|Category:||CentOS Local Security Checks|
|Title:||CentOS Update for bpftool CESA-2018:3651 centos7|
|Summary:||The remote host is missing an update for the 'bpftool'; package(s) announced via the CESA-2018:3651 advisory.|
The remote host is missing an update for the 'bpftool'
package(s) announced via the CESA-2018:3651 advisory.
The kernel packages contain the Linux kernel, the core of any Linux
* kernel: stack-based buffer overflow in chap_server_compute_md5() in iscsi
* kernel: NULL pointer dereference in af_netlink.c:__netlink_ns_capable()
allows for denial of service (CVE-2018-14646)
For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.
Red Hat would like to thank Vincent Pelletier for reporting CVE-2018-14633
and Christian Brauner for reporting CVE-2018-14646.
These updated kernel packages include also numerous bug fixes. Space
precludes documenting all of the bug fixes in this advisory.
bpftool on CentOS 7.
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2018-14633|
Common Vulnerability Exposure (CVE) ID: CVE-2018-14646
|Copyright||Copyright (C) 2018 Greenbone Networks GmbH|
|This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.