Skip to content

Nucleus: 440042 #13

@RoySubhra1988

Description

@RoySubhra1988

Source: QUALYS
Description: CentOS has released security update for kernel to fix the vulnerabilities. Affected Products: centos 6

Impact: This vulnerability could be exploited to gain complete access to sensitive information.

Target:
Asset name: 192.168.56.201 - IP: 192.168.56.201
Asset name: 192.168.56.202 - IP: 192.168.56.202
Asset name: 192.168.56.203 - IP: 192.168.56.203

Solution: To resolve this issue, upgrade to the latest packages which contain a patch. Refer to CentOS advisory centos 6 (https://lists.centos.org/pipermail/centos-announce/2018-March/022801.html) for updates and patch information.
Patch:
Following are links for downloading patches to fix the vulnerabilities:
CESA-2018:0512: centos 6 (https://lists.centos.org/pipermail/centos-announce/2018-March/022801.html)

References:
QID: 440042
CVE: CVE-2017-5715, CVE-2017-5753, CVE-2017-5754
Category: CentOS
PCI Flagged: yes
Vendor References: CESA-2018:0512 centos 6
Bugtraq IDs: 102371, 102378, 102376, 106128

Max Severity: High
Exploitable: Yes
Date Discovered: 2024-06-01

Please see https://nucleus-qa2.nucleussec.com/nucleus/public/app/index.php?sso=b3JnX2lkJTNEMSUyNmRvbWFpbiUzRG51Y2xldXNzZWMuY29t#vuln/6009780/NDQwMDQy/UVVBTFlT/VnVsbi1Db21wbGlhbmNl/false/NjAwOTc4MA--/c3VtbWFyeQ--/false/MjAyNC0wNi0wMSAxMDo0MzowMA--/false for more information on these vulnerabilities
Issue was manually created by Nucleus user: Subhra Roy

Metadata

Metadata

Assignees

Labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions