RHEL 7 : kernel-rt (RHSA-2016:2584)

critical Nessus 插件 ID 94547

简介

远程 Red Hat 主机缺少一个或多个安全更新。

描述

kernel-rt 的更新现可用于 Red Hat Enterprise Linux 7。Red Hat 产品安全团队将此更新评级为具有重要安全影响。可从“参考”部分中的 CVE 链接获取通用漏洞评分系统 (CVSS) 基本分数,其针对每个漏洞给出了详细的严重性等级。kernel-rt 程序包提供实时 Linux 内核,其可针对具有极高确定性需求的系统启用微调。安全修复:* 已发现 Linux 内核的 IPv6 实现错误处理套接字选项。本地攻击者会滥用套接字选项的并发访问,以提升其权限,或通过构建的 sendmsg 系统调用,造成拒绝服务(释放后重用及系统崩溃)。(CVE-2016-3841,重要)* 在 Linux 内核中发现数个中等和低等影响安全问题。空间有限,无法在此公告中记载每个问题。请参阅“参考”部分中的 CVE 链接,获取各个漏洞描述。(CVE-2013-4312, CVE-2015-8374, CVE-2015-8543, CVE-2015-8812, CVE-2015-8844, CVE-2015-8845, CVE-2016-2053, CVE-2016-2069, CVE-2016-2847, CVE-2016-3156, CVE-2016-4581, CVE-2016-4794, CVE-2016-5829, CVE-2016-6136, CVE-2016-6198, CVE-2016-6327, CVE-2016-6480, CVE-2015-8746, CVE-2015-8956, CVE-2016-2117, CVE-2016-2384, CVE-2016-3070, CVE-2016-3699, CVE-2016-4569, CVE-2016-4578) Red Hat 在此感谢 Philip Pettersson (Samsung) 报告 CVE-2016-2053;感谢 Tetsuo Handa 报告 CVE-2016-2847;感谢 Virtuozzo 内核团队和 Solar Designer (Openwall) 报告 CVE-2016-3156;感谢 Justin Yackoski (Cryptonite) 报告 CVE-2016-2117;以及感谢 Linn Crosetto (HP) 报告 CVE-2016-3699。CVE-2015-8812 问题由 Venkatesh Pottem(Red Hat 工程部)发现;CVE-2015-8844 和 CVE-2015-8845 问题由 Miroslav Vadkerti(Red Hat 工程部)发现;CVE-2016-4581 问题由 Eric W. Biederman (Red Hat) 发现;CVE-2016-6198 问题由 CAI Qian (Red Hat) 发现;CVE-2016-3070 问题由 Jan Stancek (Red Hat) 发现。其他更改:如需有关此发行版本的详细变更信息,请参阅可从“参考”部分链接的 Red Hat Enterprise Linux 7.3 版本说明。

解决方案

更新受影响的程序包。

另见

https://access.redhat.com/errata/RHSA-2016:2584

https://access.redhat.com/security/cve/cve-2013-4312

https://access.redhat.com/security/cve/cve-2015-8374

https://access.redhat.com/security/cve/cve-2015-8543

https://access.redhat.com/security/cve/cve-2015-8746

https://access.redhat.com/security/cve/cve-2015-8812

https://access.redhat.com/security/cve/cve-2015-8844

https://access.redhat.com/security/cve/cve-2015-8845

https://access.redhat.com/security/cve/cve-2015-8956

https://access.redhat.com/security/cve/cve-2016-2053

https://access.redhat.com/security/cve/cve-2016-2069

https://access.redhat.com/security/cve/cve-2016-2117

https://access.redhat.com/security/cve/cve-2016-2384

https://access.redhat.com/security/cve/cve-2016-2847

https://access.redhat.com/security/cve/cve-2016-3070

https://access.redhat.com/security/cve/cve-2016-3156

https://access.redhat.com/security/cve/cve-2016-3699

https://access.redhat.com/security/cve/cve-2016-3841

https://access.redhat.com/security/cve/cve-2016-4569

https://access.redhat.com/security/cve/cve-2016-4578

https://access.redhat.com/security/cve/cve-2016-4581

https://access.redhat.com/security/cve/cve-2016-4794

https://access.redhat.com/security/cve/cve-2016-5829

https://access.redhat.com/security/cve/cve-2016-6136

https://access.redhat.com/security/cve/cve-2016-6198

https://access.redhat.com/security/cve/cve-2016-6327

https://access.redhat.com/security/cve/cve-2016-6480

https://access.redhat.com/security/cve/cve-2017-13167

插件详情

严重性: Critical

ID: 94547

文件名: redhat-RHSA-2016-2584.nasl

版本: 2.12

类型: local

代理: unix

发布时间: 2016/11/4

最近更新时间: 2019/10/24

支持的传感器: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

风险信息

VPR

风险因素: High

分数: 7.1

CVSS v2

风险因素: Critical

基本分数: 10

时间分数: 8.7

矢量: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

风险因素: Critical

基本分数: 9.8

时间分数: 9.4

矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

时间矢量: CVSS:3.0/E:H/RL:O/RC:C

漏洞信息

CPE: p-cpe:/a:redhat:enterprise_linux:kernel-rt, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-debuginfo, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-devel, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm-debuginfo, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debuginfo, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debuginfo-common-x86_64, p-cpe:/a:redhat:enterprise_linux:kernel-rt-devel, p-cpe:/a:redhat:enterprise_linux:kernel-rt-doc, p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm, p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm-debuginfo, p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace, p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-debuginfo, p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-devel, p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-kvm, p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-kvm-debuginfo, cpe:/o:redhat:enterprise_linux:7

必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

可利用: true

易利用性: Exploits are available

补丁发布日期: 2016/11/3

漏洞发布日期: 2015/12/28

参考资料信息

CVE: CVE-2013-4312, CVE-2015-8374, CVE-2015-8543, CVE-2015-8746, CVE-2015-8812, CVE-2015-8844, CVE-2015-8845, CVE-2015-8956, CVE-2016-2053, CVE-2016-2069, CVE-2016-2117, CVE-2016-2384, CVE-2016-2847, CVE-2016-3070, CVE-2016-3156, CVE-2016-3699, CVE-2016-3841, CVE-2016-4569, CVE-2016-4578, CVE-2016-4581, CVE-2016-4794, CVE-2016-5829, CVE-2016-6136, CVE-2016-6198, CVE-2016-6327, CVE-2016-6480, CVE-2017-13167

RHSA: 2016:2584