RHEL 6 : MRG (RHSA-2017:2669)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

An update for kernel-rt is now available for Red Hat Enterprise MRG 2.

Red Hat Product Security has rated this update as having a security
impact of Important. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.

The kernel-rt packages provide the Real Time Linux Kernel, which
enables fine-tuning for systems with extremely high determinism
requirements.

Security Fix(es) :

* A race condition was found in the Linux kernel, present since
v3.14-rc1 through v4.12. The race happens between threads of
inotify_handle_event() and vfs_rename() while running the rename
operation against the same file. As a result of the race the next slab
data or the slab's free list pointer can be corrupted with
attacker-controlled data, which may lead to the privilege escalation.
(CVE-2017-7533, Important)

* It was found that the NFSv4 server in the Linux kernel did not
properly validate layout type when processing NFSv4 pNFS LAYOUTGET and
GETDEVICEINFO operands. A remote attacker could use this flaw to
soft-lockup the system and thus cause denial of service.
(CVE-2017-8797, Important)

This update also fixes multiple Moderate and Low impact security
issues :

CVE-2017-8797 CVE-2015-8839 CVE-2016-9576 CVE-2016-7042 CVE-2016-7097
CVE-2016-8645 CVE-2016-9576 CVE-2016-9806 CVE-2016-10088 CVE-2017-2671
CVE-2017-5970 CVE-2017-6001 CVE-2017-6951 CVE-2017-7187 CVE-2017-7889
CVE-2017-8890 CVE-2017-9074 CVE-2017-8890 CVE-2017-9075 CVE-2017-8890
CVE-2017-9076 CVE-2017-8890 CVE-2017-9077 CVE-2016-9604 CVE-2016-9685

Documentation for these issues are available from the Technical Notes
document linked to in the References section.

Red Hat would like to thank Leilei Lin (Alibaba Group), Fan Wu (The
University of Hong Kong), and Shixiong Zhao (The University of Hong
Kong) for reporting CVE-2017-7533 and Marco Grassi for reporting
CVE-2016-8645. The CVE-2016-7042 issue was discovered by Ondrej Kozina
(Red Hat); the CVE-2016-7097 issue was discovered by Andreas
Gruenbacher (Red Hat) and Jan Kara (SUSE); the CVE-2016-9604 issue was
discovered by David Howells (Red Hat); and the CVE-2016-9685 issue was
discovered by Qian Cai (Red Hat).

See also :

https://access.redhat.com/articles/3173821
http://rhn.redhat.com/errata/RHSA-2017-2669.html
https://www.redhat.com/security/data/cve/CVE-2015-8839.html
https://www.redhat.com/security/data/cve/CVE-2016-10088.html
https://www.redhat.com/security/data/cve/CVE-2016-7042.html
https://www.redhat.com/security/data/cve/CVE-2016-7097.html
https://www.redhat.com/security/data/cve/CVE-2016-8645.html
https://www.redhat.com/security/data/cve/CVE-2016-9576.html
https://www.redhat.com/security/data/cve/CVE-2016-9604.html
https://www.redhat.com/security/data/cve/CVE-2016-9685.html
https://www.redhat.com/security/data/cve/CVE-2016-9806.html
https://www.redhat.com/security/data/cve/CVE-2017-2671.html
https://www.redhat.com/security/data/cve/CVE-2017-5970.html
https://www.redhat.com/security/data/cve/CVE-2017-6001.html
https://www.redhat.com/security/data/cve/CVE-2017-6951.html
https://www.redhat.com/security/data/cve/CVE-2017-7187.html
https://www.redhat.com/security/data/cve/CVE-2017-7533.html
https://www.redhat.com/security/data/cve/CVE-2017-7889.html
https://www.redhat.com/security/data/cve/CVE-2017-8797.html
https://www.redhat.com/security/data/cve/CVE-2017-8890.html
https://www.redhat.com/security/data/cve/CVE-2017-9074.html
https://www.redhat.com/security/data/cve/CVE-2017-9075.html
https://www.redhat.com/security/data/cve/CVE-2017-9076.html
https://www.redhat.com/security/data/cve/CVE-2017-9077.html

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false