Synopsis: Important: kernel security and bug fix update Advisory ID: SLSA-2021:2725-1 Issue Date: 2021-07-21 CVE Numbers: CVE-2020-11668 CVE-2019-20934 CVE-2021-33033 CVE-2021-33034 CVE-2021-33909 -- Security Fix(es): * kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909) * kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034) * kernel: use-after-free in show_numa_stats function (CVE-2019-20934) * kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668) * kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c (CVE-2021-33033) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * [SL7.9.z] n_tty_open: "BUG: unable to handle kernel paging request" * [ESXi][SL7.8]"qp_alloc_hypercall result = -20" / "Could not attach to queue pair with -20" with vSphere Fault Tolerance enabled * [SL7.9][s390x][Regression] Sino Nomine swapgen IBM z/VM emulated DASD with DIAG driver returns EOPNOTSUPP * False-positive hard lockup detected while processing the thread state information (SysRq-T) * SL7.9 zstream - s390x LPAR with NVMe SSD will panic when it has 32 or more IFL (pci) * The NMI watchdog detected a hard lockup while printing RCU CPU stall warning messages to the serial console * nvme hangs when trying to allocate reserved tag * [REGRESSION] "call into AER handling regardless of severity" triggers do_recovery() unnecessarily on correctable PCIe errors * Module nvme_core: A double free of the kmalloc-512 cache between nvme_trans_log_temperature() and nvme_get_log_page(). * sctp - SCTP_CMD_TIMER_START queues active timer kernel BUG at kernel/timer.c:1000! * [Hyper-V][SL-7]When CONFIG_NET_POLL_CONTROLLER is set, mainline commit 2a7f8c3b1d3fee is needed * Kernel panic at cgroup_is_descendant * [Hyper-V][SL-7]Commits To Fix Kdump Failures * IGMPv2 JOIN packets incorrectly routed to loopback * [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] * mlx4: Fix memory allocation in mlx4_buddy_init needed * incorrect assertion on pi_state->pi_mutex.wait_lock from pi_state_update_owner() --- SL7 x86_64 bpftool-3.10.0-1160.36.2.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm kernel-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-headers-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.36.2.el7.x86_64.rpm perf-3.10.0-1160.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm noarch kernel-abi-whitelists-3.10.0-1160.36.2.el7.noarch.rpm kernel-doc-3.10.0-1160.36.2.el7.noarch.rpm -- - Scientific Linux Development Team