![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.884220 |
Category: | CentOS Local Security Checks |
Title: | CentOS: Security Advisory for bpftool (CESA-2022:4642) |
Summary: | The remote host is missing an update for the 'bpftool'; package(s) announced via the CESA-2022:4642 advisory. |
Description: | Summary: The remote host is missing an update for the 'bpftool' package(s) announced via the CESA-2022:4642 advisory. Vulnerability Insight: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * kernel panic in mlx5_ib driver RHEL/CentOS 7.9 VM (BZ#2046571) * [RHEL-7.9] Get Call Trace about 'kernel/timer.c:1270 requeue_timers+0x15e/0x170' on specified AMD x86_64 system (BZ#2048502) * kernel NULL pointer dereference while calling dma_pool_alloc from the mlx5_core module (BZ#2055457) * Rhel 7.9 NFS Clients takes very long time to resume operations in an NFS Server failover scenario (BZ#2066699) * perf stat shows unsupported counters for Intel IceLake cpu (BZ#2072317) Affected Software/OS: 'bpftool' package(s) on CentOS 7. Solution: Please install the updated package(s). CVSS Score: 6.9 CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-0492 Debian Security Information: DSA-5095 (Google Search) https://www.debian.org/security/2022/dsa-5095 Debian Security Information: DSA-5096 (Google Search) https://www.debian.org/security/2022/dsa-5096 http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html http://packetstormsecurity.com/files/176099/Docker-cgroups-Container-Escape.html https://bugzilla.redhat.com/show_bug.cgi?id=2051505 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html |
Copyright | Copyright (C) 2022 Greenbone Networks GmbH |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |