[RHSA-2020:0374] kernel security and bug fix update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver (CVE-2019-14816)
kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c (CVE-2019-14895)
kernel: heap overflow in marvell/mwifiex/tdls.c (CVE-2019-14901)
kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c (CVE-2019-17133)
kernel: incomplete fix for race condition between mmget_not_zero()/get_task_mm() and core dumping in CVE-2019-11599 (CVE-2019-14898)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
[Azure][7.8] Include patch "PCI: hv: Avoid use of hv_pci_dev->pci_slot after freeing it" (BZ#1766089)
[Hyper-V][RHEL7.8] When accelerated networking is enabled on RedHat, network interface(eth0) moved to new network namespace does not obtain IP address. (BZ#1766093)
[Azure][RHEL 7.6] hv_vmbus probe pass-through GPU card failed (BZ#1766097)
SMB3: Do not error out on large file transfers if server responds with STATUS_INSUFFICIENT_RESOURCES (BZ#1767621)
Since RHEL commit 5330f5d09820 high load can cause dm-multipath path failures (BZ#1770113)
Hard lockup in free_one_page()->_raw_spin_lock() because sosreport command is reading from /proc/pagetypeinfo (BZ#1770732)
patchset for x86/atomic: Fix smp_mb__{before,after}_atomic() (BZ#1772812)
fix compat statfs64() returning EOVERFLOW for when _FILE_OFFSET_BITS=64 (BZ#1775678)
Guest crash after load cpuidle-haltpoll driver (BZ#1776289)
RHEL 7.7 long I/O stalls with bnx2fc from not masking off scope bits of retry delay value (BZ#1776290)
Multiple "mv" processes hung on a gfs2 filesystem (BZ#1777297)
Moving Egress IP will result in conntrack sessions being DESTROYED (BZ#1779564)
core: backports from upstream (BZ#1780033)
kernel BUG at arch/powerpc/platforms/pseries/lpar.c:482! (BZ#1780148)
Race between tty_open() and flush_to_ldisc() using the tty_struct->driver_data field. (BZ#1780163)
- ID
- RHSA-2020:0374
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2020:0374
- Published
-
2020-02-04T00:00:00
(4 years ago) - Modified
-
2020-02-04T00:00:00
(4 years ago) - Rights
- Copyright 2020 Red Hat, Inc.
- Other Advisories
-
- ELSA-2020-0339
- ELSA-2020-0374
- ELSA-2020-0790
- ELSA-2020-5541
- ELSA-2020-5569
- ELSA-2020-5670
- ELSA-2020-5676
- ELSA-2020-5845
- ELSA-2020-5866
- ELSA-2021-9002
- ELSA-2021-9459
- FEDORA-2019-021c968423
- FEDORA-2019-057d691fd4
- FEDORA-2019-124a241044
- FEDORA-2019-15e141c6a7
- FEDORA-2019-1689d3fe07
- FEDORA-2019-39e97683e8
- FEDORA-2019-41e28660ae
- FEDORA-2019-4c91a2f76e
- FEDORA-2019-7a3fc17778
- FEDORA-2019-8846a1a5a2
- FEDORA-2019-91f6e7bb71
- FEDORA-2019-97380355ae
- FEDORA-2019-a570a92d5a
- FEDORA-2019-b86a7bdba0
- FEDORA-2019-e3010166bd
- FEDORA-2020-203ffedeb5
- FEDORA-2020-227a4c0530
- FEDORA-2020-2a5cdd665c
- FEDORA-2020-3cd64d683c
- FEDORA-2020-c2d89d14d0
- FEDORA-2020-e328697628
- FEDORA-2020-f884f9dd7d
- FEDORA-2020-fe00e12580
- openSUSE-SU-2019:2173-1
- openSUSE-SU-2019:2181-1
- openSUSE-SU-2019:2392-1
- openSUSE-SU-2019:2444-1
- openSUSE-SU-2019:2675-1
- RHSA-2020:0328
- RHSA-2020:0339
- RHSA-2020:0375
- RHSA-2020:0790
- SSA:2019-311-01
- SSA:2020-086-01
- SUSE-SU-2019:2412-1
- SUSE-SU-2019:2414-1
- SUSE-SU-2019:2424-1
- SUSE-SU-2019:2648-1
- SUSE-SU-2019:2651-1
- SUSE-SU-2019:2658-1
- SUSE-SU-2019:2738-1
- SUSE-SU-2019:2756-1
- SUSE-SU-2019:2821-1
- SUSE-SU-2019:2829-1
- SUSE-SU-2019:2859-1
- SUSE-SU-2019:2864-1
- SUSE-SU-2019:2879-1
- SUSE-SU-2019:2946-1
- SUSE-SU-2019:2947-1
- SUSE-SU-2019:2949-1
- SUSE-SU-2019:2950-1
- SUSE-SU-2019:2951-1
- SUSE-SU-2019:2952-1
- SUSE-SU-2019:2953-1
- SUSE-SU-2019:2984-1
- SUSE-SU-2019:3200-1
- SUSE-SU-2019:3237-1
- SUSE-SU-2019:3289-1
- SUSE-SU-2019:3294-1
- SUSE-SU-2019:3295-1
- SUSE-SU-2019:3316-1
- SUSE-SU-2019:3317-1
- SUSE-SU-2019:3371-1
