CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:A/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
51.5%
CentOS Errata and Security Advisory CESA-2020:1524
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow (CVE-2019-17666)
kernel: offset2lib allows for the stack guard page to be jumped over (CVE-2017-1000371)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2020-April/085827.html
Affected packages:
kernel
kernel-abi-whitelists
kernel-debug
kernel-debug-devel
kernel-devel
kernel-doc
kernel-firmware
kernel-headers
perf
python-perf
Upstream details at:
https://access.redhat.com/errata/RHSA-2020:1524
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 6 | i686 | kernel | < 2.6.32-754.29.1.el6 | kernel-2.6.32-754.29.1.el6.i686.rpm |
CentOS | 6 | noarch | kernel-abi-whitelists | < 2.6.32-754.29.1.el6 | kernel-abi-whitelists-2.6.32-754.29.1.el6.noarch.rpm |
CentOS | 6 | i686 | kernel-debug | < 2.6.32-754.29.1.el6 | kernel-debug-2.6.32-754.29.1.el6.i686.rpm |
CentOS | 6 | i686 | kernel-debug-devel | < 2.6.32-754.29.1.el6 | kernel-debug-devel-2.6.32-754.29.1.el6.i686.rpm |
CentOS | 6 | i686 | kernel-devel | < 2.6.32-754.29.1.el6 | kernel-devel-2.6.32-754.29.1.el6.i686.rpm |
CentOS | 6 | noarch | kernel-doc | < 2.6.32-754.29.1.el6 | kernel-doc-2.6.32-754.29.1.el6.noarch.rpm |
CentOS | 6 | noarch | kernel-firmware | < 2.6.32-754.29.1.el6 | kernel-firmware-2.6.32-754.29.1.el6.noarch.rpm |
CentOS | 6 | i686 | kernel-headers | < 2.6.32-754.29.1.el6 | kernel-headers-2.6.32-754.29.1.el6.i686.rpm |
CentOS | 6 | i686 | perf | < 2.6.32-754.29.1.el6 | perf-2.6.32-754.29.1.el6.i686.rpm |
CentOS | 6 | i686 | python-perf | < 2.6.32-754.29.1.el6 | python-perf-2.6.32-754.29.1.el6.i686.rpm |
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:A/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
51.5%