ID

VAR-202012-1546


CVE

CVE-2020-29661


TITLE

Linux Kernel  resource locking vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-014190

DESCRIPTION

A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b. Linux Kernel contains a resource locking vulnerability and a freed memory usage vulnerability. Vendors must CID-54ffccbf053b It is published as.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2021:2164-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:2164 Issue date: 2021-06-01 CVE Names: CVE-2019-19532 CVE-2020-12362 CVE-2020-25211 CVE-2020-25705 CVE-2020-29661 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 7.4) - noarch, x86_64 Red Hat Enterprise Linux Server E4S (v. 7.4) - noarch, ppc64le, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server Optional E4S (v. 7.4) - ppc64le, x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.4) - noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362) * kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c (CVE-2020-25211) * kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free (CVE-2020-29661) * kernel: malicious USB devices can lead to multiple out-of-bounds write (CVE-2019-19532) * kernel: ICMP rate limiting can be used for DNS poisoning attack (CVE-2020-25705) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1781821 - CVE-2019-19532 kernel: malicious USB devices can lead to multiple out-of-bounds write 1877571 - CVE-2020-25211 kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c 1894579 - CVE-2020-25705 kernel: ICMP rate limiting can be used for DNS poisoning attack 1906525 - CVE-2020-29661 kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free 1930246 - CVE-2020-12362 kernel: Integer overflow in Intel(R) Graphics Drivers 6. Package List: Red Hat Enterprise Linux Server AUS (v. 7.4): Source: kernel-3.10.0-693.87.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-693.87.1.el7.noarch.rpm kernel-doc-3.10.0-693.87.1.el7.noarch.rpm x86_64: kernel-3.10.0-693.87.1.el7.x86_64.rpm kernel-debug-3.10.0-693.87.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.87.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.87.1.el7.x86_64.rpm kernel-devel-3.10.0-693.87.1.el7.x86_64.rpm kernel-headers-3.10.0-693.87.1.el7.x86_64.rpm kernel-tools-3.10.0-693.87.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.87.1.el7.x86_64.rpm perf-3.10.0-693.87.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm python-perf-3.10.0-693.87.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm Red Hat Enterprise Linux Server E4S (v. 7.4): Source: kernel-3.10.0-693.87.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-693.87.1.el7.noarch.rpm kernel-doc-3.10.0-693.87.1.el7.noarch.rpm ppc64le: kernel-3.10.0-693.87.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-693.87.1.el7.ppc64le.rpm kernel-debug-3.10.0-693.87.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-693.87.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-693.87.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-693.87.1.el7.ppc64le.rpm kernel-devel-3.10.0-693.87.1.el7.ppc64le.rpm kernel-headers-3.10.0-693.87.1.el7.ppc64le.rpm kernel-tools-3.10.0-693.87.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-693.87.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-693.87.1.el7.ppc64le.rpm perf-3.10.0-693.87.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-693.87.1.el7.ppc64le.rpm python-perf-3.10.0-693.87.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-693.87.1.el7.ppc64le.rpm x86_64: kernel-3.10.0-693.87.1.el7.x86_64.rpm kernel-debug-3.10.0-693.87.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.87.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.87.1.el7.x86_64.rpm kernel-devel-3.10.0-693.87.1.el7.x86_64.rpm kernel-headers-3.10.0-693.87.1.el7.x86_64.rpm kernel-tools-3.10.0-693.87.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.87.1.el7.x86_64.rpm perf-3.10.0-693.87.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm python-perf-3.10.0-693.87.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm Red Hat Enterprise Linux Server TUS (v. 7.4): Source: kernel-3.10.0-693.87.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-693.87.1.el7.noarch.rpm kernel-doc-3.10.0-693.87.1.el7.noarch.rpm x86_64: kernel-3.10.0-693.87.1.el7.x86_64.rpm kernel-debug-3.10.0-693.87.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.87.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.87.1.el7.x86_64.rpm kernel-devel-3.10.0-693.87.1.el7.x86_64.rpm kernel-headers-3.10.0-693.87.1.el7.x86_64.rpm kernel-tools-3.10.0-693.87.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.87.1.el7.x86_64.rpm perf-3.10.0-693.87.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm python-perf-3.10.0-693.87.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 7.4): x86_64: kernel-debug-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.87.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.87.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional E4S (v. 7.4): ppc64le: kernel-debug-debuginfo-3.10.0-693.87.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-693.87.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-693.87.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-693.87.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-693.87.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-693.87.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-693.87.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-693.87.1.el7.ppc64le.rpm x86_64: kernel-debug-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.87.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.87.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional TUS (v. 7.4): x86_64: kernel-debug-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.87.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.87.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.87.1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-19532 https://access.redhat.com/security/cve/CVE-2020-12362 https://access.redhat.com/security/cve/CVE-2020-25211 https://access.redhat.com/security/cve/CVE-2020-25705 https://access.redhat.com/security/cve/CVE-2020-29661 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYLXzYtzjgjWX9erEAQjW3A//ax5IBIju/37C2l6J5HuZYu5UyI9yyTpC KTB7FRWm+o/Ppr+YR4Tb8WuWtAJwRJgGAIM5jDP+NTHR+PzIua6ei+JtT4nx/1K/ lsylgQDkku4K1ZC9R+235Gj56TKee660vXZ80qWT/M62WkNprdS4XbD01HCAITL0 j1/7cCCSFJfPEUbKGAjk6IgEQrcCo01mrms7Ke6nuqsjKV9JOr6mB8Z+xD5yibg9 23Zkd28mMNgrdzABKuGckrwgucJCGcM34Y0ZVc2fAspk15ei+ELTut4x/fu6Xiqu ZaCB0lR4DmVQpa2tcuqO2iIqgNcYoPxzuMSoyD7DHx0MEbIrXtyYI5YIAmgHeHGg tce2dVFP5UnmW6Zss2kwj4uqh6w/eHrwESdPMbNzsCMj5lV2/TDXDqEwoqaJNNzw kHDjo6+eADy3wavMzRhl2J1kHABCNmwCVn86GC+jyhQ4XObc/oAqkwiF3kLPP7K5 3UROKYWXT6Xy1JGeADaw+Bv7ME772PyKXLN0yFTIgFag/ECwT76OTHbCqwVk0DJJ 72ILUIXscEZ+wwmFULoVZ2D6+1o/+UnttlvsAf3EIme/xLjuOC1wxD4MuR+ypVDn 6dKxgmkR7uL9r/OBrTEQbYAbI3ALAu5B2wSlAxl7Jel606Sd2/iKmFgToZSFEsDC iRLouwDKWC8= =l4Zb -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . 8.1) - ppc64le, x86_64 3. Description: This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. 8) - x86_64 3. Bug Fix(es): * Openstack network node reports unregister_netdevice: waiting for qr-3cec0c92-9a to become free. Usage count = 1 (BZ#1908539) 4. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Bug Fix(es): * kernel-rt: update to the latest RHEL7.9.z4 source tree (BZ#1917909) 4. 7.6) - ppc64, ppc64le, x86_64 3. Bug Fix(es): * Security patch for CVE-2020-25212 breaks directory listings via 'ls' on NFS V4.2 shares mounted with selinux enabled labels (BZ#1919144) * Enable CI and changelog for GitLab workflow (BZ#1930931) Enhancement(s): * [Cavium 7.7 Feat] qla2xxx: Update to latest upstream. (BZ#1918534) 4. 7) - aarch64, noarch, ppc64le 3

