6.6 Medium
CVSS3
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.0005 Low
EPSS
Percentile
15.9%
CentOS Errata and Security Advisory CESA-2020:5023
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
kernel: buffer over write in vgacon_scroll (CVE-2020-14331)
kernel: net-sysfs: *_queue_add_kobject refcount issue (CVE-2019-20811)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
[OSP13,mlx5] SRIOV VF still sending traffic when PF is down (BZ#1733181)
gpf panic in virtio_check_driver_offered_fxature+6 when running sg_inq on a dm map for a lost virtio_blk (BZ#1811893)
GPF panic in qlt_free_session_done+626 (BZ#1826127)
[ Brazos ] “Core(s) per socket” and “Socket” values are interchanged in lscpu output. (kernel) (BZ#1826306)
megaraid Aero: call trace observed during reboots (BZ#1828312)
Crash in mptscsih_io_done() due to buffer overrun in sense_buf_pool (BZ#1829803)
The qedf driver fails to re-establish the online F/C port state when the downstream F/C port is toggled unless a LIP is forced (BZ#1836443)
tcp_fragment() limit causes packet drop under normal TCP load (BZ#1847765)
ip link command shows state as UNKNOWN for MACVLAN interface (BZ#1848950)
Lenovo TS 7Z60 Cooper Lake: PCI BAR firmware bug (BZ#1849223)
[RHEL-7/mlx4] ipoib_flush ipoib_ib_dev_flush_light [ib_ipoib] (BZ#1858707)
Uprobes crashes processes under GDB - SIGTRAP and SIGSEGV (BZ#1861396)
kernel-3.10.0-1127.19.1.el7.x86_64 crashes after an SSH connection attempt when running as a Xen PV guest on AMD Epyc Rome (BZ#1882468)
Null ptr deref after nf_reinject->nf_queue_entry_release_refs hits Attempt to release error doing inet_sock_destruct() (BZ#1885682)
Users of kernel are advised to upgrade to these updated packages, which fix these bugs.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2020-November/085992.html
Affected packages:
bpftool
kernel
kernel-abi-whitelists
kernel-debug
kernel-debug-devel
kernel-devel
kernel-doc
kernel-headers
kernel-tools
kernel-tools-libs
kernel-tools-libs-devel
perf
python-perf
Upstream details at:
https://access.redhat.com/errata/RHSA-2020:5023
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 7 | x86_64 | bpftool | < 3.10.0-1160.6.1.el7 | bpftool-3.10.0-1160.6.1.el7.x86_64.rpm |
CentOS | 7 | x86_64 | kernel | < 3.10.0-1160.6.1.el7 | kernel-3.10.0-1160.6.1.el7.x86_64.rpm |
CentOS | 7 | noarch | kernel-abi-whitelists | < 3.10.0-1160.6.1.el7 | kernel-abi-whitelists-3.10.0-1160.6.1.el7.noarch.rpm |
CentOS | 7 | x86_64 | kernel-debug | < 3.10.0-1160.6.1.el7 | kernel-debug-3.10.0-1160.6.1.el7.x86_64.rpm |
CentOS | 7 | x86_64 | kernel-debug-devel | < 3.10.0-1160.6.1.el7 | kernel-debug-devel-3.10.0-1160.6.1.el7.x86_64.rpm |
CentOS | 7 | x86_64 | kernel-devel | < 3.10.0-1160.6.1.el7 | kernel-devel-3.10.0-1160.6.1.el7.x86_64.rpm |
CentOS | 7 | noarch | kernel-doc | < 3.10.0-1160.6.1.el7 | kernel-doc-3.10.0-1160.6.1.el7.noarch.rpm |
CentOS | 7 | x86_64 | kernel-headers | < 3.10.0-1160.6.1.el7 | kernel-headers-3.10.0-1160.6.1.el7.x86_64.rpm |
CentOS | 7 | x86_64 | kernel-tools | < 3.10.0-1160.6.1.el7 | kernel-tools-3.10.0-1160.6.1.el7.x86_64.rpm |
CentOS | 7 | x86_64 | kernel-tools-libs | < 3.10.0-1160.6.1.el7 | kernel-tools-libs-3.10.0-1160.6.1.el7.x86_64.rpm |
6.6 Medium
CVSS3
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.0005 Low
EPSS
Percentile
15.9%