Source: QUALYS
Description: CentOS has released security update for kernel to fix the vulnerabilities. Affected Products: centos 6
Impact: This vulnerability could be exploited to gain complete access to sensitive information.
Target:
Asset name: 192.168.56.201 - IP: 192.168.56.201
Asset name: 192.168.56.202 - IP: 192.168.56.202
Asset name: 192.168.56.203 - IP: 192.168.56.203
Solution: To resolve this issue, upgrade to the latest packages which contain a patch. Refer to CentOS advisory centos 6 (https://lists.centos.org/pipermail/centos-announce/2018-March/022801.html) for updates and patch information.
Patch:
Following are links for downloading patches to fix the vulnerabilities:
CESA-2018:0512: centos 6 (https://lists.centos.org/pipermail/centos-announce/2018-March/022801.html)
References:
QID: 440042
CVE: CVE-2017-5715, CVE-2017-5753, CVE-2017-5754
Category: CentOS
PCI Flagged: yes
Vendor References: CESA-2018:0512 centos 6
Bugtraq IDs: 102371, 102378, 102376, 106128
Max Severity: High
Exploitable: Yes
Date Discovered: 2024-06-01
Please see https://nucleus-qa2.nucleussec.com/nucleus/public/app/index.php?sso=b3JnX2lkJTNEMSUyNmRvbWFpbiUzRG51Y2xldXNzZWMuY29t#vuln/6009780/NDQwMDQy/UVVBTFlT/VnVsbi1Db21wbGlhbmNl/false/NjAwOTc4MA--/c3VtbWFyeQ--/false/MjAyNC0wNi0wMSAxMDo0MzowMA--/false for more information on these vulnerabilities
Issue was manually created by Nucleus user: Subhra Roy
Source: QUALYS
Description: CentOS has released security update for kernel to fix the vulnerabilities. Affected Products: centos 6
Impact: This vulnerability could be exploited to gain complete access to sensitive information.
Target:
Asset name: 192.168.56.201 - IP: 192.168.56.201
Asset name: 192.168.56.202 - IP: 192.168.56.202
Asset name: 192.168.56.203 - IP: 192.168.56.203
Solution: To resolve this issue, upgrade to the latest packages which contain a patch. Refer to CentOS advisory centos 6 (https://lists.centos.org/pipermail/centos-announce/2018-March/022801.html) for updates and patch information.
Patch:
Following are links for downloading patches to fix the vulnerabilities:
CESA-2018:0512: centos 6 (https://lists.centos.org/pipermail/centos-announce/2018-March/022801.html)
References:
QID: 440042
CVE: CVE-2017-5715, CVE-2017-5753, CVE-2017-5754
Category: CentOS
PCI Flagged: yes
Vendor References: CESA-2018:0512 centos 6
Bugtraq IDs: 102371, 102378, 102376, 106128
Max Severity: High
Exploitable: Yes
Date Discovered: 2024-06-01
Please see https://nucleus-qa2.nucleussec.com/nucleus/public/app/index.php?sso=b3JnX2lkJTNEMSUyNmRvbWFpbiUzRG51Y2xldXNzZWMuY29t#vuln/6009780/NDQwMDQy/UVVBTFlT/VnVsbi1Db21wbGlhbmNl/false/NjAwOTc4MA--/c3VtbWFyeQ--/false/MjAyNC0wNi0wMSAxMDo0MzowMA--/false for more information on these vulnerabilities
Issue was manually created by Nucleus user: Subhra Roy