Headline
RHSA-2021:1739: Red Hat Security Advisory: kernel-rt security and bug fix update
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2019-19523: A flaw was found in the Linux kernel’s implementation for ADU devices from Ontrak Control Systems, where an attacker with administrative privileges and access to a local account could pre-groom the memory and physically disconnect or unload a module. The attacker must be able to access either of these two events to trigger the use-after-free, and then race the access to the use-after-free, to create a situation where key USB structs can be manipulated into corrupting memory.
- CVE-2019-19528: A use-after-free flaw was found in iowarrior_disconnect in iowarrior USB driver module were a flag was simultaneously modified causing a race between a device open and disconnect. This flaw could allow a physical attacker to cause a denial of service (DoS) attack. This vulnerability could even lead to a kernel information leak problem.
- CVE-2020-0431: A flaw out of bounds write in the Linux kernel human interface devices subsystem was found in the way user calls find key code by index. A local user could use this flaw to crash the system or escalate privileges on the system.
- CVE-2020-11608: A flaw was found in the way the ov519 driver in the Linux kernel handled certain types of USB descriptors. This flaw allows an attacker with the ability to induce the error conditions to crash the system.
- CVE-2020-12114: A flaw was found in the Linux kernel’s implementation of the pivot_root syscall. This flaw allows a local privileged user (root outside or root inside a privileged container) to exploit a race condition to manipulate the reference count of the root filesystem. To be able to abuse this flaw, the process or user calling pivot_root must have advanced permissions. The highest threat from this vulnerability is to system availability.
- CVE-2020-12362: A flaw was found in the Linux kernel. An integer overflow in the firmware for some Intel® Graphics Drivers may allow a privileged user to potentially enable an escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- CVE-2020-12363: A flaw was found in the Linux kernel. Improper input validation in some Intel® Graphics Drivers may allow a privileged user to potentially enable a denial of service via local access.
- CVE-2020-12364: Null pointer reference in some Intel® Graphics Drivers for Microsoft Windows and the Linux kernel may allow a privileged user to potentially enable a denial of service via local access.
- CVE-2020-12464: A use-after-free flaw was found in usb_sg_cancel in drivers/usb/core/message.c in the USB core subsystem. This flaw allows a local attacker with a special user or root privileges to crash the system due to a race problem in the scatter-gather cancellation and transfer completion in usb_sg_wait. This vulnerability can also lead to a leak of internal kernel information.
- CVE-2020-14314: A memory out-of-bounds read flaw was found in the Linux kernel’s ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.
- CVE-2020-14356: A use-after-free flaw was found in the Linux kernel’s cgroupv2 subsystem when rebooting the system. This flaw allows a local user to crash the system or escalate their privileges. The highest threat from this vulnerability is to system availability.
- CVE-2020-15437: A NULL pointer dereference flaw was found in the Linux kernel’s UART 8250 functionality, in the way certain hardware architectures handled situations where default ports (0x2E8, 0x2F8, 0x3E8, 0x3F8) are not available. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.
- CVE-2020-24394: A vulnerability was found in NFSv4.2 in the Linux kernel, where a server fails to correctly apply umask when creating a new object on filesystem without ACL support (for example, ext4 with the “noacl” mount option). This flaw allows a local attacker with a user privilege to cause a kernel information leak problem.
- CVE-2020-25212: A flaw was found in the NFSv4 implementation where when mounting a remote attacker controlled server it could return specially crafted response allow for local memory corruption and possibly privilege escalation.
- CVE-2020-25284: A flaw was found in the capabilities check of the rados block device functionality in the Linux kernel. Incorrect capability checks could alllow a local user with root priviledges (but no capabilities) to add or remove Rados Block Devices from the system.
- CVE-2020-25285: A flaw was found in the Linux kernels sysctl handling code for hugepages management. When multiple root level processes would write to modify the /proc/sys/vm/nr_hugepages file it could create a race on internal variables leading to a system crash or memory corruption.
