Description: | Summary: The remote host is missing an update for the 'bpftool' package(s) announced via the CESA-2021:3327 advisory.
Vulnerability Insight: The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)
* kernel: race condition for removal of the HCI controller (CVE-2021-32399)
* kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777)
* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)
* kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS (CVE-2021-29650)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* SAN Switch rebooted and caused (?) OpenStack compute node to reboot (BZ#1897576)
* sysfs: cannot create duplicate filename '/class/mdio_bus/ixgbe-8100 (BZ#1915449)
* XFS: read-only recovery does not update free space accounting in superblock (BZ#1921551)
* The memcg_params field of kmem_cache struct contains an old slab address that is to small for the current size of memcg_limited_groups_array_size. (BZ#1951810)
* Backport of upstream patch 'net: Update window_clamp if SOCK_RCVBUF is set ' into rhel-7 (BZ#1962196)
* Kernel panic in init_cq_frag_buf (BZ#1962499)
* futex: futex_requeue can potentially free the pi_state structure twice (BZ#1966856)
* be_poll lockup doing ifenslave when netconsole using bond (BZ#1971744)
* OCP4.7 nodes panic at BUG_ON in nf_nat_setup_info() (BZ#1972970)
Affected Software/OS: 'bpftool' package(s) on CentOS 7.
Solution: Please install the updated package(s).
CVSS Score: 7.2
CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
|