ID

VAR-202012-1546


CVE

CVE-2020-29661


TITLE

Red Hat Security Advisory 2021-0719-01

Trust: 0.1

sources: PACKETSTORM: 161656

DESCRIPTION

A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b. Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. Bug fix: * RHACM 2.0.8 images (BZ #1915461) 3. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/): 1915461 - RHACM 2.0.8 images 1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation 5. 8) - x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Bug Fix(es): * kernel-rt: update RT source tree to the RHEL-8.3.z2 source tree (BZ#1908433) 4. Bug Fix(es): * Openstack network node reports unregister_netdevice: waiting for qr-3cec0c92-9a to become free. Usage count = 1 (BZ#1908539) 4. 6 ELS) - i386, s390x, x86_64 3. Bug Fix(es): * Enable CI and changelog for GitLab workflow (BZ#1930523) 4. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security, bug fix, and enhancement update Advisory ID: RHSA-2021:0878-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:0878 Issue date: 2021-03-16 CVE Names: CVE-2020-14351 CVE-2020-24394 CVE-2020-25212 CVE-2020-29661 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux ComputeNode EUS (v. 7.6) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.6) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.6) - ppc64, ppc64le, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free (CVE-2020-29661) * kernel: performance counters race condition use-after-free (CVE-2020-14351) * kernel: umask not applied on filesystem without ACL support (CVE-2020-24394) * kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Security patch for CVE-2020-25212 breaks directory listings via 'ls' on NFS V4.2 shares mounted with selinux enabled labels (BZ#1919144) * Enable CI and changelog for GitLab workflow (BZ#1930931) Enhancement(s): * [Cavium 7.7 Feat] qla2xxx: Update to latest upstream. (BZ#1918534) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1862849 - CVE-2020-14351 kernel: performance counters race condition use-after-free 1869141 - CVE-2020-24394 kernel: umask not applied on filesystem without ACL support 1877575 - CVE-2020-25212 kernel: TOCTOU mismatch in the NFS client code 1906525 - CVE-2020-29661 kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free 6. Package List: Red Hat Enterprise Linux ComputeNode EUS (v. 7.6): Source: kernel-3.10.0-957.70.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-957.70.1.el7.noarch.rpm kernel-doc-3.10.0-957.70.1.el7.noarch.rpm x86_64: bpftool-3.10.0-957.70.1.el7.x86_64.rpm kernel-3.10.0-957.70.1.el7.x86_64.rpm kernel-debug-3.10.0-957.70.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.70.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.70.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.70.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.70.1.el7.x86_64.rpm kernel-devel-3.10.0-957.70.1.el7.x86_64.rpm kernel-headers-3.10.0-957.70.1.el7.x86_64.rpm kernel-tools-3.10.0-957.70.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.70.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.70.1.el7.x86_64.rpm perf-3.10.0-957.70.1.el7.x86_64.rpm perf-debuginfo-3.10.0-957.70.1.el7.x86_64.rpm python-perf-3.10.0-957.70.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.70.1.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6): x86_64: kernel-debug-debuginfo-3.10.0-957.70.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.70.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.70.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.70.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.70.1.el7.x86_64.rpm perf-debuginfo-3.10.0-957.70.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.70.1.el7.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 7.6): Source: kernel-3.10.0-957.70.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-957.70.1.el7.noarch.rpm kernel-doc-3.10.0-957.70.1.el7.noarch.rpm ppc64: kernel-3.10.0-957.70.1.el7.ppc64.rpm kernel-bootwrapper-3.10.0-957.70.1.el7.ppc64.rpm kernel-debug-3.10.0-957.70.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-957.70.1.el7.ppc64.rpm kernel-debug-devel-3.10.0-957.70.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-957.70.