=1416532

https://bugzilla.redhat.com/show_bug.cgi?id=1417812

https://bugzilla.redhat.com/show_bug.cgi?id=1418962

https://bugzilla.redhat.com/show_bug.cgi?id=1421638

https://bugzilla.redhat.com/show_bug.cgi?id=1422825

https://bugzilla.redhat.com/show_bug.cgi?id=1424076

https://bugzilla.redhat.com/show_bug.cgi?id=1428353

https://bugzilla.redhat.com/show_bug.cgi?id=1428684

https://bugzilla.redhat.com/show_bug.cgi?id=1428973

https://bugzilla.redhat.com/show_bug.cgi?id=1430225

https://bugzilla.redhat.com/show_bug.cgi?id=1430347

https://bugzilla.redhat.com/show_bug.cgi?id=1433252

https://bugzilla.redhat.com/show_bug.cgi?id=1433831

https://bugzilla.redhat.com/show_bug.cgi?id=1434327

https://bugzilla.redhat.com/show_bug.cgi?id=1436649

https://bugzilla.redhat.com/show_bug.cgi?id=1441088

https://bugzilla.redhat.com/show_bug.cgi?id=1443999

https://bugzilla.redhat.com/show_bug.cgi?id=1444493

https://bugzilla.redhat.com/show_bug.cgi?id=1445054

https://bugzilla.redhat.com/show_bug.cgi?id=1448312

https://bugzilla.redhat.com/show_bug.cgi?id=1450203

https://bugzilla.redhat.com/show_bug.cgi?id=1450972

https://bugzilla.redhat.com/show_bug.cgi?id=1452679

https://bugzilla.redhat.com/show_bug.cgi?id=1452688

https://bugzilla.redhat.com/show_bug.cgi?id=1452691

https://bugzilla.redhat.com/show_bug.cgi?id=1452744

https://bugzilla.redhat.com/show_bug.cgi?id=1456388

https://bugzilla.redhat.com/show_bug.cgi?id=1463241

https://bugzilla.redhat.com/show_bug.cgi?id=1466329

https://bugzilla.redhat.com/show_bug.cgi?id=1378320

https://bugzilla.redhat.com/show_bug.cgi?id=1378656

https://bugzilla.redhat.com/show_bug.cgi?id=1383739

https://bugzilla.redhat.com/show_bug.cgi?id=1386286

https://bugzilla.redhat.com/show_bug.cgi?id=1389433

https://bugzilla.redhat.com/show_bug.cgi?id=1391299

https://bugzilla.redhat.com/show_bug.cgi?id=1393904

https://bugzilla.redhat.com/show_bug.cgi?id=1394089

https://bugzilla.redhat.com/show_bug.cgi?id=1395104

https://bugzilla.redhat.com/show_bug.cgi?id=1396578

https://bugzilla.redhat.com/show_bug.cgi?id=1396941

https://bugzilla.redhat.com/show_bug.cgi?id=1399830

https://bugzilla.redhat.com/show_bug.cgi?id=1401433

https://bugzilla.redhat.com/show_bug.cgi?id=1401436

https://bugzilla.redhat.com/show_bug.cgi?id=1401502

https://bugzilla.redhat.com/show_bug.cgi?id=1403145

Plugin Details

Severity: High

ID: 102143

File Name: redhat-RHSA-2017-1842.nasl

Version: 3.21

Type: local

Agent: unix

Published: 8/3/2017

Updated: 11/5/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.0

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: High

Base Score: 7.6

Temporal Score: 6.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2017-6001

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

CVSS Score Source: CVE-2017-9077

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:kernel-tools, p-cpe:/a:redhat:enterprise_linux:kernel, p-cpe:/a:redhat:enterprise_linux:kernel-headers, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel, p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel, p-cpe:/a:redhat:enterprise_linux:kernel-kdump, p-cpe:/a:redhat:enterprise_linux:kernel-bootwrapper, p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs, p-cpe:/a:redhat:enterprise_linux:python-perf, p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel, p-cpe:/a:redhat:enterprise_linux:kernel-devel, p-cpe:/a:redhat:enterprise_linux:kernel-debug, p-cpe:/a:redhat:enterprise_linux:perf

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/1/2017

Vulnerability Publication Date: 10/13/2014

CISA Known Exploited Vulnerability Due Dates: 9/30/2024

Reference Information

CVE: CVE-2014-7970, CVE-2014-7975, CVE-2015-8839, CVE-2015-8970, CVE-2016-10088, CVE-2016-10147, CVE-2016-10200, CVE-2016-10741, CVE-2016-6213, CVE-2016-7042, CVE-2016-7097, CVE-2016-8645, CVE-2016-9576, CVE-2016-9588, CVE-2016-9604, CVE-2016-9685, CVE-2016-9806, CVE-2017-1000253, CVE-2017-1000379, CVE-2017-2584, CVE-2017-2596, CVE-2017-2647, CVE-2017-2671, CVE-2017-5551, CVE-2017-5970, CVE-2017-6001, CVE-2017-6951, CVE-2017-7187, CVE-2017-7495, CVE-2017-7616, CVE-2017-7889, CVE-2017-8797, CVE-2017-8890, CVE-2017-9074, CVE-2017-9075, CVE-2017-9076, CVE-2017-9077, CVE-2017-9242

CWE: 119, 121, 125, 20, 248, 287, 362, 369, 390, 391, 416, 476, 617, 665, 732, 770, 772, 787

RHSA: 2017:1842