6.9 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
0.001 Low
EPSS
Percentile
26.7%
CentOS Errata and Security Advisory CESA-2018:0395
The kernel packages contain the Linux kernel, the core of any Linux operating system.
These updated kernel packages include several security issues and numerous
bug fixes, some of which you can see below. Space precludes documenting
all of these bug fixes in this advisory. To see the complete list of bug
fixes, users are directed to the related Knowledge Article:
https://access.redhat.com/articles/3368501.
Security Fix(es):
Kernel: KVM: MMU potential stack buffer overrun during page walks (CVE-2017-12188, Important)
Kernel: KVM: debug exception via syscall emulation (CVE-2017-7518, Moderate)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2018-March/084930.html
Affected packages:
kernel
kernel-abi-whitelists
kernel-debug
kernel-debug-devel
kernel-devel
kernel-doc
kernel-headers
kernel-tools
kernel-tools-libs
kernel-tools-libs-devel
perf
python-perf
Upstream details at:
https://access.redhat.com/errata/RHSA-2018:0395
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 7 | x86_64 | kernel | < 3.10.0-693.21.1.el7 | kernel-3.10.0-693.21.1.el7.x86_64.rpm |
CentOS | 7 | noarch | kernel-abi-whitelists | < 3.10.0-693.21.1.el7 | kernel-abi-whitelists-3.10.0-693.21.1.el7.noarch.rpm |
CentOS | 7 | x86_64 | kernel-debug | < 3.10.0-693.21.1.el7 | kernel-debug-3.10.0-693.21.1.el7.x86_64.rpm |
CentOS | 7 | x86_64 | kernel-debug-devel | < 3.10.0-693.21.1.el7 | kernel-debug-devel-3.10.0-693.21.1.el7.x86_64.rpm |
CentOS | 7 | x86_64 | kernel-devel | < 3.10.0-693.21.1.el7 | kernel-devel-3.10.0-693.21.1.el7.x86_64.rpm |
CentOS | 7 | noarch | kernel-doc | < 3.10.0-693.21.1.el7 | kernel-doc-3.10.0-693.21.1.el7.noarch.rpm |
CentOS | 7 | x86_64 | kernel-headers | < 3.10.0-693.21.1.el7 | kernel-headers-3.10.0-693.21.1.el7.x86_64.rpm |
CentOS | 7 | x86_64 | kernel-tools | < 3.10.0-693.21.1.el7 | kernel-tools-3.10.0-693.21.1.el7.x86_64.rpm |
CentOS | 7 | x86_64 | kernel-tools-libs | < 3.10.0-693.21.1.el7 | kernel-tools-libs-3.10.0-693.21.1.el7.x86_64.rpm |
CentOS | 7 | x86_64 | kernel-tools-libs-devel | < 3.10.0-693.21.1.el7 | kernel-tools-libs-devel-3.10.0-693.21.1.el7.x86_64.rpm |
6.9 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
0.001 Low
EPSS
Percentile
26.7%