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-957.70.1.el7.ppc64.rpm kernel-devel-3.10.0-957.70.1.el7.ppc64.rpm kernel-headers-3.10.0-957.70.1.el7.ppc64.rpm kernel-tools-3.10.0-957.70.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-957.70.1.el7.ppc64.rpm kernel-tools-libs-3.10.0-957.70.1.el7.ppc64.rpm perf-3.10.0-957.70.1.el7.ppc64.rpm perf-debuginfo-3.10.0-957.70.1.el7.ppc64.rpm python-perf-3.10.0-957.70.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-957.70.1.el7.ppc64.rpm ppc64le: kernel-3.10.0-957.70.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-957.70.1.el7.ppc64le.rpm kernel-debug-3.10.0-957.70.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-957.70.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-957.70.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-957.70.1.el7.ppc64le.rpm kernel-devel-3.10.0-957.70.1.el7.ppc64le.rpm kernel-headers-3.10.0-957.70.1.el7.ppc64le.rpm kernel-tools-3.10.0-957.70.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-957.70.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-957.70.1.el7.ppc64le.rpm perf-3.10.0-957.70.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-957.70.1.el7.ppc64le.rpm python-perf-3.10.0-957.70.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-957.70.1.el7.ppc64le.rpm s390x: kernel-3.10.0-957.70.1.el7.s390x.rpm kernel-debug-3.10.0-957.70.1.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-957.70.1.el7.s390x.rpm kernel-debug-devel-3.10.0-957.70.1.el7.s390x.rpm kernel-debuginfo-3.10.0-957.70.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-957.70.1.el7.s390x.rpm kernel-devel-3.10.0-957.70.1.el7.s390x.rpm kernel-headers-3.10.0-957.70.1.el7.s390x.rpm kernel-kdump-3.10.0-957.70.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-957.70.1.el7.s390x.rpm kernel-kdump-devel-3.10.0-957.70.1.el7.s390x.rpm perf-3.10.0-957.70.1.el7.s390x.rpm perf-debuginfo-3.10.0-957.70.1.el7.s390x.rpm python-perf-3.10.0-957.70.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-957.70.1.el7.s390x.rpm x86_64: bpftool-3.10.0-957.70.1.el7.x86_64.rpm kernel-3.10.0-957.70.1.el7.x86_64.rpm kernel-debug-3.10.0-957.70.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.70.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.70.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.70.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.70.1.el7.x86_64.rpm kernel-devel-3.10.0-957.70.1.el7.x86_64.rpm kernel-headers-3.10.0-957.70.1.el7.x86_64.rpm kernel-tools-3.10.0-957.70.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.70.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.70.1.el7.x86_64.rpm perf-3.10.0-957.70.1.el7.x86_64.rpm perf-debuginfo-3.10.0-957.70.1.el7.x86_64.rpm python-perf-3.10.0-957.70.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.70.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 7.6): ppc64: kernel-debug-debuginfo-3.10.0-957.70.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-957.70.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-957.70.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-957.70.1.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-957.70.1.el7.ppc64.rpm perf-debuginfo-3.10.0-957.70.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-957.70.1.el7.ppc64.rpm ppc64le: kernel-debug-debuginfo-3.10.0-957.70.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-957.70.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-957.70.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-957.70.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-957.70.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-957.70.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-957.70.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-957.70.1.el7.ppc64le.rpm x86_64: kernel-debug-debuginfo-3.10.0-957.70.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.70.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.70.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.70.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.70.1.el7.x86_64.rpm perf-debuginfo-3.10.0-957.70.