VAR-202102-0068
Vulnerability from variot - Updated: 2026-03-09 21:28Integer overflow in the firmware for some Intel(R) Graphics Drivers for Windows * before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable an escalation of privilege via local access. There is a security vulnerability in Intel Graphics Drivers. There is no information about this vulnerability at present. Please pay attention to CNNVD or manufacturer announcements at any time. Description:
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. Bugs fixed (https://bugzilla.redhat.com/):
1918750 - CVE-2021-3114 golang: crypto/elliptic: incorrect operations on the P-224 curve 1945703 - "Guest OS Info" availability in VMI describe is flaky 1958816 - [2.6.z] KubeMacPool fails to start due to OOM likely caused by a high number of Pods running in the cluster 1963275 - migration controller null pointer dereference 1965099 - Live Migration double handoff to virt-handler causes connection failures 1965181 - CDI importer doesn't report AwaitingVDDK like it used to 1967086 - Cloning DataVolumes between namespaces fails while creating cdi-upload pod 1967887 - [2.6.6] nmstate is not progressing on a node and not configuring vlan filtering that causes an outage for VMs 1969756 - Windows VMs fail to start on air-gapped environments 1970372 - Virt-handler fails to verify container-disk 1973227 - segfault in virt-controller during pdb deletion 1974084 - 2.6.6 containers 1975212 - No Virtual Machine Templates Found [EDIT - all templates are marked as depracted] 1975727 - [Regression][VMIO][Warm] The third precopy does not end in warm migration 1977756 - [2.6.z] PVC keeps in pending when using hostpath-provisioner 1982760 - [v2v] no kind VirtualMachine is registered for version \"kubevirt.io/v1\" i... 1986989 - OpenShift Virtualization 2.6.z cannot be upgraded to 4.8.0 initially deployed starting with <= 4.8
-
8.1) - aarch64, noarch, ppc64le, s390x, x86_64
Bug Fix(es):
-
[Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to add memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930170)
-
RHEL8.3 - Include patch: powerpc/pci: Remove LSI mappings on device teardown (xive/pci) (BZ#1931926)
-
[HPEMC 8.1 REGRESSION] skx_uncore: probe of 0008:80:08.0 failed with error -22 (BZ#1947115)
-
[Azure][RHEL-8]Mellanox Patches To Prevent Kernel Hang In MLX4 (BZ#1952072)
-
[HPEMC 8.4 REGRESSION]: perf/x86/intel/uncore kernel panic vulnerability on Haswell and Broadwell servers (BZ#1956686)
-
6 ELS) - i386, s390x, x86_64
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
===================================================================== Red Hat Security Advisory
Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2021:2314-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:2314 Issue date: 2021-06-08 CVE Names: CVE-2020-8648 CVE-2020-12362 CVE-2020-12363 CVE-2020-12364 CVE-2020-27170 CVE-2021-3347 =====================================================================
- Summary:
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
- Description:
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
-
kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)
-
kernel: Use after free via PI futex state (CVE-2021-3347)
-
kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)
-
kernel: Improper input validation in some Intel(R) Graphics Drivers (CVE-2020-12363)
-
kernel: Null pointer dereference in some Intel(R) Graphics Drivers (CVE-2020-12364)
-
kernel: Speculation on pointer arithmetic against bpf_context pointer (CVE-2020-27170)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
-
kernel crash when call the timer function (sctp_generate_proto_unreach_event) of sctp module (BZ#1707184)
-
SCSI error handling process on HP P440ar controller gets stuck indefinitely in device reset operation (BZ#1830268)
-
netfilter: reproducible deadlock on nft_log module autoload (BZ#1858329)
-
netfilter: NULL pointer dereference in nf_tables_set_lookup() (BZ#1873171)
-
[DELL EMC 7.9 Bug]: No acpi_pad threads on top command for "power cap policy equal to 0 watts" (BZ#1883174)
-
A race between i40e_ndo_set_vf_mac() and i40e_vsi_clear() in the i40e driver causes a use after free condition of the kmalloc-4096 slab cache. (BZ#1886003)
-
netxen driver performs poorly with RT kernel (BZ#1894274)
-
gendisk->disk_part_tbl->last_lookup retains pointer after partition deletion (BZ#1898596)
-
Kernel experiences panic in update_group_power() due to division error even with Bug 1701115 fix (BZ#1910763)
-
RHEL7.9 - zfcp: fix handling of FCP_RESID_OVER bit in fcp ingress path (BZ#1917839)
-
RHEL7.9 - mm/THP: do not access vma->vm_mm after calling handle_userfault (BZ#1917840)
-
raid: wrong raid io account (BZ#1927106)
-
qla2x00_status_cont_entry() missing upstream patch that prevents unnecessary ABRT/warnings (BZ#1933784)
-
RHEL 7.9.z - System hang caused by workqueue stall in qla2xxx driver (BZ#1937945)
-
selinux: setsebool can trigger a deadlock (BZ#1939091)
-
[Hyper-V][RHEL-7] Cannot boot kernel 3.10.0-1160.21.1.el7.x86_64 on Hyper-V (BZ#1941841)
-
Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
- Bugs fixed (https://bugzilla.redhat.com/):