- CVE-2020-25643: A flaw was found in the HDLC_PPP module of the Linux kernel. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- CVE-2020-25704: A memory leak flaw was found in the Linux kernel’s performance monitoring subsystem when using PERF_EVENT_IOC_SET_FILTER. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.
- CVE-2020-27786: A flaw was found in the Linux kernel’s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
- CVE-2020-27835: A flaw use after free in the Linux kernel infiniband hfi1 driver was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.
- CVE-2020-28974: An out-of-bounds (OOB) SLAB memory access flaw was found in the Linux kernel’s fbcon driver module. A bounds check failure allows a local attacker with special user privileges to gain access to out-of-bounds memory, leading to a system crash or leaking of internal kernel information. The highest threat from this vulnerability is to system availability.
- CVE-2020-35508: A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.
- CVE-2021-0342: A flaw use after free in the Linux kernel TUN/TAP device driver functionality was found in the way user create and use tun/tap device. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.
- CVE-2021-0605: A flaw was found in the way the Linux kernel’s pfkey_dump function trusted the provided filter size parameters. A local, sufficiently privileged user could use this flaw to leak information from the kernel.
- CVE-2023-1390: A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.
Synopsis
Important: kernel-rt security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
- kernel: Integer overflow in Intel® Graphics Drivers (CVE-2020-12362)
- kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (CVE-2019-19523)
- kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (CVE-2019-19528)
- kernel: possible out of bounds write in kbd_keycode of keyboard.c (CVE-2020-0431)
- kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)
- kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c (CVE-2020-12464)
- kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314)
- kernel: Use After Free vulnerability in cgroup BPF component (CVE-2020-14356)
- kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c (CVE-2020-15437)
- kernel: umask not applied on filesystem without ACL support (CVE-2020-24394)
- kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)
- kernel: incomplete permission checking for access to rbd devices (CVE-2020-25284)
- kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c (CVE-2020-25285)
- kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)
- kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)
- kernel: use-after-free in kernel midi subsystem (CVE-2020-27786)
- kernel: child process is able to access parent mm through hfi dev file handle (CVE-2020-27835)
- kernel: slab-out-of-bounds read in fbcon (CVE-2020-28974)
- kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent (CVE-2020-35508)
- kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege (CVE-2021-0342)
- kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c (CVE-2020-11608)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for Real Time 8 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 8 x86_64
- Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.6 x86_64
- Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64
- Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.6 x86_64
- Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64
Fixes
- BZ - 1783434 - CVE-2019-19523 kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver
- BZ - 1783507 - CVE-2019-19528 kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver
- BZ - 1831726 - CVE-2020-12464 kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c
- BZ - 1833445 - CVE-2020-11608 kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c
- BZ - 1848652 - CVE-2020-12114 kernel: DoS by corrupting mountpoint reference counter
- BZ - 1853922 - CVE-2020-14314 kernel: buffer uses out of index in ext3/4 filesystem
- BZ - 1868453 - CVE-2020-14356 kernel: Use After Free vulnerability in cgroup BPF component
- BZ - 1869141 - CVE-2020-24394 kernel: umask not applied on filesystem without ACL support
- BZ - 1877575 - CVE-2020-25212 kernel: TOCTOU mismatch in the NFS client code
- BZ - 1879981 - CVE-2020-25643 kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow
- BZ - 1882591 - CVE-2020-25285 kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c
- BZ - 1882594 - CVE-2020-25284 kernel: incomplete permission checking for access to rbd devices
- BZ - 1886109 - BUG: using smp_processor_id() in preemptible [00000000] code: handler106/3082 [rhel-rt-8.4.0]
- BZ - 1894793 - After configure hugepage and reboot test server, kernel got panic status.
- BZ - 1895961 - CVE-2020-25704 kernel: perf_event_parse_addr_filter memory
- BZ - 1896842 - host locks up when running stress-ng itimers on RT kernel.
- BZ - 1897869 - Running oslat in RT guest, guest kernel shows Call Trace: INFO: task kcompactd0:35 blocked for more than 600 seconds.