Trust: 2.34

sources: NVD: CVE-2020-29661 // JVNDB: JVNDB-2020-014190 // VULMON: CVE-2020-29661 // PACKETSTORM: 162878 // PACKETSTORM: 161607 // PACKETSTORM: 161430 // PACKETSTORM: 162020 // PACKETSTORM: 161835 // PACKETSTORM: 161837 // PACKETSTORM: 161250

AFFECTED PRODUCTS

vendor:linuxmodel:kernelscope:gteversion:5.5

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:33

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.4.248

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.15

Trust: 1.0

vendor:netappmodel:8300scope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:2.6.26

Trust: 1.0

vendor:netappmodel:a400scope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.5

Trust: 1.0

vendor:netappmodel:a700sscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:tekelec platform distributionscope:gteversion:7.4.0

Trust: 1.0

vendor:broadcommodel:fabric operating systemscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.9.248

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.10

Trust: 1.0

vendor:oraclemodel:tekelec platform distributionscope:lteversion:7.7.1

Trust: 1.0

vendor:netappmodel:solidfire baseboard management controllerscope:eqversion: -

Trust: 1.0

vendor:netappmodel:h410cscope:eqversion: -

Trust: 1.0

vendor:netappmodel:active iq unified managerscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.14.212

Trust: 1.0

vendor:netappmodel:8700scope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.9.14