1802559 - CVE-2020-8648 kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c 1922249 - CVE-2021-3347 kernel: Use after free via PI futex state 1930246 - CVE-2020-12362 kernel: Integer overflow in Intel(R) Graphics Drivers 1930249 - CVE-2020-12363 kernel: Improper input validation in some Intel(R) Graphics Drivers 1930251 - CVE-2020-12364 kernel: Null pointer dereference in some Intel(R) Graphics Drivers 1940627 - CVE-2020-27170 kernel: Speculation on pointer arithmetic against bpf_context pointer 1941841 - [Hyper-V][RHEL-7] Cannot boot kernel 3.10.0-1160.21.1.el7.x86_64 on Hyper-V
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: kernel-3.10.0-1160.31.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm kernel-doc-3.10.0-1160.31.1.el7.noarch.rpm
x86_64: bpftool-3.10.0-1160.31.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm perf-3.10.0-1160.31.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm python-perf-3.10.0-1160.31.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64: bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: kernel-3.10.0-1160.31.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm kernel-doc-3.10.0-1160.31.1.el7.noarch.rpm
x86_64: bpftool-3.10.0-1160.31.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm perf-3.10.0-1160.31.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm python-perf-3.10.0-1160.31.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: kernel-3.10.0-1160.31.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm kernel-doc-3.10.0-1160.31.1.el7.noarch.rpm
ppc64: bpftool-3.10.0-1160.31.1.el7.ppc64.rpm bpftool-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm kernel-3.10.0-1160.31.1.el7.ppc64.rpm kernel-bootwrapper-3.10.0-1160.31.1.el7.ppc64.rpm kernel-debug-3.10.0-1160.31.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm kernel-debug-devel-3.10.0-1160.31.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-1160.31.1.el7.ppc64.rpm kernel-devel-3.10.0-1160.31.1.el7.ppc64.rpm kernel-headers-3.10.0-1160.31.1.el7.ppc64.rpm kernel-tools-3.10.0-1160.31.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm kernel-tools-libs-3.10.0-1160.31.1.el7.ppc64.rpm perf-3.10.0-1160.31.1.el7.ppc64.rpm perf-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm python-perf-3.10.0-1160.31.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm
ppc64le: bpftool-3.10.0-1160.31.1.el7.ppc64le.rpm bpftool-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-debug-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-devel-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-headers-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-tools-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-1160.31.1.el7.ppc64le.rpm perf-3.10.0-1160.31.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm python-perf-3.10.0-1160.31.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm
s390x: bpftool-3.10.0-1160.31.1.el7.s390x.rpm bpftool-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm kernel-3.10.0-1160.31.1.el7.s390x.rpm kernel-debug-3.10.0-1160.31.1.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm kernel-debug-devel-3.10.0-1160.31.1.el7.s390x.rpm kernel-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-1160.31.1.el7.s390x.rpm kernel-devel-3.10.0-1160.31.1.el7.s390x.rpm kernel-headers-3.10.0-1160.31.1.el7.s390x.rpm kernel-kdump-3.10.0-1160.31.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm kernel-kdump-devel-3.10.0-1160.31.1.el7.s390x.rpm perf-3.10.0-1160.31.1.el7.s390x.rpm perf-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm python-perf-3.10.0-1160.31.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm
x86_64: bpftool-3.10.0-1160.31.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm perf-3.10.0-1160.31.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm python-perf-3.10.0-1160.31.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64: bpftool-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-1160.31.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-1160.31.1.el7.ppc64.rpm perf-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm
ppc64le: bpftool-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-1160.31.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm
x86_64: bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: kernel-3.10.0-1160.31.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm kernel-doc-3.10.0-1160.31.1.el7.noarch.rpm
x86_64: bpftool-3.10.0-1160.31.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm perf-3.10.0-1160.31.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm python-perf-3.10.0-1160.31.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2020-8648 https://access.redhat.com/security/cve/CVE-2020-12362 https://access.redhat.com/security/cve/CVE-2020-12363 https://access.redhat.com/security/cve/CVE-2020-12364 https://access.redhat.com/security/cve/CVE-2020-27170 https://access.redhat.com/security/cve/CVE-2021-3347 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYL/x1NzjgjWX9erEAQijGA//bxt7JJkdkIO3eT3vTQ6mYtMErGKBVx8A sI+zjh/mYmaocA6UrE88bV1ixfJ2xknb9HfFBjQywPAiqTiRXHUyiL24IyGe5Lit WkPjLRDHCb/q56rl1EGkyr3noikZCNuNF9HOf8PHukJmLqD6iLWWws8J0knY9QyR /8scePwyCR4wqr2ru5etg5TKx+pkOY+Dfnwhgy6U2thQI58/Flvn7GyOBvSG69M8 6gewtkav1Fnw7WlLT386OjrAajBw6Pd9xee+S7T9qFv/BfC5k0HA26qbnMaAfzle YKXmjoIV7ExiszvspqZgdlsg0835BUALUIikbpnTvh7Kl2MY2BhBIqJvKOWeT3Mp VIpkMs4HVALkHoDqzYDZx8WKEy0hrDAjczT+aWtvXJmHEBmsHEx5Ny8tvYk1w3t/ cNVvfj+EqFaSY1GSNY1MG2ZDzIDYWrx+rGKA7tgqtwSlCdYEbORlXCDu+W8+c7Xg g1vE8kfpkbxyLpvlJ0iOWoLiOCCrZ04fiXXhgSn9O1/zmOwkijFHk5x/aFDEoyBE O/s2rawA1cADPiLTxGWU9/MITpQuS+FuAc235HT8VRSXvsV3ZHB36N1z4JZcPB5P FN8hH+ibnEOlpKC7YOE9K4eQ/jG1etWhVWctf7HcP2nbQSpiiZQoQGPznvt+6OKQ XAOam1B//x4= =HTlr -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . 7) - noarch, x86_64
- Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Bug Fix(es):
- kernel-rt: update RT source tree to the latest RHEL-8.2.z9 Batch source tree (BZ#1949685)
4
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "graphics drivers",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "26.20.100.7212"
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2020-12362"
}
]
},
"credits": {
"_id": null,
"data": "Red Hat",
"sources": [
{
"db": "PACKETSTORM",
"id": "163789"
},
{
"db": "PACKETSTORM",
"id": "162768"
},
{
"db": "PACKETSTORM",
"id": "163578"
},
{
"db": "PACKETSTORM",
"id": "163018"
},
{
"db": "PACKETSTORM",
"id": "163020"
},
{
"db": "PACKETSTORM",
"id": "163026"
},
{
"db": "PACKETSTORM",
"id": "162907"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-830"
}
],
"trust": 1.3
},
"cve": "CVE-2020-12362",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2020-12362",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.1,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "VHN-165033",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-12362",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-12362",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202102-830",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-165033",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2020-12362",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-165033"
},
{
"db": "VULMON",
"id": "CVE-2020-12362"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-830"
},
{
"db": "NVD",
"id": "CVE-2020-12362"
}
]
},
"description": {
"_id": null,
"data": "Integer overflow in the firmware for some Intel(R) Graphics Drivers for Windows * before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable an escalation of privilege via local access. There is a security vulnerability in Intel Graphics Drivers. There is no information about this vulnerability at present. Please pay attention to CNNVD or manufacturer announcements at any time. Description:\n\nOpenShift Virtualization is Red Hat\u0027s virtualization solution designed for\nRed Hat OpenShift Container Platform. Bugs fixed (https://bugzilla.redhat.com/):\n\n1918750 - CVE-2021-3114 golang: crypto/elliptic: incorrect operations on the P-224 curve\n1945703 - \"Guest OS Info\" availability in VMI describe is flaky\n1958816 - [2.6.z] KubeMacPool fails to start due to OOM likely caused by a high number of Pods running in the cluster\n1963275 - migration controller null pointer dereference\n1965099 - Live Migration double handoff to virt-handler causes connection failures\n1965181 - CDI importer doesn\u0027t report AwaitingVDDK like it used to\n1967086 - Cloning DataVolumes between namespaces fails while creating cdi-upload pod\n1967887 - [2.6.6] nmstate is not progressing on a node and not configuring vlan filtering that causes an outage for VMs\n1969756 - Windows VMs fail to start on air-gapped environments\n1970372 - Virt-handler fails to verify container-disk\n1973227 - segfault in virt-controller during pdb deletion\n1974084 - 2.6.6 containers\n1975212 - No Virtual Machine Templates Found [EDIT - all templates are marked as depracted]\n1975727 - [Regression][VMIO][Warm] The third precopy does not end in warm migration\n1977756 - [2.6.z] PVC keeps in pending when using hostpath-provisioner\n1982760 - [v2v] no kind VirtualMachine is registered for version \\\"kubevirt.io/v1\\\" i... \n1986989 - OpenShift Virtualization 2.6.z cannot be upgraded to 4.8.0 initially deployed starting with \u003c= 4.8\n\n5. 8.1) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. \n\nBug Fix(es):\n\n* [Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to\nadd memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930170)\n\n* RHEL8.3 - Include patch: powerpc/pci: Remove LSI mappings on device\nteardown (xive/pci) (BZ#1931926)\n\n* [HPEMC 8.1 REGRESSION] skx_uncore: probe of 0008:80:08.0 failed with\nerror -22 (BZ#1947115)\n\n* [Azure][RHEL-8]Mellanox Patches To Prevent Kernel Hang In MLX4\n(BZ#1952072)\n\n* [HPEMC 8.4 REGRESSION]: perf/x86/intel/uncore kernel panic vulnerability\non Haswell and Broadwell servers (BZ#1956686)\n\n4. 6 ELS) - i386, s390x, x86_64\n\n3. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: kernel security and bug fix update\nAdvisory ID: RHSA-2021:2314-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2021:2314\nIssue date: 2021-06-08\nCVE Names: CVE-2020-8648 CVE-2020-12362 CVE-2020-12363 \n CVE-2020-12364 CVE-2020-27170 CVE-2021-3347 \n=====================================================================\n\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system. \n\nSecurity Fix(es):\n\n* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: use-after-free in n_tty_receive_buf_common function in\ndrivers/tty/n_tty.c (CVE-2020-8648)\n\n* kernel: Improper input validation in some Intel(R) Graphics Drivers\n(CVE-2020-12363)\n\n* kernel: Null pointer dereference in some Intel(R) Graphics Drivers\n(CVE-2020-12364)\n\n* kernel: Speculation on pointer arithmetic against bpf_context