- BZ - 1900933 - CVE-2020-27786 kernel: use-after-free in kernel midi subsystem
- BZ - 1901161 - CVE-2020-15437 kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c
- BZ - 1901709 - CVE-2020-27835 kernel: child process is able to access parent mm through hfi dev file handle
- BZ - 1902724 - CVE-2020-35508 kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent
- BZ - 1903126 - CVE-2020-28974 kernel: slab-out-of-bounds read in fbcon
- BZ - 1915799 - CVE-2021-0342 kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege
- BZ - 1919889 - CVE-2020-0431 kernel: possible out of bounds write in kbd_keycode of keyboard.c
- BZ - 1930246 - CVE-2020-12362 kernel: Integer overflow in Intel® Graphics Drivers
CVEs
- CVE-2019-19523
- CVE-2019-19528
- CVE-2020-0431
- CVE-2020-11608
- CVE-2020-12114
- CVE-2020-12362
- CVE-2020-12363
- CVE-2020-12364
- CVE-2020-12464
- CVE-2020-14314
- CVE-2020-14356
- CVE-2020-15437
- CVE-2020-24394
- CVE-2020-25212
- CVE-2020-25284
- CVE-2020-25285
- CVE-2020-25643
- CVE-2020-25704
- CVE-2020-27786
- CVE-2020-27835
- CVE-2020-28974
- CVE-2020-35508
- CVE-2021-0342
- CVE-2021-0605
References
- https://access.redhat.com/security/updates/classification/#important
- https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/
Red Hat Enterprise Linux for Real Time 8
SRPM
kernel-rt-4.18.0-305.rt7.72.el8.src.rpm
SHA-256: 99d2cb6f141d0cabbf6022ad019bf53159c718448c45a30e7052f9856683e322
x86_64
kernel-rt-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 3556ffd984a9f6ecc8f63af375b1191298f7f54bdabcb980bded03d2fe5b1974
kernel-rt-core-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 0bb01dd44a9b30c1e2e81e00df1ff50f11746ef5dc8f46fc07544e988fa468bb
kernel-rt-debug-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 0f220efd939a904c99a06ab3bf0a3f4c1ce968efbea8ac35e3081aa4ff30650c
kernel-rt-debug-core-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: e06c7ba4c50e401a6081c991325f356d7142ae58cf92d08383d6246b5ef4aaa3
kernel-rt-debug-debuginfo-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: dc05185ad33a38d0124db55cae669e78240bf1a2a4c50d81ebbe229dbb028c21
kernel-rt-debug-devel-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 9ff0bf5d5273e3911230f017cd18a40a7d10531965449d099f832b26adee2d99
kernel-rt-debug-modules-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 85bad37ac9b8e760c6a90398da7fb294c2ec56d5192dc50e121565cf40db45dc
kernel-rt-debug-modules-extra-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 078006b5972aaf502dde093e9329ba7f86ee33bfe1829d6365919d5576cfdecf
kernel-rt-debuginfo-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 82f0a83cc958cff3aa1dea938b07f796020d33ad69c52d67e149bb72da1fc785
kernel-rt-debuginfo-common-x86_64-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 57a61b7d7a82729437e78a2be7bae4e2d3201ee5661b0884a3b916ae88b7fc6a
kernel-rt-devel-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 0844e38596c726627626976c8da4e90762952707ebee43a4fd161882c145ce55
kernel-rt-modules-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 071321974a14ddf5e8462a489da40300608be95f324963bfe2fe78d3a4898794
kernel-rt-modules-extra-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 901923a345d9650256b26141882125374a2a8d7c60d4594e8c63acd3b8e1cff5
Red Hat Enterprise Linux for Real Time for NFV 8
SRPM
kernel-rt-4.18.0-305.rt7.72.el8.src.rpm
SHA-256: 99d2cb6f141d0cabbf6022ad019bf53159c718448c45a30e7052f9856683e322
x86_64
kernel-rt-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 3556ffd984a9f6ecc8f63af375b1191298f7f54bdabcb980bded03d2fe5b1974
kernel-rt-core-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 0bb01dd44a9b30c1e2e81e00df1ff50f11746ef5dc8f46fc07544e988fa468bb
kernel-rt-debug-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 0f220efd939a904c99a06ab3bf0a3f4c1ce968efbea8ac35e3081aa4ff30650c
