Systems with AUTO_UPDATE=True (DEFAULT) in /etc/sysconfig/kcare/kcare.conf will automatically update, and no action is needed for them.
You can manually update the serv
er by running:
# /usr/bin/kcarectl --update
CHANGELOG:
cl6h:
CVE-2017-10661: Race condition in fs/timerfd.c in the Linux kernel before 4.10.15
allows local users to gain privileges or cause a denial of service (list corruption
or use-after-free) via simultaneous file-descriptor operations that leverage improper
might_cancel queueing.
CVE-2017-14489: The iscsi_if_rx function in drivers/scsi/scsi_transport_iscsi.c
in the Linux kernel through 4.13.2 allows local users to cause a denial of service
(panic) by leveraging incorrect length validation.
CVE-2018-1068: A flaw was found in the Linux 4.x kernel's implementation of 32-bit
syscall interface for bridging. This allowed a privileged user to arbitrarily
write to a limited range of kernel memory.
CVE-2018-1087: kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1,
kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux
kernel's KVM hypervisor handled exceptions delivered after a stack switch operation
via Mov SS or Pop SS instructions. During the stack switch operation, the processor
did not deliver interrupts and exceptions, rather they are delivered once the
first instruction after the stack switch is executed. An unprivileged KVM guest
user could use this flaw to crash the guest or, potentially, escalate their privileges
in the guest.
CVE-2018-8897: 'A statement in the System Programming Guide of the Intel 64 and
IA-32 Architectures Software Developer''s Manual (SDM) was mishandled in the development
of some or all operating-system kernels, resulting in unexpected behavior for
#DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for
example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD,
or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts
(including NMIs), data breakpoints, and single step trap exceptions until the
instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3).
(The inhibited data breakpoints are those on memory accessed by the MOV to SS
or POP to SS instruction itself.) Note that debug exceptions are not inhibited
by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If
the instruction following the MOV to SS or POP to SS instruction is an instruction
like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system
at CPL < 3, the debug exception is delivered after the transfer to CPL < 3 is
complete. OS kernels may not expect this order of events and may therefore experience
unexpected behavior when it occurs.'
cvelist: [CVE-2018-1068, CVE-2018-1087, CVE-2018-8897, CVE-2017-10661, CVE-2017-14489]
latest-version: 3.10.0-714.10.2.lve1.5.17.el7
==== deploy-prep ====
kernels='cl7 cl6h'
lkernel['cl7']=3.10.0-714.10.2.lve1.5.17.el7
lkernel['cl6h']=3.10.0-714.10.2.lve1.5.17.el6h
==== end of deploy-prep ====