6.6 Medium
CVSS3
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.0005 Low
EPSS
Percentile
15.9%
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
kernel: buffer over write in vgacon_scroll (CVE-2020-14331)
kernel: net-sysfs: *_queue_add_kobject refcount issue (CVE-2019-20811)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
[OSP13,mlx5] SRIOV VF still sending traffic when PF is down (BZ#1733181)
gpf panic in virtio_check_driver_offered_fxature+6 when running sg_inq on a dm map for a lost virtio_blk (BZ#1811893)
GPF panic in qlt_free_session_done+626 (BZ#1826127)
[ Brazos ] “Core(s) per socket” and “Socket” values are interchanged in lscpu output. (kernel) (BZ#1826306)
megaraid Aero: call trace observed during reboots (BZ#1828312)
Crash in mptscsih_io_done() due to buffer overrun in sense_buf_pool (BZ#1829803)
The qedf driver fails to re-establish the online F/C port state when the downstream F/C port is toggled unless a LIP is forced (BZ#1836443)
tcp_fragment() limit causes packet drop under normal TCP load (BZ#1847765)
ip link command shows state as UNKNOWN for MACVLAN interface (BZ#1848950)
Lenovo TS 7Z60 Cooper Lake: PCI BAR firmware bug (BZ#1849223)
[RHEL-7/mlx4] ipoib_flush ipoib_ib_dev_flush_light [ib_ipoib] (BZ#1858707)
Uprobes crashes processes under GDB - SIGTRAP and SIGSEGV (BZ#1861396)
kernel-3.10.0-1127.19.1.el7.x86_64 crashes after an SSH connection attempt when running as a Xen PV guest on AMD Epyc Rome (BZ#1882468)
Null ptr deref after nf_reinject->nf_queue_entry_release_refs hits Attempt to release error doing inet_sock_destruct() (BZ#1885682)
Users of kernel are advised to upgrade to these updated packages, which fix these bugs.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 7 | ppc64 | kernel | < 3.10.0-1160.6.1.el7 | kernel-3.10.0-1160.6.1.el7.ppc64.rpm |
RedHat | 7 | ppc64le | perf | < 3.10.0-1160.6.1.el7 | perf-3.10.0-1160.6.1.el7.ppc64le.rpm |
RedHat | 7 | x86_64 | bpftool | < 3.10.0-1160.6.1.el7 | bpftool-3.10.0-1160.6.1.el7.x86_64.rpm |
RedHat | 7 | ppc64le | python-perf | < 3.10.0-1160.6.1.el7 | python-perf-3.10.0-1160.6.1.el7.ppc64le.rpm |
RedHat | 7 | s390x | kernel-debug | < 3.10.0-1160.6.1.el7 | kernel-debug-3.10.0-1160.6.1.el7.s390x.rpm |
RedHat | 7 | x86_64 | kernel-tools | < 3.10.0-1160.6.1.el7 | kernel-tools-3.10.0-1160.6.1.el7.x86_64.rpm |
RedHat | 7 | x86_64 | kernel-debug-devel | < 3.10.0-1160.6.1.el7 | kernel-debug-devel-3.10.0-1160.6.1.el7.x86_64.rpm |
RedHat | 7 | ppc64 | kernel-tools-libs | < 3.10.0-1160.6.1.el7 | kernel-tools-libs-3.10.0-1160.6.1.el7.ppc64.rpm |
RedHat | 7 | noarch | kernel-abi-whitelists | < 3.10.0-1160.6.1.el7 | kernel-abi-whitelists-3.10.0-1160.6.1.el7.noarch.rpm |
RedHat | 7 | s390x | kernel | < 3.10.0-1160.6.1.el7 | kernel-3.10.0-1160.6.1.el7.s390x.rpm |
6.6 Medium
CVSS3
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.0005 Low
EPSS
Percentile
15.9%