CentOS 7 update for kernel



Published: 2020-11-23
Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2019-20811
CVE-2020-14331
CWE-ID CWE-20
CWE-787
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
CentOS
Operating systems & Components / Operating system

Vendor CentOS Project

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Input validation error

EUVDB-ID: #VU34374

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-20811

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a local authenticated user to manipulate data.

An issue was discovered in the Linux kernel before 5.0.6. In rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, a reference count is mishandled, aka CID-a3e23f719f5c.

Mitigation

Update the affected packages.

Vulnerable software versions

CentOS: 7


CPE2.3 External links

http://lists.centos.org/pipermail/centos-announce/2020-November/035868.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

2) Out-of-bounds write

EUVDB-ID: #VU48590

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-14331

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the Linux kernel’s implementation of the invert video code on VGA consoles. A local user with can run a specially crafted program to call VT_RESIZE IOCTL, trigger an out-of-bounds write and execute arbitrary code on the target system with elevated privileges.

Mitigation

Update the affected packages.

Vulnerable software versions

CentOS: 7


CPE2.3 External links

http://lists.centos.org/pipermail/centos-announce/2020-November/035868.html

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###