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.70.1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-14351 https://access.redhat.com/security/cve/CVE-2020-24394 https://access.redhat.com/security/cve/CVE-2020-25212 https://access.redhat.com/security/cve/CVE-2020-29661 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYFDHTtzjgjWX9erEAQgMwRAAmciGnGTaC97k1bJgX42n8dc4yATy5Arr rkG9GV0fuZyA0K3NTQHzXzUxmUZmqpIw08g3hvnzsUCkaHcLCcfby7EvIS4MPASE flN5JCjKqHBqIEVrXW+s+shnjiUU3TP0QyN3t5TzuosxAwfq8tW0YDpfY/0o/v32 bdlRxBOX5dakNO6mj40tAEmGHZmHglJqYpGFSnGavE0Y2KQHJPHpsNFYBa77Cb9I /EzJfdLcXLgJGroMcWLaY3G2qCbI47cJI/Mln5spEzPd3ZuZfagCIPiBNtlNJngx QXgRaN3KdzGrMDjS0EJTdOVhUn65jLinYiNh6XSShpzRCtKKRPeeTKKetj5pt4J6 cKvAP4bGmri+F+tHJskP/zOTda2TPOXx8a/nzUlsXz1WjC74wN+emcoZuQZelZqd 5Eqr5lsQieTOBkQj7l4nIemwalrFi9l5RUhQNHZ44D85oAKgrqa8xxsvH5Hh9N3z TCavuEWFSl7ThIJsjgff8D8poJgs1wfOzBadzam3scZiTOFN5HG6aUNntInqGQSp dsTmaSTp8aE41Qrk9+J5X//CN2t815LMVhcqn33gn3kIWSBBdrVA5/jQuF/gzGN0 zAF7YoQYnJv8+JjKKF8SyR7gkH1irgXoT/K0SLELJzzDYzaLNqab+5/iPhMiW0Cx yxBTk0suqaE= =c0qF -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . This advisory contains the following OpenShift Virtualization 2.6.0 images: RHEL-8-CNV-2.6 =============kubevirt-cpu-node-labeller-container-v2.6.0-5 kubevirt-cpu-model-nfd-plugin-container-v2.6.0-5 node-maintenance-operator-container-v2.6.0-13 kubevirt-vmware-container-v2.6.0-5 virtio-win-container-v2.6.0-5 kubevirt-kvm-info-nfd-plugin-container-v2.6.0-5 bridge-marker-container-v2.6.0-9 kubevirt-template-validator-container-v2.6.0-9 kubevirt-v2v-conversion-container-v2.6.0-6 kubemacpool-container-v2.6.0-13 kubevirt-ssp-operator-container-v2.6.0-40 hyperconverged-cluster-webhook-container-v2.6.0-73 hyperconverged-cluster-operator-container-v2.6.0-73 ovs-cni-plugin-container-v2.6.0-10 cnv-containernetworking-plugins-container-v2.6.0-10 ovs-cni-marker-container-v2.6.0-10 cluster-network-addons-operator-container-v2.6.0-16 hostpath-provisioner-container-v2.6.0-11 hostpath-provisioner-operator-container-v2.6.0-14 vm-import-virtv2v-container-v2.6.0-21 kubernetes-nmstate-handler-container-v2.6.0-19 vm-import-controller-container-v2.6.0-21 vm-import-operator-container-v2.6.0-21 virt-api-container-v2.6.0-111 virt-controller-container-v2.6.0-111 virt-handler-container-v2.6.0-111 virt-operator-container-v2.6.0-111 virt-launcher-container-v2.6.0-111 cnv-must-gather-container-v2.6.0-54 virt-cdi-importer-container-v2.6.0-24 virt-cdi-cloner-container-v2.6.0-24 virt-cdi-controller-container-v2.6.0-24 virt-cdi-uploadserver-container-v2.6.0-24 virt-cdi-apiserver-container-v2.6.0-24 virt-cdi-uploadproxy-container-v2.6.0-24 virt-cdi-operator-container-v2.6.0-24 hco-bundle-registry-container-v2.6.0-582 Security Fix(es): * golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic (CVE-2020-9283) * golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652) * gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121) * golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040) * golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586) * golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845) * jwt-go: access restriction bypass vulnerability (CVE-2020-26160) * golang-github-gorilla-websocket: integer overflow leads to denial of service (CVE-2020-27813) * golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362) * containernetworking-cni: Arbitrary path injection via type field in CNI configuration (CVE-2021-20206) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/): 1732329 - Virtual Machine is missing documentation of its properties in yaml editor 1783192 - Guest kernel panic when start RHEL6.10 guest with q35 machine type and virtio disk in cnv 1791753 - [RFE] [SSP] Template validator should check validations in template's parent template 1804533 - CVE-2020-9283 golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic 1848954 - KMP missing CA extensions in cabundle of mutatingwebhookconfiguration 1848956 - KMP requires downtime for CA stabilization during certificate rotation 1853652 - CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash 1853911 - VM with dot in network name fails to start with unclear message 1854098 - NodeNetworkState on workers doesn't have "status" key due to nmstate-handler pod failure to run "nmstatectl show" 1856347 - SR-IOV : Missing network name for sriov during vm setup 1856953 - CVE-2020-15586 golang: data race in certain net/http servers including ReverseProxy can lead to DoS 1859235 - Common Templates - after upgrade there are 2 common templates per each os-workload-flavor combination 1860714 - No API information from `oc explain` 1860992 - CNV upgrade - users are not removed from privileged SecurityContextConstraints 1864577 - [v2v][RHV to CNV non migratable source VM fails to import to Ceph-rbd / File system due to overhead required for Filesystem 1866593 - CDI is not handling vm disk clone 1867099 - CVE-2020-16845 golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs 1868817 - Container-native Virtualization 2.6.0 Images 1873771 - Improve the VMCreationFailed error message caused by VM low memory 1874812 - SR-IOV: Guest Agent expose link-local ipv6 address for sometime and then remove it 1878499 - DV import doesn't recover from scratch space PVC deletion 1879108 - Inconsistent naming of "oc virt" command in help text 1881874 - openshift-cnv namespace is getting stuck if the user tries to delete it while CNV is running 1883232 - Webscale: kubevirt/CNV datavolume importer pod inability to disable sidecar injection if namespace has sidecar injection enabled but VM Template does NOT 1883371 - CVE-2020-26160 jwt-go: access restriction bypass vulnerability 1885153 - [v2v][RHV to CNv VM import] Wrong Network mapping do not show a relevant error message 1885418 - [openshift-cnv] issues with memory overhead calculation when limits are used 1887398 - [openshift-cnv][CNV] nodes need to exist and be labeled first, *before* the NodeNetworkConfigurationPolicy is applied 1889295 - [v2v][VMware to CNV VM import API] diskMappings: volumeMode Block is not passed on to PVC request. 1891285 - Common templates and kubevirt-config cm - update machine-type 1891440 - [v2v][VMware to CNV VM import API]Source VM with no network interface fail with unclear error 1892227 - [SSP] cluster scoped resources are not being reconciled 1893278 - openshift-virtualization-os-images namespace not seen by user 1893646 - [HCO] Pod placement configuration - dry run is not performed for all the configuration stanza 1894428 - Message for VMI not migratable is not clear enough 1894824 - [v2v][VM import] Pick the smallest template for the imported VM, and not always Medium 1894897 - [v2v][VMIO] VMimport CR is not reported as failed when target VM is deleted during the import 1895414 - Virt-operator is accepting updates to the placement of its workload components even with running VMs 1897635 - CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers 1898072 - Add Fedora33 to Fedora common templates 1898840 - [v2v] VM import VMWare to CNV Import 63 chars vm name should not fail 1899558 - CNV 2.6 - nmstate fails to set state 1901480 - VM disk io can't worked if namespace have label kubemacpool 1902046 - Not possible to edit CDIConfig (through CDI CR / CDIConfig) 1902111 - CVE-2020-27813 golang-github-gorilla-websocket: integer overflow leads to denial of service 1903014 - hco-webhook pod in CreateContainerError 1903585 - [v2v] Windows 2012 VM imported from RHV goes into Windows repair mode 1904797 - [VMIO][vmware] A migrated RHEL/Windows VM starts in emergency mode/safe mode when target storage is NFS and target namespace is NOT "default" 1906199 - [CNV-2.5] CNV Tries to Install on Windows Workers 1907151 - kubevirt version is not reported correctly via virtctl 1907352 - VM/VMI link changes to `kubevirt.io~v1~VirtualMachineInstance` on CNV 2.6 1907691 - [CNV] Configuring NodeNetworkConfigurationPolicy caused "Internal error occurred" for creating datavolume 1907988 - VM loses dynamic IP address of its default interface after migration 1908363 - Applying NodeNetworkConfigurationPolicy for different NIC than default disables br-ex bridge and nodes lose connectivity 1908421 - [v2v] [VM import RHV to CNV] Windows imported VM boot failed: INACCESSIBLE BOOT DEVICE error 1908883 - CVE-2020-29652 golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference 1909458 - [V2V][VMware to CNV VM import via api using VMIO] VM import to Ceph RBD/BLOCK fails on "qemu-img: /data/disk.img" error 1910857 - Provide a mechanism to enable the HotplugVolumes feature gate via HCO 1911118 - Windows VMI LiveMigration / shutdown fails on 'XML error: non unique alias detected: ua-') 1911396 - Set networkInterfaceMultiqueue false in rhel 6 template for e1000e interface 1911662 - el6 guests don't work properly if virtio bus is specified on various devices 1912908 - Allow using "scsi" bus for disks in template validation 1913248 - Creating vlan interface on top of a bond device via NodeNetworkConfigurationPolicy fails 1913320 - Informative message needed with virtctl image-upload, that additional step is needed from the user 1913717 - Users should have read permitions for golden images data volumes 1913756 - Migrating to Ceph-RBD + Block fails when skipping zeroes 1914177 - CNV does not preallocate blank file data volumes 1914608 - Obsolete CPU models (kubevirt-cpu-plugin-configmap) are set on worker nodes 1914947 - HPP golden images - DV shoudld not be created with WaitForFirstConsumer 1917908 - [VMIO] vmimport pod fail to create when using ceph-rbd/block 1917963 - [CNV 2.6] Unable to install CNV disconnected - requires kvm-info-nfd-plugin which is not mirrored 1919391 - CVE-2021-20206 containernetworking-cni: Arbitrary path injection via type field in CNI configuration 1920576 - HCO can report ready=true when it failed to create a CR for a component operator 1920610 - e2e-aws-4.7-cnv consistently failing on Hyperconverged Cluster Operator 1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation 1923979 - kubernetes-nmstate: nmstate-handler pod crashes when configuring bridge device using ip tool 1927373 - NoExecute taint violates pdb; VMIs are not live migrated 1931376 - VMs disconnected from nmstate-defined bridge after CNV-2.5.4->CNV-2.6.0 upgrade 5. 8.2) - ppc64le, x86_64 3. Description: This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. ========================================================================= Ubuntu Security Notice USN-4748-1 February 25, 2021 linux, linux-aws, linux-kvm, linux-lts-xenial, linux-raspi2, linux-snapdragon vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 LTS - Ubuntu 14.04 ESM Summary: Several security issues were fixed in the Linux kernel. A local attacker could use this to possibly cause a denial of service (system crash). A local attacker could possibly use this to gain unintended write access to read-only memory pages. (CVE-2020-29374) Michael Kurth and Pawel Wieczorkiewicz discovered that the Xen event processing backend in the Linux kernel did not properly limit the number of events queued. An attacker in a guest VM could use this to cause a denial of service in the host OS. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-29661) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 LTS: linux-image-4.4.0-1088-kvm 4.4.0-1088.97 linux-image-4.4.0-1122-aws 4.4.0-1122.136 linux-image-4.4.0-1146-raspi2 4.4.0-1146.156 linux-image-4.4.0-1150-snapdragon 4.4.0-1150.160 linux-image-4.4.0-203-generic 4.4.0-203.235 linux-image-4.4.0-203-generic-lpae 4.4.0-203.235 linux-image-4.4.0-203-lowlatency 4.4.0-203.235 linux-image-4.4.0-203-powerpc-e500mc 4.4.0-203.235 linux-image-4.4.0-203-powerpc-smp 4.4.0-203.235 linux-image-4.4.0-203-powerpc64-emb 4.4.0-203.235 linux-image-4.4.0-203-powerpc64-smp 4.4.0-203.235 linux-image-aws 4.4.0.1122.127 linux-image-generic 4.4.0.203.209 linux-image-generic-lpae 4.4.0.203.209 linux-image-kvm 4.4.0.1088.86 linux-image-lowlatency 4.4.0.203.209 linux-image-powerpc-e500mc 4.4.0.203.209 linux-image-powerpc-smp 4.4.0.203.209 linux-image-powerpc64-emb 4.4.0.203.209 linux-image-powerpc64-smp 4.4.0.203.209 linux-image-raspi2 4.4.0.1146.146 linux-image-snapdragon 4.4.0.1150.142 linux-image-virtual 4.4.0.203.209 Ubuntu 14.04 ESM: linux-image-4.4.0-1086-aws 4.4.0-1086.90 linux-image-4.4.0-203-generic 4.4.0-203.235~14.04.1 linux-image-4.4.0-203-generic-lpae 4.4.0-203.235~14.04.1 linux-image-4.4.0-203-lowlatency 4.4.0-203.235~14.04.1 linux-image-4.4.0-203-powerpc-e500mc 4.4.0-203.235~14.04.1 linux-image-4.4.0-203-powerpc-smp 4.4.0-203.235~14.04.1 linux-image-4.4.0-203-powerpc64-emb 4.4.0-203.235~14.04.1 linux-image-4.4.0-203-powerpc64-smp 4.4.0-203.235~14.04.1 linux-image-aws 4.4.0.1086.83 linux-image-generic-lpae-lts-xenial 4.4.0.203.177 linux-image-generic-lts-xenial 4.4.0.203.177 linux-image-lowlatency-lts-xenial 4.4.0.203.177 linux-image-powerpc-e500mc-lts-xenial 4.4.0.203.177 linux-image-powerpc-smp-lts-xenial 4.4.0.203.177 linux-image-powerpc64-emb-lts-xenial 4.4.0.203.177 linux-image-powerpc64-smp-lts-xenial 4.4.0.203.177 linux-image-virtual-lts-xenial 4.4.0.203.177 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well

