- Home
- CVEs with nessus.description==From+Red+Hat+Security+Advisory+2017%3A0086+%3A%0A%0AAn+update+for+kernel+is+now+available+for+Red+Hat+Enterprise+Linux+7.%0A%0ARed+Hat+Product+Security+has+rated+this+update+as+having+a+security+impact+of+Important.+A+Common+Vulnerability+Scoring+System+%28CVSS%29+base+score%2C+which+gives+a+detailed+severity+rating%2C+is+available+for+each+vulnerability+from+the+CVE+link%28s%29+in+the+References+section.%0A%0AThe+kernel+packages+contain+the+Linux+kernel%2C+the+core+of+any+Linux+operating+system.%0A%0AThese+updated+kernel+packages+include+several+security+issues+and+numerous+bug+fixes%2C+some+of+which+you+can+see+below.+Space+precludes+documenting+all+of+these+bug+fixes+in+this+advisory.+To+see+the+complete+list+of+bug+fixes%2C+users+are+directed+to+the+related+Knowledge+Article%3A+https%3A%2F%2Faccess.redhat.com%2F+articles%2F2857831.%0A%0ASecurity+Fix%28es%29+%3A%0A%0A%2A+A+use-after-free+vulnerability+was+found+in+the+kernel%27s+socket+recvmmsg+subsystem.+This+may+allow+remote+attackers+to+corrupt+memory+and+may+allow+execution+of+arbitrary+code.+This+corruption+takes+place+during+the+error+handling+routines+within+__sys_recvmmsg%28%29+function.%0A%28CVE-2016-7117%2C+Important%29%0A%0A%2A+A+use-after-free+vulnerability+was+found+in+tcp_xmit_retransmit_queue+and+other+tcp_%2A+functions.+This+condition+could+allow+an+attacker+to+send+an+incorrect+selective+acknowledgment+to+existing+connections%2C+possibly+resetting+a+connection.%0A%28CVE-2016-6828%2C+Moderate%29%0A%0A%2A+A+flaw+was+found+in+the+Linux+kernel%27s+implementation+of+the+SCTP+protocol.+A+remote+attacker+could+trigger+an+out-of-bounds+read+with+an+offset+of+up+to+64kB+potentially+causing+the+system+to+crash.%0A%28CVE-2016-9555%2C+Moderate%29%0A%0ABug+Fix%28es%29+%3A%0A%0A%2A+Previously%2C+the+performance+of+Internet+Protocol+over+InfiniBand+%28IPoIB%29+was+suboptimal+due+to+a+conflict+of+IPoIB+with+the+Generic+Receive+Offload+%28GRO%29+infrastructure.+With+this+update%2C+the+data+cached+by+the+IPoIB+driver+has+been+moved+from+a+control+block+into+the+IPoIB+hard+header%2C+thus+avoiding+the+GRO+problem+and+the+corruption+of+IPoIB+address+information.+As+a+result%2C+the+performance+of+IPoIB+has+been+improved.+%28BZ%231390668%29%0A%0A%2A+Previously%2C+when+a+virtual+machine+%28VM%29+with+PCI-Passthrough+interfaces+was+recreated%2C+a+race+condition+between+the+eventfd+daemon+and+the+virqfd+daemon+occurred.+Consequently%2C+the+operating+system+rebooted.+This+update+fixes+the+race+condition.+As+a+result%2C+the+operating+system+no+longer+reboots+in+the+described+situation.%0A%28BZ%231391611%29%0A%0A%2A+Previously%2C+a+packet+loss+occurred+when+the+team+driver+in+round-robin+mode+was+sending+a+large+number+of+packets.+This+update+fixes+counting+of+the+packets+in+the+round-robin+runner+of+the+team+driver%2C+and+the+packet+loss+no+longer+occurs+in+the+described+situation.+%28BZ%231392023%29%0A%0A%2A+Previously%2C+the+virtual+network+devices+contained+in+the+deleted+namespace+could+be+deleted+in+any+order.+If+the+loopback+device+was+not+deleted+as+the+last+item%2C+other+netns+devices%2C+such+as+vxlan+devices%2C+could+end+up+with+dangling+references+to+the+loopback+device.%0AConsequently%2C+deleting+a+network+namespace+%28netns%29+occasionally+ended+by+a+kernel+oops.+With+this+update%2C+the+underlying+source+code+has+been+fixed+to+ensure+the+correct+order+when+deleting+the+virtual+network+devices+on+netns+deletion.+As+a+result%2C+the+kernel+oops+no+longer+occurs+under+the+described+circumstances.+%28BZ%231392024%29%0A%0A%2A+Previously%2C+a+Kabylake+system+with+a+Sunrise+Point+Platform+Controller+Hub+%28PCH%29+with+a+PCI+device+ID+of+0xA149+showed+the+following+warning+messages+during+the+boot+%3A%0A%0A%27Unknown+Intel+PCH+%280xa149%29+detected.%27+%27Warning%3A+Intel+Kabylake+processor+with+unknown+PCH+-+this+hardware+has+not+undergone+testing+by+Red+Hat+and+might+not+be+certified.+Please+consult+https%3A%2F+%2Fhardware.redhat.com+for+certified+hardware.%27%0A%0AThe+messages+were+shown+because+this+PCH+was+not+properly+recognized.%0AWith+this+update%2C+the+problem+has+been+fixed%2C+and+the+operating+system+now+boots+without+displaying+the+warning+messages.+%28BZ%231392033%29%0A%0A%2A+Previously%2C+the+operating+system+occasionally+became+unresponsive+after+a+long+run.+This+was+caused+by+a+race+condition+between+the+try_to_wake_up%28%29+function+and+a+woken+up+task+in+the+core+scheduler.%0AWith+this+update%2C+the+race+condition+has+been+fixed%2C+and+the+operating+system+no+longer+locks+up+in+the+described+scenario.+%28BZ%231393719%29
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top