RHEL 7 : kernel (RHSA-2017:1842)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

An update for kernel is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security
impact of Important. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es) :

* An use-after-free flaw was found in the Linux kernel which enables a
race condition in the L2TPv3 IP Encapsulation feature. A local user
could use this flaw to escalate their privileges or crash the system.
(CVE-2016-10200, Important)

* A flaw was found that can be triggered in keyring_search_iterator in
keyring.c if type->match is NULL. A local user could use this flaw to
crash the system or, potentially, escalate their privileges.
(CVE-2017-2647, Important)

* It was found that the NFSv4 server in the Linux kernel did not
properly validate layout type when processing NFSv4 pNFS LAYOUTGET and
GETDEVICEINFO operands. A remote attacker could use this flaw to
soft-lockup the system and thus cause denial of service.
(CVE-2017-8797, Important)

This update also fixes multiple Moderate and Low impact security
issues :

* CVE-2015-8839, CVE-2015-8970, CVE-2016-9576, CVE-2016-7042,
CVE-2016-7097, CVE-2016-8645, CVE-2016-9576, CVE-2016-9588,
CVE-2016-9806, CVE-2016-10088, CVE-2016-10147, CVE-2017-2596,
CVE-2017-2671, CVE-2017-5970, CVE-2017-6001, CVE-2017-6951,
CVE-2017-7187, CVE-2017-7616, CVE-2017-7889, CVE-2017-8890,
CVE-2017-9074, CVE-2017-8890, CVE-2017-9075, CVE-2017-8890,
CVE-2017-9076, CVE-2017-8890, CVE-2017-9077, CVE-2017-9242,
CVE-2014-7970, CVE-2014-7975, CVE-2016-6213, CVE-2016-9604,
CVE-2016-9685

Documentation for these issues is available from the Release Notes
document linked from the References section.

Red Hat would like to thank Igor Redko (Virtuozzo) and Andrey Ryabinin
(Virtuozzo) for reporting CVE-2017-2647; Igor Redko (Virtuozzo) and
Vasily Averin (Virtuozzo) for reporting CVE-2015-8970; Marco Grassi
for reporting CVE-2016-8645; and Dmitry Vyukov (Google Inc.) for
reporting CVE-2017-2596. The CVE-2016-7042 issue was discovered by
Ondrej Kozina (Red Hat); the CVE-2016-7097 issue was discovered by
Andreas Gruenbacher (Red Hat) and Jan Kara (SUSE); the CVE-2016-6213
and CVE-2016-9685 issues were discovered by Qian Cai (Red Hat); and
the CVE-2016-9604 issue was discovered by David Howells (Red Hat).

Additional Changes :

For detailed information on other changes in this release, see the Red
Hat Enterprise Linux 7.4 Release Notes linked from the References
section.

See also :

http://www.nessus.org/u?70a6f8bb
http://rhn.redhat.com/errata/RHSA-2017-1842.html
https://www.redhat.com/security/data/cve/CVE-2014-7970.html
https://www.redhat.com/security/data/cve/CVE-2014-7975.html
https://www.redhat.com/security/data/cve/CVE-2015-8839.html
https://www.redhat.com/security/data/cve/CVE-2015-8970.html
https://www.redhat.com/security/data/cve/CVE-2016-10088.html
https://www.redhat.com/security/data/cve/CVE-2016-10147.html
https://www.redhat.com/security/data/cve/CVE-2016-10200.html
https://www.redhat.com/security/data/cve/CVE-2016-6213.html
https://www.redhat.com/security/data/cve/CVE-2016-7042.html
https://www.redhat.com/security/data/cve/CVE-2016-7097.html
https://www.redhat.com/security/data/cve/CVE-2016-8645.html
https://www.redhat.com/security/data/cve/CVE-2016-9576.html
https://www.redhat.com/security/data/cve/CVE-2016-9588.html
https://www.redhat.com/security/data/cve/CVE-2016-9604.html
https://www.redhat.com/security/data/cve/CVE-2016-9685.html
https://www.redhat.com/security/data/cve/CVE-2016-9806.html
https://www.redhat.com/security/data/cve/CVE-2017-2596.html
https://www.redhat.com/security/data/cve/CVE-2017-2647.html
https://www.redhat.com/security/data/cve/CVE-2017-2671.html
https://www.redhat.com/security/data/cve/CVE-2017-5970.html
https://www.redhat.com/security/data/cve/CVE-2017-6001.html
https://www.redhat.com/security/data/cve/CVE-2017-6951.html
https://www.redhat.com/security/data/cve/CVE-2017-7187.html
https://www.redhat.com/security/data/cve/CVE-2017-7616.html
https://www.redhat.com/security/data/cve/CVE-2017-7889.html
https://www.redhat.com/security/data/cve/CVE-2017-8797.html
https://www.redhat.com/security/data/cve/CVE-2017-8890.html
https://www.redhat.com/security/data/cve/CVE-2017-9074.html
https://www.redhat.com/security/data/cve/CVE-2017-9075.html
https://www.redhat.com/security/data/cve/CVE-2017-9076.html
https://www.redhat.com/security/data/cve/CVE-2017-9077.html
https://www.redhat.com/security/data/cve/CVE-2017-9242.html

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false