8.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:P/I:P/A:C
7 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
0.01 Low
EPSS
Percentile
84.0%
CentOS Errata and Security Advisory CESA-2018:3651
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
kernel: stack-based buffer overflow in chap_server_compute_md5() in iscsi target (CVE-2018-14633)
kernel: NULL pointer dereference in af_netlink.c:__netlink_ns_capable() allows for denial of service (CVE-2018-14646)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Vincent Pelletier for reporting CVE-2018-14633 and Christian Brauner for reporting CVE-2018-14646.
Bug Fix(es):
These updated kernel packages include also numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article: https://access.redhat.com/articles/3714371
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2018-December/085294.html
Affected packages:
bpftool
kernel
kernel-debug
kernel-debug-devel
kernel-devel
kernel-headers
kernel-tools
kernel-tools-libs
kernel-tools-libs-devel
perf
python-perf
Upstream details at:
https://access.redhat.com/errata/RHSA-2018:3651
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 7 | x86_64 | bpftool | < 3.10.0-957.1.3.el7 | bpftool-3.10.0-957.1.3.el7.x86_64.rpm |
CentOS | 7 | x86_64 | kernel | < 3.10.0-957.1.3.el7 | kernel-3.10.0-957.1.3.el7.x86_64.rpm |
CentOS | 7 | x86_64 | kernel-debug | < 3.10.0-957.1.3.el7 | kernel-debug-3.10.0-957.1.3.el7.x86_64.rpm |
CentOS | 7 | x86_64 | kernel-debug-devel | < 3.10.0-957.1.3.el7 | kernel-debug-devel-3.10.0-957.1.3.el7.x86_64.rpm |
CentOS | 7 | x86_64 | kernel-devel | < 3.10.0-957.1.3.el7 | kernel-devel-3.10.0-957.1.3.el7.x86_64.rpm |
CentOS | 7 | x86_64 | kernel-headers | < 3.10.0-957.1.3.el7 | kernel-headers-3.10.0-957.1.3.el7.x86_64.rpm |
CentOS | 7 | x86_64 | kernel-tools | < 3.10.0-957.1.3.el7 | kernel-tools-3.10.0-957.1.3.el7.x86_64.rpm |
CentOS | 7 | x86_64 | kernel-tools-libs | < 3.10.0-957.1.3.el7 | kernel-tools-libs-3.10.0-957.1.3.el7.x86_64.rpm |
CentOS | 7 | x86_64 | kernel-tools-libs-devel | < 3.10.0-957.1.3.el7 | kernel-tools-libs-devel-3.10.0-957.1.3.el7.x86_64.rpm |
CentOS | 7 | x86_64 | perf | < 3.10.0-957.1.3.el7 | perf-3.10.0-957.1.3.el7.x86_64.rpm |
8.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:P/I:P/A:C
7 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
0.01 Low
EPSS
Percentile
84.0%