pointer\n(CVE-2020-27170)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fix(es):\n\n* kernel crash when call the timer function\n(sctp_generate_proto_unreach_event) of sctp module (BZ#1707184)\n\n* SCSI error handling process on HP P440ar controller gets stuck\nindefinitely in device reset operation (BZ#1830268)\n\n* netfilter: reproducible deadlock on nft_log module autoload (BZ#1858329)\n\n* netfilter: NULL pointer dereference in nf_tables_set_lookup()\n(BZ#1873171)\n\n* [DELL EMC 7.9 Bug]: No acpi_pad threads on top command for \"power cap\npolicy equal to 0 watts\" (BZ#1883174)\n\n* A race between i40e_ndo_set_vf_mac() and i40e_vsi_clear() in the i40e\ndriver causes a use after free condition of the kmalloc-4096 slab cache. \n(BZ#1886003)\n\n* netxen driver performs poorly with RT kernel (BZ#1894274)\n\n* gendisk-\u003edisk_part_tbl-\u003elast_lookup retains pointer after partition\ndeletion (BZ#1898596)\n\n* Kernel experiences panic in update_group_power() due to division error\neven with Bug 1701115 fix (BZ#1910763)\n\n* RHEL7.9 - zfcp: fix handling of FCP_RESID_OVER bit in fcp ingress path\n(BZ#1917839)\n\n* RHEL7.9 - mm/THP: do not access vma-\u003evm_mm after calling handle_userfault\n(BZ#1917840)\n\n* raid: wrong raid io account (BZ#1927106)\n\n* qla2x00_status_cont_entry() missing upstream patch that prevents\nunnecessary ABRT/warnings (BZ#1933784)\n\n* RHEL 7.9.z - System hang caused by workqueue stall in qla2xxx driver\n(BZ#1937945)\n\n* selinux: setsebool can trigger a deadlock (BZ#1939091)\n\n* [Hyper-V][RHEL-7] Cannot boot kernel 3.10.0-1160.21.1.el7.x86_64 on\nHyper-V (BZ#1941841)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1802559 - CVE-2020-8648 kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c\n1922249 - CVE-2021-3347 kernel: Use after free via PI futex state\n1930246 - CVE-2020-12362 kernel: Integer overflow in Intel(R) Graphics Drivers\n1930249 - CVE-2020-12363 kernel: Improper input validation in some Intel(R) Graphics Drivers\n1930251 - CVE-2020-12364 kernel: Null pointer dereference in some Intel(R) Graphics Drivers\n1940627 - CVE-2020-27170 kernel: Speculation on pointer arithmetic against bpf_context pointer\n1941841 - [Hyper-V][RHEL-7] Cannot boot kernel 3.10.0-1160.21.1.el7.x86_64 on Hyper-V\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nkernel-3.10.0-1160.31.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm\nkernel-doc-3.10.0-1160.31.1.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-1160.31.1.el7.x86_64.rpm\nbpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm\nperf-3.10.0-1160.31.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\npython-perf-3.10.0-1160.31.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nbpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nkernel-3.10.0-1160.31.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm\nkernel-doc-3.10.0-1160.31.1.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-1160.31.1.el7.x86_64.rpm\nbpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm\nperf-3.10.0-1160.31.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\npython-perf-3.10.0-1160.31.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nbpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nkernel-3.10.0-1160.31.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm\nkernel-doc-3.10.0-1160.31.1.el7.noarch.rpm\n\nppc64:\nbpftool-3.10.0-1160.31.1.el7.ppc64.rpm\nbpftool-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-bootwrapper-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-debug-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-debug-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-debug-devel-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-devel-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-headers-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-tools-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-tools-libs-3.10.0-1160.31.1.el7.ppc64.rpm\nperf-3.10.0-1160.31.1.el7.ppc64.rpm\nperf-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm\npython-perf-3.10.0-1160.31.1.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm\n\nppc64le:\nbpftool-3.10.0-1160.31.1.el7.ppc64le.rpm\nbpftool-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-bootwrapper-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-debug-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-devel-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-headers-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-tools-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-tools-libs-3.10.0-1160.31.1.el7.ppc64le.rpm\nperf-3.10.0-1160.31.1.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm\npython-perf-3.10.0-1160.31.1.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm\n\ns390x:\nbpftool-3.10.0-1160.31.1.el7.s390x.rpm\nbpftool-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm\nkernel-3.10.0-1160.31.1.el7.s390x.rpm\nkernel-debug-3.10.0-1160.31.1.el7.s390x.rpm\nkernel-debug-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm\nkernel-debug-devel-3.10.0-1160.31.1.el7.s390x.rpm\nkernel-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm\nkernel-debuginfo-common-s390x-3.10.0-1160.31.1.el7.s390x.rpm\nkernel-devel-3.10.0-1160.31.1.el7.s390x.rpm\nkernel-headers-3.10.0-1160.31.1.el7.s390x.rpm\nkernel-kdump-3.10.0-1160.31.1.el7.s390x.rpm\nkernel-kdump-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm\nkernel-kdump-devel-3.10.0-1160.31.1.el7.s390x.rpm\nperf-3.10.0-1160.31.1.el7.s390x.rpm\nperf-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm\npython-perf-3.10.0-1160.31.1.el7.s390x.rpm\npython-perf-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm\n\nx86_64:\nbpftool-3.10.0-1160.31.1.el7.x86_64.rpm\nbpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm\nperf-3.10.0-1160.31.