7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.003 Low
EPSS
Percentile
65.1%
CentOS Errata and Security Advisory CESA-2021:3327
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)
kernel: race condition for removal of the HCI controller (CVE-2021-32399)
kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777)
kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)
kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS (CVE-2021-29650)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
SAN Switch rebooted and caused (?) OpenStack compute node to reboot (BZ#1897576)
sysfs: cannot create duplicate filename '/class/mdio_bus/ixgbe-8100 (BZ#1915449)
XFS: read-only recovery does not update free space accounting in superblock (BZ#1921551)
The memcg_params field of kmem_cache struct contains an old slab address that is to small for the current size of memcg_limited_groups_array_size. (BZ#1951810)
Backport of upstream patch "net: Update window_clamp if SOCK_RCVBUF is set " into rhel-7 (BZ#1962196)
Kernel panic in init_cq_frag_buf (BZ#1962499)
futex: futex_requeue can potentially free the pi_state structure twice (BZ#1966856)
be_poll lockup doing ifenslave when netconsole using bond (BZ#1971744)
OCP4.7 nodes panic at BUG_ON in nf_nat_setup_info() (BZ#1972970)
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2021-August/086147.html
Affected packages:
bpftool
kernel
kernel-abi-whitelists
kernel-debug
kernel-debug-devel
kernel-devel
kernel-doc
kernel-headers
kernel-tools
kernel-tools-libs
kernel-tools-libs-devel
perf
python-perf
Upstream details at:
https://access.redhat.com/errata/RHSA-2021:3327
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 7 | x86_64 | bpftool | < 3.10.0-1160.41.1.el7 | bpftool-3.10.0-1160.41.1.el7.x86_64.rpm |
CentOS | 7 | x86_64 | kernel | < 3.10.0-1160.41.1.el7 | kernel-3.10.0-1160.41.1.el7.x86_64.rpm |
CentOS | 7 | noarch | kernel-abi-whitelists | < 3.10.0-1160.41.1.el7 | kernel-abi-whitelists-3.10.0-1160.41.1.el7.noarch.rpm |
CentOS | 7 | x86_64 | kernel-debug | < 3.10.0-1160.41.1.el7 | kernel-debug-3.10.0-1160.41.1.el7.x86_64.rpm |
CentOS | 7 | x86_64 | kernel-debug-devel | < 3.10.0-1160.41.1.el7 | kernel-debug-devel-3.10.0-1160.41.1.el7.x86_64.rpm |
CentOS | 7 | x86_64 | kernel-devel | < 3.10.0-1160.41.1.el7 | kernel-devel-3.10.0-1160.41.1.el7.x86_64.rpm |
CentOS | 7 | noarch | kernel-doc | < 3.10.0-1160.41.1.el7 | kernel-doc-3.10.0-1160.41.1.el7.noarch.rpm |
CentOS | 7 | x86_64 | kernel-headers | < 3.10.0-1160.41.1.el7 | kernel-headers-3.10.0-1160.41.1.el7.x86_64.rpm |
CentOS | 7 | x86_64 | kernel-tools | < 3.10.0-1160.41.1.el7 | kernel-tools-3.10.0-1160.41.1.el7.x86_64.rpm |
CentOS | 7 | x86_64 | kernel-tools-libs | < 3.10.0-1160.41.1.el7 | kernel-tools-libs-3.10.0-1160.41.1.el7.x86_64.rpm |
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.003 Low
EPSS
Percentile
65.1%