- Home
- CVEs with nessus.description==An+update+for+kernel+is+now+available+for+Red+Hat+Enterprise+Linux+6.6+Advanced+Update+Support+and+Red+Hat+Enterprise+Linux+6.6+Telco+Extended+Update+Support.%0A%0ARed+Hat+Product+Security+has+rated+this+update+as+having+a+security+impact+of+Moderate.+A+Common+Vulnerability+Scoring+System+%28CVSS%29+base+score%2C+which+gives+a+detailed+severity+rating%2C+is+available+for+each+vulnerability+from+the+CVE+link%28s%29+in+the+References+section.%0A%0A%5BUpdated+10+May+2018%5D%0A%0AThe+references+to+CVE-2017-5754+x86+%2832-bit%29+mitigation+were+removed+because+Red+Hat+Enterprise+Linux+6.6+Advanced+Update+Support+and+Red+Hat+Enterprise+Linux+6.6+Telco+Extended+Update+Support+do+not+include+support+for+x86+32-bit+architecture.+Consequently%2C+impact+rating+of+this+erratum+was+changed+from+Important+to+Moderate.%0A%0AThe+kernel+packages+contain+the+Linux+kernel%2C+the+core+of+any+Linux+operating+system.%0A%0ASecurity+Fix%28es%29+%3A%0A%0A%2A+Kernel%3A+error+in+exception+handling+leads+to+DoS+%28CVE-2018-8897%29%0A%0AFor+more+details+about+the+security+issue%28s%29%2C+including+the+impact%2C+a+CVSS+score%2C+and+other+related+information%2C+refer+to+the+CVE+page%28s%29+listed+in+the+References+section.%0A%0ARed+Hat+would+like+to+thank+Nick+Peterson+%28Everdox+Tech+LLC%29+and+Andy+Lutomirski+for+reporting+this+issue.%0A%0ABug+Fix%28es%29+%3A%0A%0A%2A+If+an+NFSv3+client+mounted+a+subdirectory+of+an+exported+file+system%2C+a+directory+entry+to+the+mount+hosting+the+export+was+incorrectly+held+even+after+clearing+the+cache.+Consequently%2C+attempts+to+unmount+the+subdirectory+with+the+umount+command+failed+with+the+EBUSY+error.+With+this+update%2C+the+underlying+source+code+has+been+fixed%2C+and+the+unmount+operation+now+succeeds+as+expected+in+the+described+situation.+%28BZ%231538588%29%0A%0A%2A+The+kernel+build+requirements+have+been+updated+to+the+GNU+Compiler+Collection+%28GCC%29+compiler+version+that+has+the+support+for+Retpolines.%0AThe+Retpolines+mechanism+is+a+software+construct+that+leverages+specific+knowledge+of+the+underlying+hardware+to+mitigate+the+branch+target+injection%2C+also+known+as+Spectre+variant+2+vulnerability+described+in+CVE-2017-5715.+%28BZ%231554254%29
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top