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\npython-perf-3.10.0-1160.31.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nbpftool-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-debug-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-tools-libs-devel-3.10.0-1160.31.1.el7.ppc64.rpm\nperf-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm\n\nppc64le:\nbpftool-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-debug-devel-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-tools-libs-devel-3.10.0-1160.31.1.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm\n\nx86_64:\nbpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nkernel-3.10.0-1160.31.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm\nkernel-doc-3.10.0-1160.31.1.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-1160.31.1.el7.x86_64.rpm\nbpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm\nperf-3.10.0-1160.31.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\npython-perf-3.10.0-1160.31.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nbpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-8648\nhttps://access.redhat.com/security/cve/CVE-2020-12362\nhttps://access.redhat.com/security/cve/CVE-2020-12363\nhttps://access.redhat.com/security/cve/CVE-2020-12364\nhttps://access.redhat.com/security/cve/CVE-2020-27170\nhttps://access.redhat.com/security/cve/CVE-2021-3347\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niQIVAwUBYL/x1NzjgjWX9erEAQijGA//bxt7JJkdkIO3eT3vTQ6mYtMErGKBVx8A\nsI+zjh/mYmaocA6UrE88bV1ixfJ2xknb9HfFBjQywPAiqTiRXHUyiL24IyGe5Lit\nWkPjLRDHCb/q56rl1EGkyr3noikZCNuNF9HOf8PHukJmLqD6iLWWws8J0knY9QyR\n/8scePwyCR4wqr2ru5etg5TKx+pkOY+Dfnwhgy6U2thQI58/Flvn7GyOBvSG69M8\n6gewtkav1Fnw7WlLT386OjrAajBw6Pd9xee+S7T9qFv/BfC5k0HA26qbnMaAfzle\nYKXmjoIV7ExiszvspqZgdlsg0835BUALUIikbpnTvh7Kl2MY2BhBIqJvKOWeT3Mp\nVIpkMs4HVALkHoDqzYDZx8WKEy0hrDAjczT+aWtvXJmHEBmsHEx5Ny8tvYk1w3t/\ncNVvfj+EqFaSY1GSNY1MG2ZDzIDYWrx+rGKA7tgqtwSlCdYEbORlXCDu+W8+c7Xg\ng1vE8kfpkbxyLpvlJ0iOWoLiOCCrZ04fiXXhgSn9O1/zmOwkijFHk5x/aFDEoyBE\nO/s2rawA1cADPiLTxGWU9/MITpQuS+FuAc235HT8VRSXvsV3ZHB36N1z4JZcPB5P\nFN8hH+ibnEOlpKC7YOE9K4eQ/jG1etWhVWctf7HcP2nbQSpiiZQoQGPznvt+6OKQ\nXAOam1B//x4=\n=HTlr\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. 7) - noarch, x86_64\n\n3. Description:\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables\nfine-tuning for systems with extremely high determinism requirements. \n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z9 Batch source\ntree (BZ#1949685)\n\n4",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-12362"
},
{
"db": "VULHUB",
"id": "VHN-165033"
},
{
"db": "VULMON",
"id": "CVE-2020-12362"
},
{
"db": "PACKETSTORM",
"id": "163789"
},
{
"db": "PACKETSTORM",
"id": "162768"
},
{
"db": "PACKETSTORM",
"id": "163578"
},
{
"db": "PACKETSTORM",
"id": "163018"
},
{
"db": "PACKETSTORM",
"id": "163020"
},
{
"db": "PACKETSTORM",
"id": "163026"
},
{
"db": "PACKETSTORM",
"id": "162907"
}
],
"trust": 1.71
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2020-12362",
"trust": 2.5
},
{
"db": "PACKETSTORM",
"id": "162907",
"trust": 0.8
},
{
"db": "PACKETSTORM",
"id": "163018",
"trust": 0.8
},
{
"db": "PACKETSTORM",
"id": "162768",
"trust": 0.8
},
{
"db": "PACKETSTORM",
"id": "162837",
"trust": 0.7
},
{
"db": "PACKETSTORM",
"id": "162626",
"trust": 0.7
},
{
"db": "PACKETSTORM",
"id": "162877",
"trust": 0.7
},
{
"db": "PACKETSTORM",
"id": "163188",
"trust": 0.7
},
{
"db": "PACKETSTORM",
"id": "163789",
"trust": 0.7
},
{
"db": "PACKETSTORM",
"id": "163578",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2021.4047",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.2029",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.2073",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.3443",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.1799",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.2180",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.1688",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.1732",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.1820",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.1866",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0472",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0787",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0861",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.2711",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.2439",
"trust": 0.6
},
{
"db": "CS-HELP",
"id": "SB2021072264",
"trust": 0.6
},
{
"db": "CS-HELP",
"id": "SB2021062303",
"trust": 0.6
},
{
"db": "LENOVO",