kernel-rt-debug-core-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: e06c7ba4c50e401a6081c991325f356d7142ae58cf92d08383d6246b5ef4aaa3
kernel-rt-debug-debuginfo-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: dc05185ad33a38d0124db55cae669e78240bf1a2a4c50d81ebbe229dbb028c21
kernel-rt-debug-devel-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 9ff0bf5d5273e3911230f017cd18a40a7d10531965449d099f832b26adee2d99
kernel-rt-debug-kvm-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 25763f130cd1e37ba21a736ea3ea2426b0a579992e3be46bde21f6d28d05cf1c
kernel-rt-debug-modules-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 85bad37ac9b8e760c6a90398da7fb294c2ec56d5192dc50e121565cf40db45dc
kernel-rt-debug-modules-extra-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 078006b5972aaf502dde093e9329ba7f86ee33bfe1829d6365919d5576cfdecf
kernel-rt-debuginfo-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 82f0a83cc958cff3aa1dea938b07f796020d33ad69c52d67e149bb72da1fc785
kernel-rt-debuginfo-common-x86_64-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 57a61b7d7a82729437e78a2be7bae4e2d3201ee5661b0884a3b916ae88b7fc6a
kernel-rt-devel-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 0844e38596c726627626976c8da4e90762952707ebee43a4fd161882c145ce55
kernel-rt-kvm-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: ef47374e3f7a9e6b77d2e0cfdbfb3e654e6d9cd1eacdf2fdcdc5f723f062cf59
kernel-rt-modules-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 071321974a14ddf5e8462a489da40300608be95f324963bfe2fe78d3a4898794
kernel-rt-modules-extra-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 901923a345d9650256b26141882125374a2a8d7c60d4594e8c63acd3b8e1cff5
Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.6
SRPM
kernel-rt-4.18.0-305.rt7.72.el8.src.rpm
SHA-256: 99d2cb6f141d0cabbf6022ad019bf53159c718448c45a30e7052f9856683e322
x86_64
kernel-rt-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 3556ffd984a9f6ecc8f63af375b1191298f7f54bdabcb980bded03d2fe5b1974
kernel-rt-core-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 0bb01dd44a9b30c1e2e81e00df1ff50f11746ef5dc8f46fc07544e988fa468bb
kernel-rt-debug-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 0f220efd939a904c99a06ab3bf0a3f4c1ce968efbea8ac35e3081aa4ff30650c
kernel-rt-debug-core-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: e06c7ba4c50e401a6081c991325f356d7142ae58cf92d08383d6246b5ef4aaa3
kernel-rt-debug-debuginfo-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: dc05185ad33a38d0124db55cae669e78240bf1a2a4c50d81ebbe229dbb028c21
kernel-rt-debug-devel-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 9ff0bf5d5273e3911230f017cd18a40a7d10531965449d099f832b26adee2d99
kernel-rt-debug-modules-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 85bad37ac9b8e760c6a90398da7fb294c2ec56d5192dc50e121565cf40db45dc
kernel-rt-debug-modules-extra-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 078006b5972aaf502dde093e9329ba7f86ee33bfe1829d6365919d5576cfdecf
kernel-rt-debuginfo-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 82f0a83cc958cff3aa1dea938b07f796020d33ad69c52d67e149bb72da1fc785
kernel-rt-debuginfo-common-x86_64-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 57a61b7d7a82729437e78a2be7bae4e2d3201ee5661b0884a3b916ae88b7fc6a
kernel-rt-devel-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 0844e38596c726627626976c8da4e90762952707ebee43a4fd161882c145ce55
kernel-rt-modules-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 071321974a14ddf5e8462a489da40300608be95f324963bfe2fe78d3a4898794
kernel-rt-modules-extra-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 901923a345d9650256b26141882125374a2a8d7c60d4594e8c63acd3b8e1cff5
Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4
SRPM
kernel-rt-4.18.0-305.rt7.72.el8.src.rpm
