Lucene search

K
redhatRedHatRHSA-2020:3010
HistoryJul 21, 2020 - 10:21 a.m.

(RHSA-2020:3010) Important: kernel security, bug fix, and enhancement update

2020-07-2110:21:25
access.redhat.com
74
kernel packages
linux operating system
cve-2019-19807
cve-2020-10757
cve-2020-10766
cve-2020-10767
cve-2020-10768
cve-2020-12653
cve-2020-12654
cve-2020-12888
cve-2019-3016
security fixes
bz#1821378
bz#1835789
bz#1836229
bz#1836302
bz#1842406
bz#1842620
bz#1845164
bz#1846180
bz#1847128
bz#1847453
bz#1848545
bz#1851003
bz#1851005
bz#1851235
bz#1851406
bz#1852045
bug fixes
kernel enhancements
mellanox 8.3 feat
ibm 8.3 feat

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

55.3%

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: use-after-free in sound/core/timer.c (CVE-2019-19807)

  • kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)

  • kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)

  • kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)

  • kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)

  • kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)

  • kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)

  • Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)

  • kernel: kvm: Information leak within a KVM guest (CVE-2019-3016)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • [FJ8.2 Bug]: kernel: retrieving process core dump of the init process (PID 1) fails (BZ#1821378)

  • [FJ8.0 Bug]: System hungs up after setting parameters for hugepages (BZ#1835789)

  • RHEL8.2 Alpha - ISST-LTE:PowerVM: vNIC DLPAR crashes the LPAR (ibmvnic) (BZ#1836229)

  • “[sig-network] Services should be rejected when no endpoints exist” test fails frequently on RHEL8 nodes (BZ#1836302)

  • RHEL8.2 Beta - RHEL8.2 reports EEH errors on internal SAS adapter during HTX run on PMEM (SCM/pmem) (BZ#1842406)

  • RHEL8.1 - s390/cio: fix virtio-ccw DMA without PV (BZ#1842620)

  • deadlock between modprobe and netns exit (BZ#1845164)

  • exit_boot failed when install RHEL8.1 (BZ#1846180)

  • http request is taking more time for endpoint running on different host via nodeport service (BZ#1847128)

  • RHEL8.1 - zEDC problems on z14 (genwqe/pci) (BZ#1847453)

  • WARNING: CPU: 1 PID: 0 at arch/x86/kernel/apic/vector.c:846 free_moved_vector+0x141/0x150 (BZ#1848545)

  • Backport conntrack race condition fixes (BZ#1851003)

  • nf_conntrack module unload fail and refcount become to negative (BZ#1851005)

  • OVS: backport performance patches from upstream to 8.2z (BZ#1851235)

  • RHEL8.3: backport “smp: Allow smp_call_function_single_async() to insert locked csd” (BZ#1851406)

  • [DELL EMC 8.2 BUG] NVMe drive is not detected after multiple hotplug (hot add + surprise remove) operations (BZ#1852045)

Enhancement(s):

  • [Mellanox 8.3 FEAT] mlx5: drivers update upto Linux v5.5 (BZ#1843544)

  • [IBM 8.3 FEAT] Update nvme driver to latest level for POWER (BZ#1846405)

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

55.3%