"id": "LEN-51723",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202102-830",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "163026",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "163020",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "162640",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "162654",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "162878",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "163248",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "163050",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "162916",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-165033",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2020-12362",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-165033"
},
{
"db": "VULMON",
"id": "CVE-2020-12362"
},
{
"db": "PACKETSTORM",
"id": "163789"
},
{
"db": "PACKETSTORM",
"id": "162768"
},
{
"db": "PACKETSTORM",
"id": "163578"
},
{
"db": "PACKETSTORM",
"id": "163018"
},
{
"db": "PACKETSTORM",
"id": "163020"
},
{
"db": "PACKETSTORM",
"id": "163026"
},
{
"db": "PACKETSTORM",
"id": "162907"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-830"
},
{
"db": "NVD",
"id": "CVE-2020-12362"
}
]
},
"id": "VAR-202102-0068",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-165033"
}
],
"trust": 0.01
},
"last_update_date": "2026-03-09T21:28:16.821000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Intel Graphics Drivers Enter the fix for the verification error vulnerability",
"trust": 0.6,
"url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=142591"
},
{
"title": "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03719 rev. 3 - Intel\u00ae Graphics Drivers February 2021 Security Update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=bcf1379c5775396217da9c829370c99e"
},
{
"title": "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03719 rev. 3 - Intel\u00ae Graphics Drivers February 2021 Security Update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=c02df4fdc335594d9980cbdd55836bc9"
},
{
"title": "Palo Alto Networks Security Advisory: PAN-SA-2024-0001 Informational Bulletin: Impact of OSS CVEs in PAN-OS",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=palo_alto_networks_security_advisory\u0026qid=34f98e4f4344c97599fe2d33618956a7"
},
{
"title": "veracode-container-security-finding-parser",
"trust": 0.1,
"url": "https://github.com/vincent-deng/veracode-container-security-finding-parser "
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2020-12362"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-830"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-190",
"trust": 1.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-165033"
},
{
"db": "NVD",
"id": "CVE-2020-12362"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 1.8,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html"
},
{
"trust": 1.7,
"url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2020-12362"
},
{
"trust": 0.7,
"url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce"
},
{
"trust": 0.7,
"url": "https://bugzilla.redhat.com/):"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/articles/11258"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-12362"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/team/contact/"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/team/key/"
},
{
"trust": 0.6,
"url": "https://packetstormsecurity.com/files/162768/red-hat-security-advisory-2021-2106-01.html"
},
{
"trust": 0.6,
"url": "https://packetstormsecurity.com/files/163789/red-hat-security-advisory-2021-3119-01.html"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.1866"
},
{
"trust": 0.6,
"url": "https://vigilance.fr/vulnerability/intel-graphics-drivers-multiple-vulnerabilities-34748"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.1688"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.1820"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.2711"
},
{
"trust": 0.6,
"url": "https://www.ibm.com/support/pages/node/6520482"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2021072264"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.2439"
},
{
"trust": 0.6,
"url": "https://support.lenovo.com/us/en/product_security/len-51723"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0861"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2021062303"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.4047"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.2180"
},
{
"trust": 0.6,
"url": "https://packetstormsecurity.com/files/163188/red-hat-security-advisory-2021-2461-01.html"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0787"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.1799"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.1732"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.2029"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0472"
},
{
"trust": 0.6,
"url": "https://packetstormsecurity.com/files/162837/red-hat-security-advisory-2021-2136-01.html"
},
{
"trust": 0.6,
"url": "https://packetstormsecurity.com/files/162626/red-hat-security-advisory-2021-1578-01.html"
},
{
"trust": 0.6,
"url": "https://packetstormsecurity.com/files/162877/red-hat-security-advisory-2021-2121-01.html"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.3443"
},
{
"trust": 0.6,
"url": "https://packetstormsecurity.com/files/162907/red-hat-security-advisory-2021-2190-01.html"
},
{
"trust": 0.6,
"url": "https://packetstormsecurity.com/files/163578/red-hat-security-advisory-2021-2735-01.html"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.2073"
},
{
"trust": 0.6,
