Oval Definition:oval:com.redhat.rhsa:def:20210856
Revision Date:2021-03-16Version:641
Title:RHSA-2021:0856: kernel security and bug fix update (Important)
Description:The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c (CVE-2020-25211)

  • kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374)

  • kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free (CVE-2020-29661)

  • kernel: malicious USB devices can lead to multiple out-of-bounds write (CVE-2019-19532)

  • kernel: out-of-bounds reads in pinctrl subsystem. (CVE-2020-0427)

  • kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c (CVE-2020-7053)

  • kernel: performance counters race condition use-after-free (CVE-2020-14351)

  • kernel: Geneve/IPsec traffic may be unencrypted between two Geneve endpoints (CVE-2020-25645)

  • kernel: use-after-free in read in vt_do_kdgkb_ioctl (CVE-2020-25656)

  • kernel: ICMP rate limiting can be used for DNS poisoning attack (CVE-2020-25705)

  • kernel: increase slab leak leads to DoS (CVE-2021-20265)

    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

    Bug Fix(es):

  • BUG: scheduling while atomic: memory allocation under spinlock in scsi_register_device_handler() (BZ#1619147)

  • WARNING in __iscsit_free_cmd during recovery Abort (BZ#1784540)

  • lpfc does not issue adisc to fcp-2 devices, does not respond to nvme targer that send an adisc. (BZ#1875961)

  • Panic in semctl_nolock.constprop.15+0x25b (BZ#1877264)

  • [RHEL 7.7][md]Crash due to invalid pool workqueue pointer, work queue race (BZ#1889372)

  • Guest crash on intel CPU with -cpu host,-spec-ctrl,+ibpb (BZ#1890669)

  • RHEL7.9 - kernel/uv: handle length extension properly (BZ#1899172)

  • Commit b144f013fc16a06d7a4b9a4be668a3583fafeda2 'i40e: don't report link up for a VF who hasn't enabled queues' introducing issues with VM using DPDK (BZ#1901064)

  • writing to /sys/devices/(...)/net/eno49/queues/tx-16/xps_cpus triggers kernel panic (BZ#1903819)

  • [Hyper-V][RHEL-7.9]video: hyperv_fb: Fix the cache type when mapping the VRAM Edit (BZ#1908896)

  • kvm-rhel7.9 [AMD] - system crash observed while powering on virtual machine with attached VF interfaces. (BZ#1909036)

  • kernel: nvme nvme7: Connect command failed, error wo/DNR bit: 2 (BZ#1910817)

  • dm-mirror crashes from assuming underlying storage will have a non-NULL merge_bvec_fn (BZ#1916407)

  • watchdog: use nmi registers snapshot in hardlockup handler (BZ#1916589)

  • [DELL EMC 7.9 BUG] - Intel E810 NIC interfaces are not functional in RHEL 7.9 on system with AMD Rome CPUs (BZ#1918273)

  • [DELL EMC BUG] RHEL system log shows AMD-Vi error when system connected with Gen 4 NVMe drives. (BZ#1921187)
  • Family:unixClass:patch
    Status:Reference(s):CVE-2019-19532
    CVE-2020-0427
    CVE-2020-14351
    CVE-2020-25211
    CVE-2020-25645
    CVE-2020-25656
    CVE-2020-25705
    CVE-2020-28374
    CVE-2020-29661
    CVE-2020-7053
    CVE-2021-20265
    RHSA-2021:0856
    Platform(s):Red Hat Enterprise Linux 7
    Product(s):
    Definition Synopsis
  • Red Hat Enterprise Linux must be installed
  • OR Package Information
  • Red Hat Enterprise Linux 7 is installed
  • AND
  • kernel earlier than 0:3.10.0-1160.21.1.el7 is currently running
  • OR kernel earlier than 0:3.10.0-1160.21.1.el7 is set to boot up on next boot
  • AND
  • bpftool is earlier than 0:3.10.0-1160.21.1.el7
  • AND bpftool is signed with Red Hat redhatrelease2 key
  • kernel is earlier than 0:3.10.0-1160.21.1.el7
  • AND kernel is signed with Red Hat redhatrelease2 key
  • kernel-abi-whitelists is earlier than 0:3.10.0-1160.21.1.el7
  • AND kernel-abi-whitelists is signed with Red Hat redhatrelease2 key
  • kernel-bootwrapper is earlier than 0:3.10.0-1160.21.1.el7
  • AND kernel-bootwrapper is signed with Red Hat redhatrelease2 key
  • kernel-debug is earlier than 0:3.10.0-1160.21.1.el7
  • AND kernel-debug is signed with Red Hat redhatrelease2 key
  • kernel-debug-devel is earlier than 0:3.10.0-1160.21.1.el7
  • AND kernel-debug-devel is signed with Red Hat redhatrelease2 key
  • kernel-devel is earlier than 0:3.10.0-1160.21.1.el7
  • AND kernel-devel is signed with Red Hat redhatrelease2 key
  • kernel-doc is earlier than 0:3.10.0-1160.21.1.el7
  • AND kernel-doc is signed with Red Hat redhatrelease2 key
  • kernel-kdump is earlier than 0:3.10.0-1160.21.1.el7
  • AND kernel-kdump is signed with Red Hat redhatrelease2 key
  • kernel-kdump-devel is earlier than 0:3.10.0-1160.21.1.el7
  • AND kernel-kdump-devel is signed with Red Hat redhatrelease2 key
  • kernel-tools is earlier than 0:3.10.0-1160.21.1.el7
  • AND kernel-tools is signed with Red Hat redhatrelease2 key
  • kernel-tools-libs is earlier than 0:3.10.0-1160.21.1.el7
  • AND kernel-tools-libs is signed with Red Hat redhatrelease2 key
  • kernel-tools-libs-devel is earlier than 0:3.10.0-1160.21.1.el7
  • AND kernel-tools-libs-devel is signed with Red Hat redhatrelease2 key
  • perf is earlier than 0:3.10.0-1160.21.1.el7
  • AND perf is signed with Red Hat redhatrelease2 key
  • python-perf is earlier than 0:3.10.0-1160.21.1.el7
  • AND python-perf is signed with Red Hat redhatrelease2 key
  • BACK