Trust: 1.89

sources: NVD: CVE-2020-29661 // VULMON: CVE-2020-29661 // PACKETSTORM: 161656 // PACKETSTORM: 161430 // PACKETSTORM: 162020 // PACKETSTORM: 162253 // PACKETSTORM: 161837 // PACKETSTORM: 161742 // PACKETSTORM: 161710 // PACKETSTORM: 162028 // PACKETSTORM: 161551 // PACKETSTORM: 161823

AFFECTED PRODUCTS

vendor:linuxmodel:kernelscope:gteversion:5.5

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:33

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.4.248

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.15

Trust: 1.0

vendor:netappmodel:8300scope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:2.6.26

Trust: 1.0

vendor:netappmodel:a400scope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.5

Trust: 1.0

vendor:netappmodel:a700sscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:tekelec platform distributionscope:gteversion:7.4.0

Trust: 1.0

vendor:broadcommodel:fabric operating systemscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.9.248

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.10

Trust: 1.0

vendor:oraclemodel:tekelec platform distributionscope:lteversion:7.7.1

Trust: 1.0

vendor:netappmodel:solidfire baseboard management controllerscope:eqversion: -

Trust: 1.0

vendor:netappmodel:h410cscope:eqversion: -

Trust: 1.0

vendor:netappmodel:active iq unified managerscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.14.212

Trust: 1.0

vendor:netappmodel:8700scope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.9.14

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:32

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.19.163

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.20

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.4.83

Trust: 1.0

sources: NVD: CVE-2020-29661

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-29661
value: HIGH

Trust: 1.0

VULMON: CVE-2020-29661
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2020-29661
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

nvd@nist.gov: CVE-2020-29661
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULMON: CVE-2020-29661 // NVD: CVE-2020-29661

PROBLEMTYPE DATA

problemtype:CWE-667

Trust: 1.0

problemtype:CWE-416

Trust: 1.0

sources: NVD: CVE-2020-29661

THREAT TYPE

local

Trust: 0.1

sources: PACKETSTORM: 161551

TYPE

overflow

Trust: 0.2

sources: PACKETSTORM: 162253 // PACKETSTORM: 161710

PATCH

title:Red Hat: Important: kernel-rt security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210537 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel-alt security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210354 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210558 - Security Advisory

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2020-29661 log

Trust: 0.1

title:Amazon Linux 2: ALAS2LIVEPATCH-2021-032url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2LIVEPATCH-2021-032

Trust: 0.1

title:Amazon Linux 2: ALAS2LIVEPATCH-2021-031url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2LIVEPATCH-2021-031

Trust: 0.1

title:Amazon Linux 2: ALAS2LIVEPATCH-2021-034url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2LIVEPATCH-2021-034

Trust: 0.1

title:Amazon Linux 2: ALAS2LIVEPATCH-2021-033url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2LIVEPATCH-2021-033

Trust: 0.1

title:IBM: Security Bulletin: There are multiple vulnerabilities in the Linux Kernel used in IBM Elastic Storage Systemurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=d39f316392b1adf4ca22f6ef041af00f

Trust: 0.1

title:Amazon Linux AMI: ALAS-2021-1477url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2021-1477

Trust: 0.1

title:Amazon Linux 2: ALAS2KERNEL-5.4-2022-019url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2KERNEL-5.4-2022-019

