Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CentOS: Security Advisory for bpftool (CESA-2020:5437)

Information

Severity

Severity

High

Family

Family

CentOS Local Security Checks

CVSSv2 Base

CVSSv2 Base

7.5

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:S/C:P/I:P/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

3 years ago

Modified

Modified

3 years ago

Summary

The remote host is missing an update for the 'bpftool' package(s) announced via the CESA-2020:5437 advisory.

Insight

Insight

The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt (CVE-2020-14385) * kernel: The flow_dissector feature allows device tracking (CVE-2019-18282) * kernel: Buffer over-read in crypto_authenc_extractkeys() when a payload longer than 4 bytes is not aligned. (CVE-2020-10769) * kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314) * kernel: umask not applied on filesystem without ACL support (CVE-2020-24394) * kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212) * kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * WARNING in set_restore_sigmask at ./arch/x86/include/asm/thread_info.h:298 sigsuspend+0x6d/0x70 (BZ#1704650) * [i40e] VFs see other VF's outgoing traffic (BZ#1845677) * [Hyper-V][RHEL7] Two fixes for kdump over network (BZ#1846667) * Loop in __run_timers() because base->timer_jiffies is very far behind causes a lockup condition. (BZ#1849716) * XFS transaction overrun when running docker on VMWARE (overlay fs) (BZ#1857203) * RHEL 7.9 NVMe/IB - Host crash encountered during array upgrade (BZ#1857397) * False positive hard lockup detected while disabling the hard lockup detector via sysctl -w kernel.watchdog=0 (BZ#1860661) * [Hyper-V][RHEL-7] Only notify Hyper-V for die events that are oops (BZ#1868130) * Linux kernel crash due to openvswitch module (BZ#1869190) * 'nodfs' option not working when using SMB2+ (BZ#1873033) * RHEL7.7 zstream - ESS - kernel panic triggered by freelist pointer corruption (BZ#1873189) * destroy_cfs_bandwidth() is called by free_fair_sched_group() without calling init_cfs_bandwidth() (BZ#1878000) * NULL pointer at nvme_rdma_setup_ctrl+0x1c2/0x8d0 [nvme_rdma] when discover E5700 (BZ#1878950) * IB Infiniband RDMA mlx5_ib is freeing a kmalloc-512 cache that it does not own causing memory corruption. (BZ#1880184) * [Azure][RHEL7] Two Patches Needed To Enable Azure Host Time-syncing in VMs (BZ#1884735) * connect AF_UNSPEC on a connecting AF_INET6 socket returns an error (BZ#1886305) * Rebuilding the grub with the CPU flag 'avx' disabled (clearcpuid=156) triggers kernel panic in xor_avx_2() (BZ#1886792) * nf_conntrack_sctp.h is not usable due to a missing commit (BZ#1887975) * Starting pvmove on top of physical volumes on MD devices causes IO error on ongoing IO (BZ#1890059)

Affected Software

Affected Software

'bpftool' package(s) on CentOS 7.

Detection Method

Detection Method

Checks if a vulnerable package version is present on the target host.

Solution

Solution

Please install the updated package(s).