[root@localhost ~]# cat /etc/redhat-release CentOS Linux release 7.2.1511 (Core)
Repair command:
Use the root account login Shell, type the following code Enter:
Centos / RedHat: yum -y Update
Ubuntu: APT-GET Update -y
command is completed you need to restart the system: reboot
Verify repair:
Ali landed and so central management console, one by one to verify repair.
RHSA-2018: 0151- Important: kernel security updates and BUG repair (need to restart, there is EXP, local privilege escalation)
Vulnerability ID | The impact points | Vulnerability Notice |
CVE-2015-8539 | 7.2 | Linux kernel local privilege escalation vulnerabilities (CNVD-2015-08501) |
CVE-2017-12192 | 5.5 | Since KEYCTL_READ cause a null pointer dereferencing the minus key |
CVE-2017-12193 | 5.5 | Linux kernel Denial of Service |
CVE-2017-15649 | 7.8 | Linux kernel net / packet / af_packet. C file local authority enhanced vulnerability |
CVE-2017-5715 | 6.7 | Spectre variant 2, the branch target injection vulnerability |
CVE-2017-5753 | 8.2 | CPU processor core vulnerability exists Meltdown (CNVD-2018-00304) |
CVE-2017-5754 | 8.1 | CPU processor core vulnerability exists Spectre |
CVE-2017-7472 | 5.5 | Linux kernel Denial of Service Vulnerability |
Repair command:
yum update kernel yum update python-perf yum update kernel-headers yum update kernel-tools yum update kernel-tools-libs
After the repair, you need to reboot.