"url": "https://packetstormsecurity.com/files/163018/red-hat-security-advisory-2021-2293-01.html"
},
{
"trust": 0.4,
"url": "https://access.redhat.com/security/cve/cve-2021-3347"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-3347"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-12364"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2020-12363"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-12363"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2020-12364"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-33909"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-0466"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-0466"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-28374"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-28374"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-8648"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-8648"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-27170"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-27170"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/190.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://support.hp.com//us-en/document/c07023592"
},
{
"trust": 0.1,
"url": "https://github.com/vincent-deng/veracode-container-security-finding-parser"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-25039"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-14347"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-14346"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-8286"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-28196"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-15358"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-25712"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-23240"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-14502"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-13543"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3520"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-9951"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-13434"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-25037"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-23239"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-36242"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-25037"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3537"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-8231"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-27219"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3518"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-32399"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-29362"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-9948"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-13012"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-28935"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3516"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-13434"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2017-14502"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-25034"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-8285"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-25035"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-10228"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-9169"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-14866"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-26116"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-14363"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-25038"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-14345"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-14866"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-13584"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-26137"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-13543"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-25013"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-14360"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-25040"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-13584"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-29361"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3517"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3560"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-25042"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-20201"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-25042"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-25038"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-25659"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3541"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-25032"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-25041"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:3119"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-25217"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-25036"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-25032"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-27619"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-20271"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-25215"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-9983"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3177"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-9169"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