KernelCare update was released

9 views
Skip to first unread message

KernelCare

unread,
Oct 15, 2019, 5:48:05 AM10/15/19
to kernelcar...@googlegroups.com
Dear Customers,

KernelCare prepared security updates for your system.
Systems with AUTO_UPDATE=True (DEFAULT) in /etc/sysconfig/kcare/kcare.conf will automatically update, and no action is needed for them.
You can manually update the server by running:

/usr/bin/kcarectl --update

Changelog:

centos7:
CVE-2018-16884: A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+
shares mounted in different network namespaces at the same time can make bc_svc_process()
use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious
container user can cause a host kernel memory corruption and a system panic. Due
to the nature of the flaw, privilege escalation cannot be fully ruled out.
cvelist: [CVE-2018-16884]
latest-version: kernel-3.10.0-1062.1.2.el7

KernelCare

unread,
Oct 23, 2019, 6:27:04 AM10/23/19
to kernelcar...@googlegroups.com
Dear Customers,

KernelCare prepared security updates for your system.
Systems with AUTO_UPDATE=True (DEFAULT) in /etc/sysconfig/kcare/kcare.conf will automatically update, and no action is needed for them.
You can manually update the server by running:

/usr/bin/kcarectl --update

Changelog:

rhel7:
CVE-2018-16884: A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+
shares mounted in different network namespaces at the same time can make bc_svc_process()
use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious
container user can cause a host kernel memory corruption and a system panic. Due
to the nature of the flaw, privilege escalation cannot be fully ruled out.
cvelist: [CVE-2018-16884]
latest-version: kernel-3.10.0-1062.4.1.el7
oel7:
CVE-2018-16884: A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+
shares mounted in different network namespaces at the same time can make bc_svc_process()
use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious
container user can cause a host kernel memory corruption and a system panic. Due
to the nature of the flaw, privilege escalation cannot be fully ruled out.
cvelist: [CVE-2018-16884]
latest-version: kernel-3.10.0-1062.4.1.el7

KernelCare

unread,
Oct 23, 2019, 1:37:18 PM10/23/19
to kernelcar...@googlegroups.com
Dear Customers,

KernelCare prepared security updates for your system.
Systems with AUTO_UPDATE=True (DEFAULT) in /etc/sysconfig/kcare/kcare.conf will automatically update, and no action is needed for them.
You can manually update the server by running:

/usr/bin/kcarectl --update

Changelog:

centos7:
Reply all
Reply to author
Forward
0 new messages