Trust: 0.1

title:Debian Security Advisories: DSA-4843-1 linux -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=b95030247235becf9e017bec31e9d503

Trust: 0.1

title:Amazon Linux 2: ALAS2-2021-1588url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2021-1588

Trust: 0.1

title:IBM: Security Bulletin: IBM Data Risk Manager is affected by multiple vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=e9d6f12dfd14652e2bb7e5c28ded162b

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=ec6577109e640dac19a6ddb978afe82d

Trust: 0.1

title:https://github.com/lcatro/cve_diff_checkerurl:https://github.com/lcatro/cve_diff_checker

Trust: 0.1

title:veracode-container-security-finding-parserurl:https://github.com/vincent-deng/veracode-container-security-finding-parser

Trust: 0.1

sources: VULMON: CVE-2020-29661

EXTERNAL IDS

db:NVDid:CVE-2020-29661

Trust: 2.1

db:PACKETSTORMid:160681

Trust: 1.1

db:PACKETSTORMid:164950

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2020/12/10/1

Trust: 1.1

db:VULMONid:CVE-2020-29661

Trust: 0.1

db:PACKETSTORMid:161656

Trust: 0.1

db:PACKETSTORMid:161430

Trust: 0.1

db:PACKETSTORMid:162020

Trust: 0.1

db:PACKETSTORMid:162253

Trust: 0.1

db:PACKETSTORMid:161837

Trust: 0.1

db:PACKETSTORMid:161742

Trust: 0.1

db:PACKETSTORMid:161710

Trust: 0.1

db:PACKETSTORMid:162028

Trust: 0.1

db:PACKETSTORMid:161551

Trust: 0.1

db:PACKETSTORMid:161823

Trust: 0.1

sources: VULMON: CVE-2020-29661 // PACKETSTORM: 161656 // PACKETSTORM: 161430 // PACKETSTORM: 162020 // PACKETSTORM: 162253 // PACKETSTORM: 161837 // PACKETSTORM: 161742 // PACKETSTORM: 161710 // PACKETSTORM: 162028 // PACKETSTORM: 161551 // PACKETSTORM: 161823 // NVD: CVE-2020-29661

REFERENCES

url:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=54ffccbf053b5b6ca4f6e45094b942fab92a25fc

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2020/12/10/1

Trust: 1.1

url:http://packetstormsecurity.com/files/160681/linux-tiocspgrp-broken-locking.html

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20210122-0001/

Trust: 1.1

url:https://www.debian.org/security/2021/dsa-4843

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpuoct2021.html

Trust: 1.1

url:http://packetstormsecurity.com/files/164950/kernel-live-patch-security-notice-lsn-0082-1.html

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/mz7oakaefaxqrgbzk4lyuwincd3d2xcl/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/bob25su6xul4tnp7kb63wnzsytiyfdpp/

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-29661

Trust: 0.9

url:https://access.redhat.com/security/cve/cve-2020-29661

Trust: 0.9

url:https://access.redhat.com/security/team/contact/

Trust: 0.9

url:https://bugzilla.redhat.com/):

Trust: 0.9

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.8

url:https://access.redhat.com/articles/11258

Trust: 0.8

url:https://access.redhat.com/security/team/key/

Trust: 0.7

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2020-14351

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-14351

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-25705

Trust: 0.3

url:https://access.redhat.com/errata/rhsa-2021:0537

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3121

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-25705

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/416.html

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/667.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/lcatro/cve_diff_checker

Trust: 0.1

url:https://alas.aws.amazon.com/al2/alaslivepatch-2021-032.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20230