3326"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-25036"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-14344"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-25013"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-25035"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-2708"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-14345"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-14344"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-23336"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-14362"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-14361"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-8927"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-29363"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3114"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-28211"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-25039"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-13012"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-14346"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-25040"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-2708"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2016-10228"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-25041"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-8284"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-33910"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-25034"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-27618"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:2106"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-33909"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:2735"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/vulnerabilities/rhsb-2021-006"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:2293"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:2314"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:2316"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-12114"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-12114"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:2190"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-165033"
},
{
"db": "VULMON",
"id": "CVE-2020-12362"
},
{
"db": "PACKETSTORM",
"id": "163789"
},
{
"db": "PACKETSTORM",
"id": "162768"
},
{
"db": "PACKETSTORM",
"id": "163578"
},
{
"db": "PACKETSTORM",
"id": "163018"
},
{
"db": "PACKETSTORM",
"id": "163020"
},
{
"db": "PACKETSTORM",
"id": "163026"
},
{
"db": "PACKETSTORM",
"id": "162907"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-830"
},
{
"db": "NVD",
"id": "CVE-2020-12362"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "VULHUB",
"id": "VHN-165033",
"ident": null
},
{
"db": "VULMON",
"id": "CVE-2020-12362",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "163789",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "162768",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "163578",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "163018",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "163020",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "163026",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "162907",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202102-830",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2020-12362",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2021-02-17T00:00:00",
"db": "VULHUB",
"id": "VHN-165033",
"ident": null
},
{
"date": "2021-02-17T00:00:00",
"db": "VULMON",
"id": "CVE-2020-12362",
"ident": null
},
{
"date": "2021-08-11T16:15:17",
"db": "PACKETSTORM",
"id": "163789",
"ident": null
},
{
"date": "2021-05-26T17:05:29",
"db": "PACKETSTORM",
"id": "162768",
"ident": null
},
{
"date": "2021-07-21T16:02:03",
"db": "PACKETSTORM",
"id": "163578",
"ident": null
},
{
"date": "2021-06-09T13:15:12",
"db": "PACKETSTORM",
"id": "163018",
"ident": null
},
{
"date": "2021-06-09T13:15:48",
"db": "PACKETSTORM",
"id": "163020",
"ident": null
},
{
"date": "2021-06-09T13:19:21",
"db": "PACKETSTORM",
"id": "163026",
"ident": null
},
{
"date": "2021-06-02T13:33:47",
"db": "PACKETSTORM",
"id": "162907",
"ident": null
},
{
"date": "2021-02-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202102-830",
"ident": null
},
{
"date": "2021-02-17T14:15:15.123000",
"db": "NVD",
"id": "CVE-2020-12362",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2021-02-22T00:00:00",
"db": "VULHUB",
"id": "VHN-165033",
"ident": null
},
{
"date": "2023-04-01T00:00:00",
"db": "VULMON",
"id": "CVE-2020-12362",
"ident": null
},
{
"date": "2023-04-03T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202102-830",
"ident": null
},
{
"date": "2024-11-21T04:59:34.980000",
"db": "NVD",
"id": "CVE-2020-12362",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-830"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Intel Graphics Drivers Input validation error vulnerability",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-830"
}
],
"trust": 0.6
},
"type": {
"_id": null,
"data": "overflow",
"sources": [
{
"db": "PACKETSTORM",
"id": "162768"
},
{
"db": "PACKETSTORM",
"id": "163578"
},
{
"db": "PACKETSTORM",
"id": "163018"
},
{
"db": "PACKETSTORM",
"id": "163020"
},
{
"db": "PACKETSTORM",
"id": "163026"
},
{
"db": "PACKETSTORM",
"id": "162907"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.