Synopsis:          Important: kernel security and bug fix update
Advisory ID:       SLSA-2020:2664-1
Issue Date:        2020-06-23
CVE Numbers:       None
--

Security Fix(es):

* Kernel: vfio: access to disabled MMIO space of some devices may lead to
DoS scenario (CVE-2020-12888)
--

SL7
  x86_64
    bpftool-3.10.0-1127.13.1.el7.x86_64.rpm
    bpftool-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm
    kernel-3.10.0-1127.13.1.el7.x86_64.rpm
    kernel-debug-3.10.0-1127.13.1.el7.x86_64.rpm
    kernel-debug-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm
    kernel-debug-devel-3.10.0-1127.13.1.el7.x86_64.rpm
    kernel-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm
    kernel-debuginfo-common-x86_64-3.10.0-1127.13.1.el7.x86_64.rpm
    kernel-devel-3.10.0-1127.13.1.el7.x86_64.rpm
    kernel-headers-3.10.0-1127.13.1.el7.x86_64.rpm
    kernel-tools-3.10.0-1127.13.1.el7.x86_64.rpm
    kernel-tools-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm
    kernel-tools-libs-3.10.0-1127.13.1.el7.x86_64.rpm
    perf-3.10.0-1127.13.1.el7.x86_64.rpm
    perf-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm
    python-perf-3.10.0-1127.13.1.el7.x86_64.rpm
    python-perf-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm
    kernel-tools-libs-devel-3.10.0-1127.13.1.el7.x86_64.rpm
  noarch
    kernel-abi-whitelists-3.10.0-1127.13.1.el7.noarch.rpm
    kernel-doc-3.10.0-1127.13.1.el7.noarch.rpm

- Scientific Linux Development Team

SciLinux: SLSA-2020-2664-1 Important: kernel on SL7.x x86_64

Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888) SL7 x86_64 bpftool-3.10.0-1127.13.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-11...

Summary

Important: kernel security and bug fix update



Security Fixes

* Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)
SL7 x86_64 bpftool-3.10.0-1127.13.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debug-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1127.13.1.el7.x86_64.rpm kernel-devel-3.10.0-1127.13.1.el7.x86_64.rpm kernel-headers-3.10.0-1127.13.1.el7.x86_64.rpm kernel-tools-3.10.0-1127.13.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1127.13.1.el7.x86_64.rpm perf-3.10.0-1127.13.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm python-perf-3.10.0-1127.13.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1127.13.1.el7.x86_64.rpm noarch kernel-abi-whitelists-3.10.0-1127.13.1.el7.noarch.rpm kernel-doc-3.10.0-1127.13.1.el7.noarch.rpm
- Scientific Linux Development Team

Severity
Advisory ID: SLSA-2020:2664-1
Issued Date: : 2020-06-23
CVE Numbers: None

Related News