SHA-256: 99d2cb6f141d0cabbf6022ad019bf53159c718448c45a30e7052f9856683e322
x86_64
kernel-rt-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 3556ffd984a9f6ecc8f63af375b1191298f7f54bdabcb980bded03d2fe5b1974
kernel-rt-core-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 0bb01dd44a9b30c1e2e81e00df1ff50f11746ef5dc8f46fc07544e988fa468bb
kernel-rt-debug-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 0f220efd939a904c99a06ab3bf0a3f4c1ce968efbea8ac35e3081aa4ff30650c
kernel-rt-debug-core-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: e06c7ba4c50e401a6081c991325f356d7142ae58cf92d08383d6246b5ef4aaa3
kernel-rt-debug-debuginfo-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: dc05185ad33a38d0124db55cae669e78240bf1a2a4c50d81ebbe229dbb028c21
kernel-rt-debug-devel-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 9ff0bf5d5273e3911230f017cd18a40a7d10531965449d099f832b26adee2d99
kernel-rt-debug-modules-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 85bad37ac9b8e760c6a90398da7fb294c2ec56d5192dc50e121565cf40db45dc
kernel-rt-debug-modules-extra-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 078006b5972aaf502dde093e9329ba7f86ee33bfe1829d6365919d5576cfdecf
kernel-rt-debuginfo-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 82f0a83cc958cff3aa1dea938b07f796020d33ad69c52d67e149bb72da1fc785
kernel-rt-debuginfo-common-x86_64-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 57a61b7d7a82729437e78a2be7bae4e2d3201ee5661b0884a3b916ae88b7fc6a
kernel-rt-devel-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 0844e38596c726627626976c8da4e90762952707ebee43a4fd161882c145ce55
kernel-rt-modules-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 071321974a14ddf5e8462a489da40300608be95f324963bfe2fe78d3a4898794
kernel-rt-modules-extra-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 901923a345d9650256b26141882125374a2a8d7c60d4594e8c63acd3b8e1cff5
Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.6
SRPM
kernel-rt-4.18.0-305.rt7.72.el8.src.rpm
SHA-256: 99d2cb6f141d0cabbf6022ad019bf53159c718448c45a30e7052f9856683e322
x86_64
kernel-rt-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 3556ffd984a9f6ecc8f63af375b1191298f7f54bdabcb980bded03d2fe5b1974
kernel-rt-core-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 0bb01dd44a9b30c1e2e81e00df1ff50f11746ef5dc8f46fc07544e988fa468bb
kernel-rt-debug-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 0f220efd939a904c99a06ab3bf0a3f4c1ce968efbea8ac35e3081aa4ff30650c
kernel-rt-debug-core-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: e06c7ba4c50e401a6081c991325f356d7142ae58cf92d08383d6246b5ef4aaa3
kernel-rt-debug-debuginfo-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: dc05185ad33a38d0124db55cae669e78240bf1a2a4c50d81ebbe229dbb028c21
kernel-rt-debug-devel-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 9ff0bf5d5273e3911230f017cd18a40a7d10531965449d099f832b26adee2d99
kernel-rt-debug-kvm-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 25763f130cd1e37ba21a736ea3ea2426b0a579992e3be46bde21f6d28d05cf1c
kernel-rt-debug-modules-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 85bad37ac9b8e760c6a90398da7fb294c2ec56d5192dc50e121565cf40db45dc
kernel-rt-debug-modules-extra-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 078006b5972aaf502dde093e9329ba7f86ee33bfe1829d6365919d5576cfdecf
kernel-rt-debuginfo-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 82f0a83cc958cff3aa1dea938b07f796020d33ad69c52d67e149bb72da1fc785
kernel-rt-debuginfo-common-x86_64-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 57a61b7d7a82729437e78a2be7bae4e2d3201ee5661b0884a3b916ae88b7fc6a
kernel-rt-devel-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 0844e38596c726627626976c8da4e90762952707ebee43a4fd161882c145ce55