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:32

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.19.163

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.20

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.4.83

Trust: 1.0

vendor:linuxmodel:kernelscope: - version: -

Trust: 0.8

vendor:fedoramodel:fedorascope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-014190 // NVD: CVE-2020-29661

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-29661
value: HIGH

Trust: 1.0

NVD: CVE-2020-29661
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202012-778
value: HIGH

Trust: 0.6

VULMON: CVE-2020-29661
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2020-29661
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2020-29661
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2020-29661
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2020-29661 // CNNVD: CNNVD-202012-778 // JVNDB: JVNDB-2020-014190 // NVD: CVE-2020-29661

PROBLEMTYPE DATA

problemtype:CWE-667

Trust: 1.0

problemtype:CWE-416

Trust: 1.0

problemtype:Use of freed memory (CWE-416) [NVD evaluation ]

Trust: 0.8

problemtype: improper lock (CWE-667) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-014190 // NVD: CVE-2020-29661

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202012-778

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202012-778

PATCH

title:Fix ->pgrp locking in tiocspgrp()url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/

Trust: 0.8

title:Linux kernel Remediation of resource management error vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=136912

Trust: 0.6

title:Red Hat: Important: kernel-rt security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210537 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel-alt security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210354 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210558 - Security Advisory

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2020-29661 log

Trust: 0.1

title:Amazon Linux 2: ALAS2LIVEPATCH-2021-032url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2LIVEPATCH-2021-032

Trust: 0.1

title:Amazon Linux 2: ALAS2LIVEPATCH-2021-031url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2LIVEPATCH-2021-031

Trust: 0.1

title:Amazon Linux 2: ALAS2LIVEPATCH-2021-034url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2LIVEPATCH-2021-034

Trust: 0.1

title:Amazon Linux 2: ALAS2LIVEPATCH-2021-033url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2LIVEPATCH-2021-033

Trust: 0.1

title:IBM: Security Bulletin: There are multiple vulnerabilities in the Linux Kernel used in IBM Elastic Storage Systemurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=d39f316392b1adf4ca22f6ef041af00f

Trust: 0.1

title:Amazon Linux AMI: ALAS-2021-1477url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2021-1477

Trust: 0.1

title:Amazon Linux 2: ALAS2KERNEL-5.4-2022-019url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2KERNEL-5.4-2022-019

Trust: 0.1

title:Debian Security Advisories: DSA-4843-1 linux -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=b95030247235becf9e017bec31e9d503

Trust: 0.1

title:Amazon Linux 2: ALAS2-2021-1588url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2021-1588

Trust: 0.1

title:IBM: Security Bulletin: IBM Data Risk Manager is affected by multiple vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=e9d6f12dfd14652e2bb7e5c28ded162b

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=ec6577109e640dac19a6ddb978afe82d

Trust: 0.1

title:https://github.com/lcatro/cve_diff_checkerurl:https://github.com/lcatro/cve_diff_checker

Trust: 0.1

title:veracode-container-security-finding-parserurl:https://github.com/vincent-deng/veracode-container-security-finding-parser

Trust: 0.1

sources: VULMON: CVE-2020-29661 // CNNVD: CNNVD-202012-778 // JVNDB: JVNDB-2020-014190

EXTERNAL IDS

db:NVDid:CVE-2020-29661

Trust: 4.0

db:OPENWALLid:OSS-SECURITY/2020/12/10/1

Trust: 2.5

db:PACKETSTORMid:160681

Trust: 1.7

db:PACKETSTORMid:164950

Trust: 1.7

db:ICS CERTid:ICSA-24-074-07

Trust: 0.8

db:JVNid:JVNVU93656033

Trust: 0.8

db:JVNDBid:JVNDB-2020-014190

Trust: 0.8

db:PACKETSTORMid:162878

Trust: 0.7

db:PACKETSTORMid:161607

Trust: 0.7

db:PACKETSTORMid:162020

Trust: 0.7

db:PACKETSTORMid:161250

Trust: 0.7

db:AUSCERTid:ESB-2021.0189

Trust: 0.6

db:AUSCERTid:ESB-2021.0348

Trust: 0.6

db:AUSCERTid:ESB-2021.0377

Trust: 0.6

db:AUSCERTid:ESB-2021.0166

Trust: 0.6

db:AUSCERTid:ESB-2021.0964

Trust: 0.6

db:AUSCERTid:ESB-2021.0791

Trust: 0.6

db:AUSCERTid:ESB-2021.2781

Trust: 0.6

db:AUSCERTid:ESB-2021.1193

Trust: 0.6

db:AUSCERTid:ESB-2021.0837

Trust: 0.6

db:AUSCERTid:ESB-2021.2604

Trust: 0.6

db:AUSCERTid:ESB-2021.0717

Trust: 0.6

db:AUSCERTid:ESB-2021.0589

Trust: 0.6

db:AUSCERTid:ESB-2021.1339

Trust: 0.6

db:AUSCERTid:ESB-2021.3871

Trust: 0.6

db:AUSCERTid:ESB-2021.1093

Trust: 0.6

db:AUSCERTid:ESB-2021.0864

Trust: 0.6

db:AUSCERTid:ESB-2021.0768

Trust: 0.6

db:AUSCERTid:ESB-2021.0924

Trust: 0.6

db:AUSCERTid:ESB-2021.3743

Trust: 0.6

db:PACKETSTORMid:164812

Trust: 0.6

db:PACKETSTORMid:161868

Trust: 0.6

db:PACKETSTORMid:161823

Trust: 0.6

db:PACKETSTORMid:161710

Trust: 0.6

db:PACKETSTORMid:162253

Trust: 0.6

db:PACKETSTORMid:161656

Trust: 0.6

db:PACKETSTORMid:161556

Trust: 0.6

db:CS-HELPid:SB2021042135

Trust: 0.6

db:CS-HELPid:SB2021062111

Trust: 0.6

db:CS-HELPid:SB2021052006

Trust: 0.6

db:CS-HELPid:SB2021092209

Trust: 0.6

db:CNNVDid:CNNVD-202012-778

Trust: 0.6

db:VULMONid:CVE-2020-29661

Trust: 0.1

db:PACKETSTORMid:161430

Trust: 0.1

db:PACKETSTORMid:161835

Trust: 0.1

db:PACKETSTORMid:161837

Trust: 0.1

sources: VULMON: CVE-2020-29661 // PACKETSTORM: 162878 // PACKETSTORM: 161607 // PACKETSTORM: 161430 // PACKETSTORM: 162020 // PACKETSTORM: 161835 // PACKETSTORM: 161837 // PACKETSTORM: 161250 // CNNVD: CNNVD-202012-778 // JVNDB: JVNDB-2020-014190 // NVD: CVE-2020-29661

REFERENCES

url:http://www.openwall.com/lists/oss-security/2020/12/10/1

Trust: 2.5

url:http://packetstormsecurity.com/files/160681/linux-tiocspgrp-broken-locking.html

Trust: 2.3

url:https://www.oracle.com/security-alerts/cpuoct2021.html

Trust: 2.3

url:http://packetstormsecurity.com/files/164950/kernel-live-patch-security-notice-lsn-0082-1.html

Trust: 2.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-29661

Trust: 2.1

url:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=54ffccbf053b5b6ca4f6e45094b942fab92a25fc

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20210122-0001/

Trust: 1.7

url:https://www.debian.org/security/2021/dsa-4843

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html

Trust: 1.7

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/mz7oakaefaxqrgbzk4lyuwincd3d2xcl/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/bob25su6xul4tnp7kb63wnzsytiyfdpp/

Trust: 1.1

url:https://jvn.jp/vu/jvnvu93656033/index.html

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-07

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2020-29661

Trust: 0.7

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.7

url:https://access.redhat.com/articles/11258

Trust: 0.7

url:https://access.redhat.com/security/team/key/

Trust: 0.7

url:https://bugzilla.redhat.com/):

Trust: 0.7

url:https://access.redhat.com/security/team/contact/

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/mz7oakaefaxqrgbzk4lyuwincd3d2xcl/

Trust: 0.6

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/bob25su6xul4tnp7kb63wnzsytiyfdpp/

Trust: 0.6

url:https://packetstormsecurity.com/files/161710/red-hat-security-advisory-2021-0763-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0837

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0717

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-there-are-multiple-vulnerabilities-in-the-linux-kernel-used-in-ibm-elastic-storage-system-3/

Trust: 0.6

url:https://vigilance.fr/vulnerability/linux-kernel-use-after-free-via-tiocspgrp-34082

Trust: 0.6

url:https://packetstormsecurity.com/files/161250/red-hat-security-advisory-2021-0354-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3871

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2781

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021042135

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021092209

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0189/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0377/

Trust: 0.6

url:https://packetstormsecurity.com/files/161656/red-hat-security-advisory-2021-0719-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/162878/red-hat-security-advisory-2021-2164-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1193

