Synopsis
The remote Red Hat host is missing a security update.
Description
The remote Redhat Enterprise Linux 7 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2016:1051 advisory.
The kernel-rt packages contain the Linux kernel, the core of any Linux operating system.
The following packages have been upgraded to a newer upstream version: kernel-rt (3.10.0-327.18.2). This version provides a number of bug fixes and enhancements, including:
* [scsi] bnx2fc: Fix FCP RSP residual parsing and remove explicit logouts
* [scsi] mpt3sas: Fix for Asynchronous completion of timedout IO and task abort of timedout IO
* [scsi] scsi_error: should not get sense for timeout IO in scsi error handler
* [scsi] Revert libiscsi: Reduce locking contention in fast path
* [mm] madvise: fix MADV_WILLNEED on shmem swapouts
* [cpufreq] intel_pstate: decrease number of HWP enabled messages and enable HWP per CPU
* [kernel] sched: Robustify topology setup
* [kernel] sched/fair: Disable tg load_avg/runnable_avg update for root_task_group
* [kernel] sched/fair: Move hot load_avg/runnable_avg into separate cacheline
* [ib] mlx5: Fix RC transport send queue overhead computation
* [fs] nfsd: fix clp->cl_revoked list deletion causing softlock in nfsd
* [fs] ceph: multiple updates
(BZ#1322033)
Security Fix(es):
* A flaw was found in the way the Linux kernel's ASN.1 DER decoder processed certain certificate files with tags of indefinite length. A local, unprivileged user could use a specially crafted X.509 certificate DER file to crash the system or, potentially, escalate their privileges on the system. (CVE-2016-0758, Important)
Red Hat would like to thank Philip Pettersson of Samsung for reporting this issue.
Bug Fix(es):
* The hotplug lock and the console semaphore could be acquired in an incorrect order, which could previously lead to a deadlock causing the system console to freeze. The underlying code has been adjusted to acquire the locks in the correct order, resolving the bug with the console. (BZ#1324767)
Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Update the affected packages.
Plugin Details
File Name: redhat-RHSA-2016-1051.nasl
Agent: unix
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Information
Vendor
Vendor Severity: Important
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
Vulnerability Information
CPE: p-cpe:/a:redhat:enterprise_linux:kernel-rt, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-devel, p-cpe:/a:redhat:enterprise_linux:kernel-rt-doc, p-cpe:/a:redhat:enterprise_linux:kernel-rt-devel, p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-kvm, p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-devel, p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 5/12/2016
Vulnerability Publication Date: 6/27/2016