kernel-rt-kvm-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: ef47374e3f7a9e6b77d2e0cfdbfb3e654e6d9cd1eacdf2fdcdc5f723f062cf59
kernel-rt-modules-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 071321974a14ddf5e8462a489da40300608be95f324963bfe2fe78d3a4898794
kernel-rt-modules-extra-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 901923a345d9650256b26141882125374a2a8d7c60d4594e8c63acd3b8e1cff5
Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4
SRPM
kernel-rt-4.18.0-305.rt7.72.el8.src.rpm
SHA-256: 99d2cb6f141d0cabbf6022ad019bf53159c718448c45a30e7052f9856683e322
x86_64
kernel-rt-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 3556ffd984a9f6ecc8f63af375b1191298f7f54bdabcb980bded03d2fe5b1974
kernel-rt-core-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 0bb01dd44a9b30c1e2e81e00df1ff50f11746ef5dc8f46fc07544e988fa468bb
kernel-rt-debug-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 0f220efd939a904c99a06ab3bf0a3f4c1ce968efbea8ac35e3081aa4ff30650c
kernel-rt-debug-core-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: e06c7ba4c50e401a6081c991325f356d7142ae58cf92d08383d6246b5ef4aaa3
kernel-rt-debug-debuginfo-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: dc05185ad33a38d0124db55cae669e78240bf1a2a4c50d81ebbe229dbb028c21
kernel-rt-debug-devel-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 9ff0bf5d5273e3911230f017cd18a40a7d10531965449d099f832b26adee2d99
kernel-rt-debug-kvm-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 25763f130cd1e37ba21a736ea3ea2426b0a579992e3be46bde21f6d28d05cf1c
kernel-rt-debug-modules-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 85bad37ac9b8e760c6a90398da7fb294c2ec56d5192dc50e121565cf40db45dc
kernel-rt-debug-modules-extra-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 078006b5972aaf502dde093e9329ba7f86ee33bfe1829d6365919d5576cfdecf
kernel-rt-debuginfo-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 82f0a83cc958cff3aa1dea938b07f796020d33ad69c52d67e149bb72da1fc785
kernel-rt-debuginfo-common-x86_64-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 57a61b7d7a82729437e78a2be7bae4e2d3201ee5661b0884a3b916ae88b7fc6a
kernel-rt-devel-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 0844e38596c726627626976c8da4e90762952707ebee43a4fd161882c145ce55
kernel-rt-kvm-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: ef47374e3f7a9e6b77d2e0cfdbfb3e654e6d9cd1eacdf2fdcdc5f723f062cf59
kernel-rt-modules-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 071321974a14ddf5e8462a489da40300608be95f324963bfe2fe78d3a4898794
kernel-rt-modules-extra-4.18.0-305.rt7.72.el8.x86_64.rpm
SHA-256: 901923a345d9650256b26141882125374a2a8d7c60d4594e8c63acd3b8e1cff5
Related news
Dell Streaming Data Platform prior to 1.4 contains Open Redirect vulnerability. An attacker with privileges same as a legitimate user can phish the legitimate the user to redirect to malicious website leading to information disclosure and launch of phishing attacks.
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]
Pexip Infinity before 28.1 allows remote attackers to trigger a software abort via G.719.
Pexip Infinity before 28.1 allows remote attackers to trigger a software abort via G.719.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via H.323.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via Epic Telehealth.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via single-sign-on if a random Universally Unique Identifier is guessed.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via H.323.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.
Pexip Infinity before 27.3 allows remote attackers to trigger excessive resource consumption via H.264.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity 27.x before 27.2 has Improper Access Control. An attacker can sometimes join a conference (call join) if it has a lock but not a PIN.
