![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.883107 |
Kategorie: | CentOS Local Security Checks |
Titel: | CentOS Update for bpftool CESA-2019:2600 centos7 |
Zusammenfassung: | The remote host is missing an update for the 'bpftool'; package(s) announced via the CESA-2019:2600 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'bpftool' package(s) announced via the CESA-2019:2600 advisory. Vulnerability Insight: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125) * kernel: brcmfmac heap buffer overflow in brcmf_wowl_nd_results (CVE-2019-9500) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [mlx4] VXLAN over VLAN TCP segmentation (BZ#1734333) * Race condition in /dev/sg due to missing synchronization causes corruption in RHV (BZ#1737380) * panic handing smb2_reconnect due to a use after free (BZ#1737382) * NFSv4.1 client stuck in infinite loop when received NFS4ERR_SEQ_MISORDERED error (BZ#1739077) * Backport TCP follow-up for small buffers (BZ#1739130) Affected Software/OS: 'bpftool' package(s) on CentOS 7. Solution: Please install the updated package(s). CVSS Score: 7.9 CVSS Vector: AV:A/AC:M/Au:N/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2019-1125 RHBA-2019:2824 https://access.redhat.com/errata/RHBA-2019:2824 RHBA-2019:3248 https://access.redhat.com/errata/RHBA-2019:3248 RHSA-2019:2600 https://access.redhat.com/errata/RHSA-2019:2600 RHSA-2019:2609 https://access.redhat.com/errata/RHSA-2019:2609 RHSA-2019:2695 https://access.redhat.com/errata/RHSA-2019:2695 RHSA-2019:2696 https://access.redhat.com/errata/RHSA-2019:2696 RHSA-2019:2730 https://access.redhat.com/errata/RHSA-2019:2730 RHSA-2019:2899 https://access.redhat.com/errata/RHSA-2019:2899 RHSA-2019:2900 https://access.redhat.com/errata/RHSA-2019:2900 RHSA-2019:2975 https://access.redhat.com/errata/RHSA-2019:2975 RHSA-2019:3011 https://access.redhat.com/errata/RHSA-2019:3011 RHSA-2019:3220 https://access.redhat.com/errata/RHSA-2019:3220 http://packetstormsecurity.com/files/156337/SWAPGS-Attack-Proof-Of-Concept.html http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200408-01-swapgs-en https://kc.mcafee.com/corporate/index?page=content&id=SB10297 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1125 https://www.synology.com/security/advisory/Synology_SA_19_32 Common Vulnerability Exposure (CVE) ID: CVE-2019-9500 https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html https://git.kernel.org/linus/1b5e2423164b3670e8bc9174e4762d297990deff https://kb.cert.org/vuls/id/166939/ |
Copyright | Copyright (C) 2019 Greenbone AG |
Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |