Lucene search

K
centosCentOS ProjectCESA-2020:5437
HistoryDec 21, 2020 - 8:45 p.m.

bpftool, kernel, perf, python security update

2020-12-2120:45:16
CentOS Project
lists.centos.org
201

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:P/I:P/A:C

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

64.8%

CentOS Errata and Security Advisory CESA-2020:5437

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt (CVE-2020-14385)

  • kernel: The flow_dissector feature allows device tracking (CVE-2019-18282)

  • kernel: Buffer over-read in crypto_authenc_extractkeys() when a payload longer than 4 bytes is not aligned. (CVE-2020-10769)

  • kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314)

  • kernel: umask not applied on filesystem without ACL support (CVE-2020-24394)

  • kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)

  • kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • WARNING in set_restore_sigmask at ./arch/x86/include/asm/thread_info.h:298 sigsuspend+0x6d/0x70 (BZ#1704650)

  • [i40e] VFs see other VF’s outgoing traffic (BZ#1845677)

  • [Hyper-V][RHEL7] Two fixes for kdump over network (BZ#1846667)

  • Loop in __run_timers() because base->timer_jiffies is very far behind causes a lockup condition. (BZ#1849716)

  • XFS transaction overrun when running docker on VMWARE (overlay fs) (BZ#1857203)

  • RHEL 7.9 NVMe/IB - Host crash encountered during array upgrade (BZ#1857397)

  • False positive hard lockup detected while disabling the hard lockup detector via sysctl -w kernel.watchdog=0 (BZ#1860661)

  • [Hyper-V][RHEL-7] Only notify Hyper-V for die events that are oops (BZ#1868130)

  • Linux kernel crash due to openvswitch module (BZ#1869190)

  • ‘nodfs’ option not working when using SMB2+ (BZ#1873033)

  • RHEL7.7 zstream - ESS - kernel panic triggered by freelist pointer corruption (BZ#1873189)

  • destroy_cfs_bandwidth() is called by free_fair_sched_group() without calling init_cfs_bandwidth() (BZ#1878000)

  • NULL pointer at nvme_rdma_setup_ctrl+0x1c2/0x8d0 [nvme_rdma] when discover E5700 (BZ#1878950)

  • IB Infiniband RDMA mlx5_ib is freeing a kmalloc-512 cache that it does not own causing memory corruption. (BZ#1880184)

  • [Azure][RHEL7] Two Patches Needed To Enable Azure Host Time-syncing in VMs (BZ#1884735)

  • connect AF_UNSPEC on a connecting AF_INET6 socket returns an error (BZ#1886305)

  • Rebuilding the grub with the CPU flag ‘avx’ disabled (clearcpuid=156) triggers kernel panic in xor_avx_2() (BZ#1886792)

  • nf_conntrack_sctp.h is not usable due to a missing commit (BZ#1887975)

  • Starting pvmove on top of physical volumes on MD devices causes IO error on ongoing IO (BZ#1890059)

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2020-December/086032.html

Affected packages:
bpftool
kernel
kernel-abi-whitelists
kernel-debug
kernel-debug-devel
kernel-devel
kernel-doc
kernel-headers
kernel-tools
kernel-tools-libs
kernel-tools-libs-devel
perf
python-perf

Upstream details at:
https://access.redhat.com/errata/RHSA-2020:5437

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:P/I:P/A:C

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

64.8%