Pexip Infinity 27.x before 27.2 has Improper Access Control. An attacker can sometimes join a conference (call join) if it has a lock but not a PIN.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via single-sign-on if a random Universally Unique Identifier is guessed.
Pexip Infinity before 27.3 allows remote attackers to trigger excessive resource consumption via H.264.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via H.323.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via H.323.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via single-sign-on if a random Universally Unique Identifier is guessed.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.
Pexip Infinity before 27.3 allows remote attackers to force a software abort via HTTP.
Pexip Infinity 27.x before 27.3 has Improper Input Validation. The client API allows remote attackers to trigger a software abort via a gateway call into Teams.
Pexip Infinity 27.x before 27.2 has Improper Access Control. An attacker can sometimes join a conference (call join) if it has a lock but not a PIN.
Pexip Infinity 27.x before 27.3 has Improper Input Validation. The client API allows remote attackers to trigger a software abort via a gateway call into Teams.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via single-sign-on if a random Universally Unique Identifier is guessed.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity 27.x before 27.2 has Improper Access Control. An attacker can sometimes join a conference (call join) if it has a lock but not a PIN.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via H.323.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.
Pexip Infinity 27.x before 27.2 has Improper Access Control. An attacker can sometimes join a conference (call join) if it has a lock but not a PIN.
Pexip Infinity 27.x before 27.3 has Improper Input Validation. The client API allows remote attackers to trigger a software abort via a gateway call into Teams.
Pexip Infinity before 27.3 allows remote attackers to force a software abort via HTTP.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via single-sign-on if a random Universally Unique Identifier is guessed.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via H.323.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via H.323.
Pexip Infinity 27.x before 27.2 has Improper Access Control. An attacker can sometimes join a conference (call join) if it has a lock but not a PIN.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via single-sign-on if a random Universally Unique Identifier is guessed.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via single-sign-on if a random Universally Unique Identifier is guessed.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity 27.x before 27.2 has Improper Access Control. An attacker can sometimes join a conference (call join) if it has a lock but not a PIN.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity before 27.3 allows remote attackers to trigger excessive resource consumption via H.264.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity before 27.3 allows remote attackers to trigger excessive resource consumption via H.264.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.
In append_to_verify_fifo_interleaved_ of stream_encoder.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-174302683
A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.
A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.
A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.
A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c * CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * CVE-2020-0431: kernel: pos...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c * CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * CVE-2020-0431: kernel: pos...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c * CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * CVE-2020-0431: kernel: pos...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c * CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * CVE-2020-0431: kernel: pos...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c * CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * CVE-2020-0431: kernel: pos...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c * CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * CVE-2020-0431: kernel: pos...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c * CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * CVE-2020-0431: kernel: pos...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c * CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * CVE-2020-0431: kernel: pos...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c * CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * CVE-2020-0431: kernel: pos...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c * CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * CVE-2020-0431: kernel: pos...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c * CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * CVE-2020-0431: kernel: pos...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c * CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * CVE-2020-0431: kernel: pos...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c * CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * CVE-2020-0431: kernel: pos...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c * CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * CVE-2020-0431: kernel: pos...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c * CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * CVE-2020-0431: kernel: pos...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c * CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * CVE-2020-0431: kernel: pos...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c * CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * CVE-2020-0431: kernel: pos...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c * CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * CVE-2020-0431: kernel: pos...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c * CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * CVE-2020-0431: kernel: pos...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c * CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * CVE-2020-0431: kernel: pos...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c * CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * CVE-2020-0431: kernel: pos...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c * CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * CVE-2020-0431: kernel: pos...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c * CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * CVE-2020-0431: kernel: pos...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c * CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver * CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver * CVE-2020-0431: kernel: pos...
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CV...
Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CV...
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.
Null pointer reference in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before version Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.
A flaw was found in the Linux kernel’s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.
A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.
A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.
In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.
usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.
In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.