- SUSE-SU-2019:3372-1
- SUSE-SU-2019:3379-1
- SUSE-SU-2019:3381-1
- SUSE-SU-2019:3389-1
- SUSE-SU-2020:0093-1
- SUSE-SU-2020:0183-1
- SUSE-SU-2020:0599-1
- SUSE-SU-2020:0613-1
- SUSE-SU-2020:0667-1
- SUSE-SU-2020:1255-1
- SUSE-SU-2020:2491-1
- SUSE-SU-2020:2492-1
- SUSE-SU-2020:2497-1
- SUSE-SU-2020:2498-1
- SUSE-SU-2020:2505-1
- SUSE-SU-2020:2506-1
- SUSE-SU-2020:2513-1
- SUSE-SU-2020:2526-1
- USN-4157-1
- USN-4157-2
- USN-4162-1
- USN-4162-2
- USN-4163-1
- USN-4163-2
- USN-4208-1
- USN-4210-1
- USN-4211-1
- USN-4211-2
- USN-4225-1
- USN-4225-2
- USN-4226-1
- USN-4227-1
- USN-4227-2
- USN-4228-1
- USN-4228-2
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 1744149 | https://bugzilla.redhat.com/1744149 | |
Bugzilla | 1771909 | https://bugzilla.redhat.com/1771909 | |
Bugzilla | 1773519 | https://bugzilla.redhat.com/1773519 | |
Bugzilla | 1774671 | https://bugzilla.redhat.com/1774671 | |
Bugzilla | 1774870 | https://bugzilla.redhat.com/1774870 | |
RHSA | RHSA-2020:0374 | https://access.redhat.com/errata/RHSA-2020:0374 | |
CVE | CVE-2019-14816 | https://access.redhat.com/security/cve/CVE-2019-14816 | |
CVE | CVE-2019-14895 | https://access.redhat.com/security/cve/CVE-2019-14895 | |
CVE | CVE-2019-14898 | https://access.redhat.com/security/cve/CVE-2019-14898 | |
CVE | CVE-2019-14901 | https://access.redhat.com/security/cve/CVE-2019-14901 | |
CVE | CVE-2019-17133 | https://access.redhat.com/security/cve/CVE-2019-17133 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/python-perf?arch=x86_64&distro=redhat-7 | redhat | python-perf | < 3.10.0-1062.12.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/python-perf?arch=s390x&distro=redhat-7 | redhat | python-perf | < 3.10.0-1062.12.1.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/python-perf?arch=ppc64le&distro=redhat-7 | redhat | python-perf | < 3.10.0-1062.12.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/python-perf?arch=ppc64&distro=redhat-7 | redhat | python-perf | < 3.10.0-1062.12.1.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/perf?arch=x86_64&distro=redhat-7 | redhat | perf | < 3.10.0-1062.12.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/perf?arch=s390x&distro=redhat-7 | redhat | perf | < 3.10.0-1062.12.1.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/perf?arch=ppc64le&distro=redhat-7 | redhat | perf | < 3.10.0-1062.12.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/perf?arch=ppc64&distro=redhat-7 | redhat | perf | < 3.10.0-1062.12.1.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-7 | redhat | kernel | < 3.10.0-1062.12.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=s390x&distro=redhat-7 | redhat | kernel | < 3.10.0-1062.12.1.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-7 | redhat | kernel | < 3.10.0-1062.12.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64&distro=redhat-7 | redhat | kernel | < 3.10.0-1062.12.1.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-tools?arch=x86_64&distro=redhat-7 | redhat | kernel-tools | < 3.10.0-1062.12.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools?arch=ppc64le&distro=redhat-7 | redhat | kernel-tools | < 3.10.0-1062.12.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools?arch=ppc64&distro=redhat-7 | redhat | kernel-tools | < 3.10.0-1062.12.1.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=x86_64&distro=redhat-7 | redhat | kernel-tools-libs | < 3.10.0-1062.12.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=ppc64le&distro=redhat-7 | redhat | kernel-tools-libs | < 3.10.0-1062.12.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=ppc64&distro=redhat-7 | redhat | kernel-tools-libs | < 3.10.0-1062.12.1.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-tools-libs-devel | < 3.10.0-1062.12.