Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.883363
Categoría:CentOS Local Security Checks
Título:CentOS: Security Advisory for bpftool (CESA-2021:2725)
Resumen:The remote host is missing an update for the 'bpftool'; package(s) announced via the CESA-2021:2725 advisory.
Descripción:Summary:
The remote host is missing an update for the 'bpftool'
package(s) announced via the CESA-2021:2725 advisory.

Vulnerability Insight:
The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* kernel: size_t-to-int conversion vulnerability in the filesystem layer
(CVE-2021-33909)

* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an
hci_chan (CVE-2021-33034)

* kernel: use-after-free in show_numa_stats function (CVE-2019-20934)

* kernel: mishandles invalid descriptors in
drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)

* kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c
(CVE-2021-33033)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* [RHEL7.9.z] n_tty_open: 'BUG: unable to handle kernel paging request'
(BZ#1872778)

* [ESXi][RHEL7.8]'qp_alloc_hypercall result = -20' / 'Could not attach to
queue pair with -20' with vSphere Fault Tolerance enabled (BZ#1892237)

* [RHEL7.9][s390x][Regression] Sino Nomine swapgen IBM z/VM emulated DASD
with DIAG driver returns EOPNOTSUPP (BZ#1910395)

* False-positive hard lockup detected while processing the thread state
information (SysRq-T) (BZ#1912221)

* RHEL7.9 zstream - s390x LPAR with NVMe SSD will panic when it has 32 or
more IFL (pci) (BZ#1917943)

* The NMI watchdog detected a hard lockup while printing RCU CPU stall
warning messages to the serial console (BZ#1924688)

* nvme hangs when trying to allocate reserved tag (BZ#1926825)

* [REGRESSION] 'call into AER handling regardless of severity' triggers
do_recovery() unnecessarily on correctable PCIe errors (BZ#1933663)

* Module nvme_core: A double free of the kmalloc-512 cache between
nvme_trans_log_temperature() and nvme_get_log_page(). (BZ#1946793)

* sctp - SCTP_CMD_TIMER_START queues active timer kernel BUG at
kernel/timer.c:1000! (BZ#1953052)

* [Hyper-V][RHEL-7]When CONFIG_NET_POLL_CONTROLLER is set, mainline commit
2a7f8c3b1d3fee is needed (BZ#1953075)

* Kernel panic at cgroup_is_descendant (BZ#1957719)

* [Hyper-V][RHEL-7]Commits To Fix Kdump Failures (BZ#1957803)

* IGMPv2 JOIN packets incorrectly routed to loopback (BZ#1958339)

* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap
[7.9.z] (BZ#1960193)

* mlx4: Fix memory allocation in mlx4_buddy_init needed (BZ#1962406)

* incorrect assertion on pi_state->pi_mutex.wait_lock from
pi_state_update_owner() (BZ#1965495)

Affected Software/OS:
'bpftool' package(s) on CentOS 7.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2019-20934
https://bugs.chromium.org/p/project-zero/issues/detail?id=1913
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.6
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=16d51a590a8ce3befb1308e0e7ab77f3b661af33
Common Vulnerability Exposure (CVE) ID: CVE-2020-11668
Debian Security Information: DSA-4698 (Google Search)
https://www.debian.org/security/2020/dsa-4698
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a246b4d547708f33ff4d4b9a7a5dbac741dc89d8
https://github.com/torvalds/linux/commit/a246b4d547708f33ff4d4b9a7a5dbac741dc89d8
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4364-1/
https://usn.ubuntu.com/4368-1/
https://usn.ubuntu.com/4369-1/
Common Vulnerability Exposure (CVE) ID: CVE-2021-33033
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.14
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.7
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad5d07f4a9cd671233ae20983848874731102c08
https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-cipso_v4_genopt
https://syzkaller.appspot.com/bug?id=96e7d345748d8814901c91cd92084ed04b46701e
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-33034
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GI7Z7UBWBGD3ABNIL2DC7RQDCGA4UVQW/
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.4
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3
https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl
https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-33909
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b
https://security.netapp.com/advisory/ntap-20210819-0004/
Debian Security Information: DSA-4941 (Google Search)
https://www.debian.org/security/2021/dsa-4941
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/
http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html
http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html
http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
https://www.openwall.com/lists/oss-security/2021/07/20/1
https://www.oracle.com/security-alerts/cpujan2022.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html
http://www.openwall.com/lists/oss-security/2021/07/22/7
http://www.openwall.com/lists/oss-security/2021/08/25/10
http://www.openwall.com/lists/oss-security/2021/09/17/2
http://www.openwall.com/lists/oss-security/2021/09/17/4
http://www.openwall.com/lists/oss-security/2021/09/21/1
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.