Lucene search

K
centosCentOS ProjectCESA-2020:5023
HistoryNov 18, 2020 - 6:02 p.m.

bpftool, kernel, perf, python security update

2020-11-1818:02:50
CentOS Project
lists.centos.org
248

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.6 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0005 Low

EPSS

Percentile

17.5%

CentOS Errata and Security Advisory CESA-2020:5023

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: buffer over write in vgacon_scroll (CVE-2020-14331)

  • kernel: net-sysfs: *_queue_add_kobject refcount issue (CVE-2019-20811)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • [OSP13,mlx5] SRIOV VF still sending traffic when PF is down (BZ#1733181)

  • gpf panic in virtio_check_driver_offered_fxature+6 when running sg_inq on a dm map for a lost virtio_blk (BZ#1811893)

  • GPF panic in qlt_free_session_done+626 (BZ#1826127)

  • [ Brazos ] “Core(s) per socket” and “Socket” values are interchanged in lscpu output. (kernel) (BZ#1826306)

  • megaraid Aero: call trace observed during reboots (BZ#1828312)

  • Crash in mptscsih_io_done() due to buffer overrun in sense_buf_pool (BZ#1829803)

  • The qedf driver fails to re-establish the online F/C port state when the downstream F/C port is toggled unless a LIP is forced (BZ#1836443)

  • tcp_fragment() limit causes packet drop under normal TCP load (BZ#1847765)

  • ip link command shows state as UNKNOWN for MACVLAN interface (BZ#1848950)

  • Lenovo TS 7Z60 Cooper Lake: PCI BAR firmware bug (BZ#1849223)

  • [RHEL-7/mlx4] ipoib_flush ipoib_ib_dev_flush_light [ib_ipoib] (BZ#1858707)

  • Uprobes crashes processes under GDB - SIGTRAP and SIGSEGV (BZ#1861396)

  • kernel-3.10.0-1127.19.1.el7.x86_64 crashes after an SSH connection attempt when running as a Xen PV guest on AMD Epyc Rome (BZ#1882468)

  • Null ptr deref after nf_reinject->nf_queue_entry_release_refs hits Attempt to release error doing inet_sock_destruct() (BZ#1885682)

Users of kernel are advised to upgrade to these updated packages, which fix these bugs.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2020-November/085992.html

Affected packages:
bpftool
kernel
kernel-abi-whitelists
kernel-debug
kernel-debug-devel
kernel-devel
kernel-doc
kernel-headers
kernel-tools
kernel-tools-libs
kernel-tools-libs-devel
perf
python-perf

Upstream details at:
https://access.redhat.com/errata/RHSA-2020:5023

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.6 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0005 Low

EPSS

Percentile

17.5%