8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.01 Low
EPSS
Percentile
83.6%
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c (CVE-2017-18551)
kernel: race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c leads to use-after-free (CVE-2018-20836)
kernel: out of bounds write in i2c driver leads to local escalation of privilege (CVE-2019-9454)
kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c (CVE-2019-19046)
kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c (CVE-2019-19447)
kernel: out-of-bounds write via crafted keycode table (CVE-2019-20636)
kernel: sg_write function lacks an sg_remove_request call in a certain failure case (CVE-2020-12770)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 7 | ppc64 | perf | < 3.10.0-957.65.1.el7 | perf-3.10.0-957.65.1.el7.ppc64.rpm |
RedHat | 7 | ppc64 | kernel-debuginfo | < 3.10.0-957.65.1.el7 | kernel-debuginfo-3.10.0-957.65.1.el7.ppc64.rpm |
RedHat | 7 | ppc64 | kernel | < 3.10.0-957.65.1.el7 | kernel-3.10.0-957.65.1.el7.ppc64.rpm |
RedHat | 7 | x86_64 | kernel-devel | < 3.10.0-957.65.1.el7 | kernel-devel-3.10.0-957.65.1.el7.x86_64.rpm |
RedHat | 7 | noarch | kernel-abi-whitelists | < 3.10.0-957.65.1.el7 | kernel-abi-whitelists-3.10.0-957.65.1.el7.noarch.rpm |
RedHat | 7 | ppc64 | python-perf | < 3.10.0-957.65.1.el7 | python-perf-3.10.0-957.65.1.el7.ppc64.rpm |
RedHat | 7 | x86_64 | kernel-debug-devel | < 3.10.0-957.65.1.el7 | kernel-debug-devel-3.10.0-957.65.1.el7.x86_64.rpm |
RedHat | 7 | x86_64 | kernel-tools | < 3.10.0-957.65.1.el7 | kernel-tools-3.10.0-957.65.1.el7.x86_64.rpm |
RedHat | 7 | x86_64 | kernel-debuginfo-common-x86_64 | < 3.10.0-957.65.1.el7 | kernel-debuginfo-common-x86_64-3.10.0-957.65.1.el7.x86_64.rpm |
RedHat | 7 | ppc64le | kernel-tools-libs | < 3.10.0-957.65.1.el7 | kernel-tools-libs-3.10.0-957.65.1.el7.ppc64le.rpm |
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.01 Low
EPSS
Percentile
83.6%