CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
46.4%
CentOS Errata and Security Advisory CESA-2019:2473
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
Kernel: page cache side channel attacks (CVE-2019-5489)
kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service (CVE-2017-17805)
kernel: Unprivileged users able to inspect kernel stacks of arbitrary tasks (CVE-2018-17972)
kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
OOPS with Null Pointer exception in v4l2_ctrl_query_menu when second arg of function is NULL (BZ#1647975)
Another RHEL 6 hang in congestion_wait() (BZ#1658254)
kernel crash after running user space script (BZ#1663262)
RHEL-6.10: Don’t report the use of retpoline on Skylake as vulnerable (BZ#1666102)
Bad pagetable: 000f “*pdpt = 0000000000000000 *pde = 0000000000000000” RHEL 6 32bit (BZ#1702782)
fs/binfmt_misc.c: do not allow offset overflow [6.10.z] (BZ#1710149)
Wrong spectre backport causing linux headers to break compilation of 3rd party packages (BZ#1722185)
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2019-August/085566.html
Affected packages:
kernel
kernel-abi-whitelists
kernel-debug
kernel-debug-devel
kernel-devel
kernel-doc
kernel-firmware
kernel-headers
perf
python-perf
Upstream details at:
https://access.redhat.com/errata/RHSA-2019:2473
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 6 | i686 | kernel | < 2.6.32-754.18.2.el6 | kernel-2.6.32-754.18.2.el6.i686.rpm |
CentOS | 6 | noarch | kernel-abi-whitelists | < 2.6.32-754.18.2.el6 | kernel-abi-whitelists-2.6.32-754.18.2.el6.noarch.rpm |
CentOS | 6 | i686 | kernel-debug | < 2.6.32-754.18.2.el6 | kernel-debug-2.6.32-754.18.2.el6.i686.rpm |
CentOS | 6 | i686 | kernel-debug-devel | < 2.6.32-754.18.2.el6 | kernel-debug-devel-2.6.32-754.18.2.el6.i686.rpm |
CentOS | 6 | i686 | kernel-devel | < 2.6.32-754.18.2.el6 | kernel-devel-2.6.32-754.18.2.el6.i686.rpm |
CentOS | 6 | noarch | kernel-doc | < 2.6.32-754.18.2.el6 | kernel-doc-2.6.32-754.18.2.el6.noarch.rpm |
CentOS | 6 | noarch | kernel-firmware | < 2.6.32-754.18.2.el6 | kernel-firmware-2.6.32-754.18.2.el6.noarch.rpm |
CentOS | 6 | i686 | kernel-headers | < 2.6.32-754.18.2.el6 | kernel-headers-2.6.32-754.18.2.el6.i686.rpm |
CentOS | 6 | i686 | perf | < 2.6.32-754.18.2.el6 | perf-2.6.32-754.18.2.el6.i686.rpm |
CentOS | 6 | i686 | python-perf | < 2.6.32-754.18.2.el6 | python-perf-2.6.32-754.18.2.el6.i686.rpm |
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
46.4%