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12723

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3121

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15436

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10878

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0719

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-35513

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20230

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-12723

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10543

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15436

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10878

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10543

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-35513

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:1028

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-27364

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20265

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:1288

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20265

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-27364

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-27365

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-27365

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-24394

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25212

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25212

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0878

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24394

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20907

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8624

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-16300

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14466

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10105

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25684

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13050

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9925

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-15166

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9802

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20218

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-26160

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-16230

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9895

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8625

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6829

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-12403

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20388

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-15165

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14382

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3156

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8812

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3899

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-16845

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14467

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8819

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10103

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14469

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11068

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3867

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-1971

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-16229

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8720

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9893

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-19221

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8808

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3902

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14465

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14882

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8623

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-16227

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25683

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-18197

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-1751

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3900

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14461

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20206

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14881

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9805

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14464

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8820

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9807

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8769

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8710

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8813

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9850

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14463

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-7595

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8811

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-16228

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14879

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-29652

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-16168

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9803

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9862

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24659

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14469

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9327

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10105

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14880

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3885

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-17450

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15503

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-16935

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-12321

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20916

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14461

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-5018

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-19956

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10018

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14422

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14468

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8835

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8764

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14466

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8844

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3865

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14882

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-1730

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15586

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3864

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-16227

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14464

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-16452

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-19906

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-16230

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20387

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14391

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15999

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14468

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14467

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-14559

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14462

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3862

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14880

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25682

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14881

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3901

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-16300

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8823

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14462

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-1752

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-16229

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-12400

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8622

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-28362

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-15903

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3895

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8492

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-11793

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20454

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-20843

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9894

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25685

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8816

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9843

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13627

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6405

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8771

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-16451

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13050

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3897

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10103

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-16228

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9806

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0799

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14463

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8814

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-14889

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-20843

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8743

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9915

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25686

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8815

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13632

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25687

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10029

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-16451

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8783

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20807

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13630

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14040

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14879

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14470

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25681

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14470

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8619

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9283

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-27813

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14465

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-11068

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13631

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8766

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-16452

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8846

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3868

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3894

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8782

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25211

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-0444

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25211

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-0444

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0763

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:1031

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1122.136

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.4.0-203.235

Trust: 0.1

url:https://usn.ubuntu.com/4748-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1088.97

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-29660

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27815

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1146.156

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-29568

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1150.160

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-29374

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-28374

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0862

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-28374

Trust: 0.1

sources: VULMON: CVE-2020-29661 // PACKETSTORM: 161656 // PACKETSTORM: 161430 // PACKETSTORM: 162020 // PACKETSTORM: 162253 // PACKETSTORM: 161837 // PACKETSTORM: 161742 // PACKETSTORM: 161710 // PACKETSTORM: 162028 // PACKETSTORM: 161551 // PACKETSTORM: 161823 // NVD: CVE-2020-29661

CREDITS

Red Hat

Trust: 0.9

sources: PACKETSTORM: 161656 // PACKETSTORM: 161430 // PACKETSTORM: 162020 // PACKETSTORM: 162253 // PACKETSTORM: 161837 // PACKETSTORM: 161742 // PACKETSTORM: 161710 // PACKETSTORM: 162028 // PACKETSTORM: 161823

SOURCES

db:VULMONid:CVE-2020-29661
db:PACKETSTORMid:161656
db:PACKETSTORMid:161430
db:PACKETSTORMid:162020
db:PACKETSTORMid:162253
db:PACKETSTORMid:161837
db:PACKETSTORMid:161742
db:PACKETSTORMid:161710
db:PACKETSTORMid:162028
db:PACKETSTORMid:161551
db:PACKETSTORMid:161823
db:NVDid:CVE-2020-29661

LAST UPDATE DATE

2024-12-21T20:13:07.555000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2020-29661date:2023-11-07T00:00:00
db:NVDid:CVE-2020-29661date:2024-11-21T05:24:23.040

SOURCES RELEASE DATE

db:VULMONid:CVE-2020-29661date:2020-12-09T00:00:00
db:PACKETSTORMid:161656date:2021-03-04T15:33:19
db:PACKETSTORMid:161430date:2021-02-16T15:45:08
db:PACKETSTORMid:162020date:2021-03-30T14:26:36
db:PACKETSTORMid:162253date:2021-04-20T16:31:47
db:PACKETSTORMid:161837date:2021-03-17T14:26:23
db:PACKETSTORMid:161742date:2021-03-10T16:02:43
db:PACKETSTORMid:161710date:2021-03-09T15:57:57
db:PACKETSTORMid:162028date:2021-03-30T14:30:08
db:PACKETSTORMid:161551date:2021-02-25T15:30:28
db:PACKETSTORMid:161823date:2021-03-17T14:09:30
db:NVDid:CVE-2020-29661date:2020-12-09T17:15:31.807