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=ppc64le&distro=redhat-7 | redhat | kernel-tools-libs-devel | < 3.10.0-1062.12.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=ppc64&distro=redhat-7 | redhat | kernel-tools-libs-devel | < 3.10.0-1062.12.1.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-kdump?arch=s390x&distro=redhat-7 | redhat | kernel-kdump | < 3.10.0-1062.12.1.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel-kdump-devel?arch=s390x&distro=redhat-7 | redhat | kernel-kdump-devel | < 3.10.0-1062.12.1.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel-headers?arch=x86_64&distro=redhat-7 | redhat | kernel-headers | < 3.10.0-1062.12.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-headers?arch=s390x&distro=redhat-7 | redhat | kernel-headers | < 3.10.0-1062.12.1.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel-headers?arch=ppc64le&distro=redhat-7 | redhat | kernel-headers | < 3.10.0-1062.12.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-headers?arch=ppc64&distro=redhat-7 | redhat | kernel-headers | < 3.10.0-1062.12.1.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-doc?distro=redhat-7 | redhat | kernel-doc | < 3.10.0-1062.12.1.el7 | redhat-7 | ||
Affected | pkg:rpm/redhat/kernel-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-devel | < 3.10.0-1062.12.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-devel?arch=s390x&distro=redhat-7 | redhat | kernel-devel | < 3.10.0-1062.12.1.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel-devel?arch=ppc64le&distro=redhat-7 | redhat | kernel-devel | < 3.10.0-1062.12.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-devel?arch=ppc64&distro=redhat-7 | redhat | kernel-devel | < 3.10.0-1062.12.1.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-debug?arch=x86_64&distro=redhat-7 | redhat | kernel-debug | < 3.10.0-1062.12.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug?arch=s390x&distro=redhat-7 | redhat | kernel-debug | < 3.10.0-1062.12.1.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug?arch=ppc64le&distro=redhat-7 | redhat | kernel-debug | < 3.10.0-1062.12.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug?arch=ppc64&distro=redhat-7 | redhat | kernel-debug | < 3.10.0-1062.12.1.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-debug-devel | < 3.10.0-1062.12.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=s390x&distro=redhat-7 | redhat | kernel-debug-devel | < 3.10.0-1062.12.1.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=ppc64le&distro=redhat-7 | redhat | kernel-debug-devel | < 3.10.0-1062.12.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=ppc64&distro=redhat-7 | redhat | kernel-debug-devel | < 3.10.0-1062.12.1.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-bootwrapper?arch=ppc64le&distro=redhat-7 | redhat | kernel-bootwrapper | < 3.10.0-1062.12.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-bootwrapper?arch=ppc64&distro=redhat-7 | redhat | kernel-bootwrapper | < 3.10.0-1062.12.1.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-abi-whitelists?distro=redhat-7 | redhat | kernel-abi-whitelists | < 3.10.0-1062.12.1.el7 | redhat-7 | ||
Affected | pkg:rpm/redhat/bpftool?arch=x86_64&distro=redhat-7 | redhat | bpftool | < 3.10.0-1062.12.1.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/bpftool?arch=s390x&distro=redhat-7 | redhat | bpftool | < 3.10.0-1062.12.1.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/bpftool?arch=ppc64le&distro=redhat-7 | redhat | bpftool | < 3.10.0-1062.12.1.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/bpftool?arch=ppc64&distro=redhat-7 | redhat | bpftool | < 3.10.0-1062.12.1.el7 | redhat-7 | ppc64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |