Lucene search

K
redhatRedHatRHSA-2020:2851
HistoryJul 07, 2020 - 8:51 a.m.

(RHSA-2020:2851) Important: kernel security and bug fix update

2020-07-0708:51:57
access.redhat.com
60

0.012 Low

EPSS

Percentile

84.9%

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: Count overflow in FUSE request leading to use-after-free issues. (CVE-2019-11487)

  • Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821)

  • Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)

  • kernel: denial of service via ioctl call in network tun handling (CVE-2018-7191)

  • kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS (CVE-2018-20169)

  • kernel: perf_event_open() and execve() race in setuid programs allows a data leak (CVE-2019-3901)

  • kernel: use-after-free in arch/x86/lib/insn-eval.c (CVE-2019-13233)

  • kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service (CVE-2019-15916)

  • kernel: powerpc: incomplete Spectre-RSB mitigation leads to information exposure (CVE-2019-18660)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • kernel: hw: provide reporting and microcode mitigation toggle for CVE-2020-0543 / Special Register Buffer Data Sampling (SRBDS) (BZ#1840677)