CentOS Update for kernel CESA-2018:2390 centos6

Information

Severity

Severity

High

Family

Family

CentOS Local Security Checks

CVSSv2 Base

CVSSv2 Base

7.2

CVSSv2 Vector

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

3 years ago

Modified

Modified

3 years ago

Summary

Check the version of kernel

Insight

Insight

The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646) * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3693) * kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901) * kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation (CVE-2017-0861) * kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265) * kernel: race condition in snd_seq_write() may lead to UAF or OOB-access (CVE-2018-7566) * kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 Vladimir Kiriansky (MIT) and Carl Waldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693 and Vegard Nossum (Oracle Corporation) for reporting CVE-2018-10901. Bug Fix(es): * The Least recently used (LRU) operations are batched by caching pages in per-cpu page vectors to prevent contention of the heavily used lru_lock spinlock. The page vectors can hold even the compound pages. Previously, the ... Description truncated, please see the referenced URL(s) for more information.

Affected Software

Affected Software

kernel on CentOS 6

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Please install the updated packages.

Scan for free your assets for this vulnerability + 99,568 other vulnerabilities

It is easy and free to get started with Mageni and it can be installed in Windows, macOS and Linux.

Processing. Please wait...

Free for 7-days then $4 USD monthly regardless of how many IPs, scans, users, or deployments you have. No Contracts, Cancel at Anytime and 7-days Money-Back Guarantee.

How Mageni can help you?

How Mageni can help you?

Mageni can help you to know and remediate your vulnerabilities reducing your risk exposure and minimizing the likelihood of a data breach while decreasing your spending.

60% of breach victims were breached due to an unpatched known vulnerability1

62% were unaware that they were vulnerable prior to the data breach1

$4.24 million cost per data breach on average; highest in 17-year report history2

Citations 1. Costs and Consequences of Gaps in Vulnerability Response, Ponemom Institute 2. Cost of a Data Breach Report 2021, IBM

Mageni makes easy to find, prioritize, and remediate the vulnerabilities

Supported by industry-leading vulnerability intelligence and CompTIA PenTest+ professionals, Mageni puts security expertise in your hands.

Internal and External Scans

Scan your internal and public assets for vulnerabilities.

Remediate

Get the recommendations to mitigate the risks and vulnerabilities.

Secure your Applications

Scan third-party applications like Java, Chrome, Adobe and more.

Comprehensive Coverage

Scan servers, workstations and network devices for vulnerabilities.

Report and Analyze

Receive a report of the vulnerabilities that affect your assets.

More visibility

Perform non-credentialed or credentialed scans.

Prioritize

Prioritize the vulnerabilities based on CVSS, severity and other variables.

SSL Certificates

Improve the security of your secure layer and certificates.

Simple and transparent pricing

Get started for free with 7 days trial plus Money-Back Guarantee for 7 days after the end of the trial

Stop worrying about your budget or licenses limits

Mageni provides unlimited vulnerability scans for unlimited assets at a fixed price so you don't have to worry anymore about your budget or license limits.

What's included

  • Unlimited vulnerability scans for unlimited assets

  • Support by Certified CompTIA PenTest+ Professional

  • Access to Support Portal

  • Email Support Monday through Friday 9AM-5PM EST

  • Vulnerability Database Updates

  • Software Maintenance with Patches and Bug Fixes

  • Unlimited Support Cases

  • Software Updates and Upgrades

Why should I get a subscription now?

Enjoy the peace of mind and confidence that comes from having Mageni working for you.

For the Earth

Like you, we love the planet, that's why Mageni is a Stripe Climate member and 1% of your subscription goes to carbon removal.

Start for Free plus Money-back Guarantee

Get started for free with 7 days trial plus your eligible for a full reimbursement within 7 calendar days of the end of your trial. You don't need a reason to request a refund and we won't ask you a question.

Talk to a CompTIA Pentest+ when you need

CompTIA PenTest+ is the certification for cybersecurity professionals tasked with penetration testing and vulnerability management. CompTIA Pentest+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.

Payments Processed By Stripe

For your security all subscriptions made through this website (mageni.net) are processed by Stripe (stripe.com). Stripe has been audited by an independent PCI Qualified Security Assessor (QSA) and is certified as a PCI Level 1 Service Provider. This is the most stringent level of certification available in the payments industry.

Frequently asked questions

Can’t find the answer? Send an email to help@mageni.net

Do you offer a free plan?
No, and the reason is that to provide you a great service Mageni have invested heavily in people, process and technology. The personal developing the product and providing support is CompTIA PenTest+ certified. The infrastructure uses Amazon AWS datacenters which are state of the art. So the subscription is priced at only $4 USD per month to provide you a great service at the most affordable price.
Can I install Mageni in Windows, macOS and Linux?
Yes, please read the documentation for details.
Can I get a refund?
Yes, contact us within the first 7 days after the end of the trial and we'll send you the refund. No questions asked
Who process my credit card information?
Stripe a PCI DSS Certified payment platform
Can I cancel the subscription?
Yes, please feel free to cancel your subscription at anytime
Can I pause the subscription?
Yes, please feel free to pause your subscription at anytime. While is paused it won't generate charges but you won't receive updates.
Can I delete my account?
Yes, please feel free to do so at anytime, just make sure that prior to that you cancel your subscription
What are support hours?
Monday to Friday from 9AM to 5PM EST (New York)
Can I verify the CompTIA Pentest+ Certification?
Yes, please contact us
Is this subscription a contract?
No, you can cancel it at anytime that you wish.
How can I open a support ticket?
Please visit the support portal
Is the license limited per installation?
If you are a MSP (Managed Service Provider) or a Security Company, yes, the license is limited and please contact us for pricing. If you are an organization who whishes to install it on many branches the license is not limited and you can use the same license to install Mageni in your branches.

Ready to get started? Start you 7-day free trial