7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
COMPLETE
AV:N/AC:M/Au:S/C:P/I:P/A:C
0.002 Low
EPSS
Percentile
54.1%
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
kernel: Integer overflow in Intel® Graphics Drivers (CVE-2020-12362)
kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c (CVE-2019-18811)
kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (CVE-2019-19523)
kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (CVE-2019-19528)
kernel: possible out of bounds write in kbd_keycode of keyboard.c (CVE-2020-0431)
kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)
kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c (CVE-2020-12464)
kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314)
kernel: Use After Free vulnerability in cgroup BPF component (CVE-2020-14356)
kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c (CVE-2020-15437)
kernel: umask not applied on filesystem without ACL support (CVE-2020-24394)
kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)
kernel: incomplete permission checking for access to rbd devices (CVE-2020-25284)
kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c (CVE-2020-25285)
kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)
kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)
kernel: use-after-free in kernel midi subsystem (CVE-2020-27786)
kernel: child process is able to access parent mm through hfi dev file handle (CVE-2020-27835)
kernel: slab-out-of-bounds read in fbcon (CVE-2020-28974)
kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent (CVE-2020-35508)
kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations (CVE-2020-36322)
kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege (CVE-2021-0342)
kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c (CVE-2020-11608)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 8 | ppc64le | kernel-headers | < 4.18.0-305.el8 | kernel-headers-4.18.0-305.el8.ppc64le.rpm |
RedHat | 8 | x86_64 | kernel-debuginfo | < 4.18.0-305.el8 | kernel-debuginfo-4.18.0-305.el8.x86_64.rpm |
RedHat | 8 | s390x | kernel-headers | < 4.18.0-305.el8 | kernel-headers-4.18.0-305.el8.s390x.rpm |
RedHat | 8 | noarch | kernel-doc | < 4.18.0-305.el8 | kernel-doc-4.18.0-305.el8.noarch.rpm |
RedHat | 8 | x86_64 | bpftool-debuginfo | < 4.18.0-305.el8 | bpftool-debuginfo-4.18.0-305.el8.x86_64.rpm |
RedHat | 8 | s390x | bpftool-debuginfo | < 4.18.0-305.el8 | bpftool-debuginfo-4.18.0-305.el8.s390x.rpm |
RedHat | 8 | aarch64 | kernel-debug-devel | < 4.18.0-305.el8 | kernel-debug-devel-4.18.0-305.el8.aarch64.rpm |
RedHat | 8 | aarch64 | kernel-devel | < 4.18.0-305.el8 | kernel-devel-4.18.0-305.el8.aarch64.rpm |
RedHat | 8 | x86_64 | bpftool | < 4.18.0-305.el8 | bpftool-4.18.0-305.el8.x86_64.rpm |
RedHat | 8 | s390x | python3-perf | < 4.18.0-305.el8 | python3-perf-4.18.0-305.el8.s390x.rpm |
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
COMPLETE
AV:N/AC:M/Au:S/C:P/I:P/A:C
0.002 Low
EPSS
Percentile
54.1%