Synopsis:          Moderate: kernel security and bug fix update
Advisory ID:       SLSA-2021:3438-1
Issue Date:        2021-09-08
CVE Numbers:       CVE-2021-3715
--

Security Fix(es):

* kernel: use-after-free in route4_change() in net/sched/cls_route.c
(CVE-2021-3715)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE

Bug Fix(es):

* [SL 7.8][s390x][DASD]Crash in __list_del_entry, alias_pav_group list
corrupt when running dasd_alias_remove_device()

* EMBARGOED CVE-2021-3715 kernel: use-after-free in route4_change() in
net/sched/cls_route.c


---
SL7

x86_64
 - bpftool-3.10.0-1160.42.2.el7.x86_64.rpm
 - bpftool-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm
 - kernel-3.10.0-1160.42.2.el7.x86_64.rpm
 - kernel-debug-3.10.0-1160.42.2.el7.x86_64.rpm
 - kernel-debug-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm
 - kernel-debug-devel-3.10.0-1160.42.2.el7.x86_64.rpm
 - kernel-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm
 - kernel-debuginfo-common-x86_64-3.10.0-1160.42.2.el7.x86_64.rpm
 - kernel-devel-3.10.0-1160.42.2.el7.x86_64.rpm
 - kernel-headers-3.10.0-1160.42.2.el7.x86_64.rpm
 - kernel-tools-3.10.0-1160.42.2.el7.x86_64.rpm
 - kernel-tools-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm
 - kernel-tools-libs-3.10.0-1160.42.2.el7.x86_64.rpm
 - kernel-tools-libs-devel-3.10.0-1160.42.2.el7.x86_64.rpm
 - perf-3.10.0-1160.42.2.el7.x86_64.rpm
 - perf-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm
 - python-perf-3.10.0-1160.42.2.el7.x86_64.rpm
 - python-perf-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm

noarch
 - kernel-abi-whitelists-3.10.0-1160.42.2.el7.noarch.rpm
 - kernel-doc-3.10.0-1160.42.2.el7.noarch.rpm
--

- Scientific Linux Development Team

SciLinux: SLSA-2021-3438-1 Moderate: kernel on SL7.x x86_64

kernel: use-after-free in route4_change() in net/sched/cls_route.c (CVE-2021-3715) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments...

Summary

Moderate: kernel security and bug fix update



Security Fixes

* kernel: use-after-free in route4_change() in net/sched/cls_route.c (CVE-2021-3715)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE

Severity
Advisory ID: SLSA-2021:3438-1
Issued Date: : 2021-09-08
CVE Numbers: CVE-2021-3715

Related News