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1093

Trust: 0.6

url:https://packetstormsecurity.com/files/162253/red-hat-security-advisory-2021-1288-01.html

Trust: 0.6

url:https://source.android.com/security/bulletin/2021-05-01

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-data-risk-manager-is-affected-by-multiple-vulnerabilities-4/

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021052006

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0589

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0864

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0964

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0348/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0924

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0768

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1339

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2604

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021062111

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0791

Trust: 0.6

url:https://packetstormsecurity.com/files/164812/ubuntu-security-notice-usn-5130-1.html

Trust: 0.6

url:https://packetstormsecurity.com/files/161823/red-hat-security-advisory-2021-0862-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0166/

Trust: 0.6

url:https://packetstormsecurity.com/files/161607/red-hat-security-advisory-2021-0689-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3743

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6525030

Trust: 0.6

url:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202111-0000001218088197

Trust: 0.6

url:https://packetstormsecurity.com/files/161556/ubuntu-security-notice-usn-4752-1.html

Trust: 0.6

url:https://packetstormsecurity.com/files/161868/red-hat-security-advisory-2021-0940-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/162020/red-hat-security-advisory-2021-1028-01.html

Trust: 0.6

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-14351

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-14351

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-25705

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-25705

Trust: 0.3

url:https://access.redhat.com/errata/rhsa-2021:0537

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-25211

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-25211

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-19532

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-19532

Trust: 0.2

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/416.html

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/667.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/lcatro/cve_diff_checker

Trust: 0.1

url:https://alas.aws.amazon.com/al2/alaslivepatch-2021-032.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-12362

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12362

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2164

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-0444

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0689

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-0444

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:1028

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25645

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20265

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0857

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25656

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25656

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-28374

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20265

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-0427

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-7053

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-7053

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-28374

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-0427

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25645

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-24394

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25212

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25212

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0878

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24394

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0354

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-1749

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-1749

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15436

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15436

Trust: 0.1

sources: VULMON: CVE-2020-29661 // PACKETSTORM: 162878 // PACKETSTORM: 161607 // PACKETSTORM: 161430 // PACKETSTORM: 162020 // PACKETSTORM: 161835 // PACKETSTORM: 161837 // PACKETSTORM: 161250 // CNNVD: CNNVD-202012-778 // JVNDB: JVNDB-2020-014190 // NVD: CVE-2020-29661

CREDITS

Red Hat

Trust: 1.3

sources: PACKETSTORM: 162878 // PACKETSTORM: 161607 // PACKETSTORM: 161430 // PACKETSTORM: 162020 // PACKETSTORM: 161835 // PACKETSTORM: 161837 // PACKETSTORM: 161250 // CNNVD: CNNVD-202012-778

SOURCES

db:VULMONid:CVE-2020-29661
db:PACKETSTORMid:162878
db:PACKETSTORMid:161607
db:PACKETSTORMid:161430
db:PACKETSTORMid:162020
db:PACKETSTORMid:161835
db:PACKETSTORMid:161837
db:PACKETSTORMid:161250
db:CNNVDid:CNNVD-202012-778
db:JVNDBid:JVNDB-2020-014190
db:NVDid:CVE-2020-29661

LAST UPDATE DATE

2026-04-18T22:26:09.035000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2020-29661date:2023-11-07T00:00:00
db:CNNVDid:CNNVD-202012-778date:2023-01-18T00:00:00
db:JVNDBid:JVNDB-2020-014190date:2024-03-22T07:18:00
db:NVDid:CVE-2020-29661date:2024-11-21T05:24:23.040

SOURCES RELEASE DATE

db:VULMONid:CVE-2020-29661date:2020-12-09T00:00:00
db:PACKETSTORMid:162878date:2021-06-01T14:45:52
db:PACKETSTORMid:161607date:2021-03-02T16:24:58
db:PACKETSTORMid:161430date:2021-02-16T15:45:08
db:PACKETSTORMid:162020date:2021-03-30T14:26:36
db:PACKETSTORMid:161835date:2021-03-17T14:22:58
db:PACKETSTORMid:161837date:2021-03-17T14:26:23
db:PACKETSTORMid:161250date:2021-02-02T16:11:22
db:CNNVDid:CNNVD-202012-778date:2020-12-09T00:00:00
db:JVNDBid:JVNDB-2020-014190date:2021-08-05T00:00:00
db:NVDid:CVE-2020-29661date:2020-12-09T17:15:31.807