Synopsis:          Important: kernel security and bug fix update
Advisory ID:       SLSA-2021:2314-1
Issue Date:        2021-06-09
CVE Numbers:       CVE-2020-8648
                   CVE-2021-3347
                   CVE-2020-12362
                   CVE-2020-12363
                   CVE-2020-12364
                   CVE-2020-27170
--

Security Fix(es):

* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)

* kernel: Use after free via PI futex state (CVE-2021-3347)

* kernel: use-after-free in n_tty_receive_buf_common function in
drivers/tty/n_tty.c (CVE-2020-8648)

* kernel: Improper input validation in some Intel(R) Graphics Drivers(CVE-2020-12363)

* kernel: Null pointer dereference in some Intel(R) Graphics Drivers(CVE-2020-12364)

* kernel: Speculation on pointer arithmetic against bpf_context pointer
(CVE-2020-27170)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE

Bug Fix(es):

* kernel crash when call the timer function
(sctp_generate_proto_unreach_event) of sctp module

* SCSI error handling process on HP P440ar controller gets stuck
indefinitely in device reset operation

* netfilter: reproducible deadlock on nft_log module autoload

* netfilter: NULL pointer dereference in nf_tables_set_lookup()

* [DELL EMC 7.9 Bug]: No acpi_pad threads on top command for "power cap
policy equal to 0 watts"

* A race between i40e_ndo_set_vf_mac() and i40e_vsi_clear() in the i40e
driver causes a use after free condition of the kmalloc-4096 slab cache.

* netxen driver performs poorly with RT kernel

* gendisk->disk_part_tbl->last_lookup retains pointer after partition
deletion

* Kernel experiences panic in update_group_power() due to division error
even with Bug 1701115 fix

* SL7.9 - zfcp: fix handling of FCP_RESID_OVER bit in fcp ingress path

* SL7.9 - mm/THP: do not access vma->vm_mm after calling handle_userfault

* raid: wrong raid io account

* qla2x00_status_cont_entry() missing upstream patch that prevents
unnecessary ABRT/warnings

* SL 7.9.z - System hang caused by workqueue stall in qla2xxx driver

* selinux: setsebool can trigger a deadlock

* [Hyper-V][SL-7] Cannot boot kernel 3.10.0-1160.21.1.el7.x86_64 on
Hyper-V


---

SL7
 x86_64
 - bpftool-3.10.0-1160.31.1.el7.x86_64.rpm
 - bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
 - kernel-3.10.0-1160.31.1.el7.x86_64.rpm
 - kernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm
 - kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
 - kernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm
 - kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
 - kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm
 - kernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm
 - kernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm
 - kernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm
 - kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
 - kernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm
 - kernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm
 - perf-3.10.0-1160.31.1.el7.x86_64.rpm
 - perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
 - python-perf-3.10.0-1160.31.1.el7.x86_64.rpm
 - python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
 noarch
 - kernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm
 - kernel-doc-3.10.0-1160.31.1.el7.noarch.rpm
--

- Scientific Linux Development Team

SciLinux: SLSA-2021-2314-1 Important: kernel on SL7.x x86_64

kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362) * kernel: Use after free via PI futex state (CVE-2021-3347) * kernel: use-after-free in n_tty_receive_buf_com...

Summary

Important: kernel security and bug fix update



Security Fixes

* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)
* kernel: Use after free via PI futex state (CVE-2021-3347)
* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)
* kernel: Improper input validation in some Intel(R) Graphics Drivers(CVE-2020-12363)
* kernel: Null pointer dereference in some Intel(R) Graphics Drivers(CVE-2020-12364)
* kernel: Speculation on pointer arithmetic against bpf_context pointer (CVE-2020-27170)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE

Severity
Advisory ID: SLSA-2021:2314-1
Issued Date: : 2021-06-09
CVE Numbers: CVE-2020-8648
CVE-2021-3347
CVE-2020-12362

Related News