kernel-3.10.0-1160.31.1.el7

エラータID: AXSA:2021-1963:11

Release date: 
Monday, June 14, 2021 - 11:57
Subject: 
kernel-3.10.0-1160.31.1.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)
* kernel: Use after free via PI futex state (CVE-2021-3347)
* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)
* kernel: Improper input validation in some Intel(R) Graphics Drivers (CVE-2020-12363)
* kernel: Null pointer dereference in some Intel(R) Graphics Drivers (CVE-2020-12364)
* kernel: Speculation on pointer arithmetic against bpf_context pointer (CVE-2020-27170)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* kernel crash when call the timer function (sctp_generate_proto_unreach_event) of sctp module
* SCSI error handling process on HP P440ar controller gets stuck indefinitely in device reset operation
* netfilter: reproducible deadlock on nft_log module autoload
* netfilter: NULL pointer dereference in nf_tables_set_lookup()
* [DELL EMC 7.9 Bug]: No acpi_pad threads on top command for "power cap policy equal to 0 watts"
* A race between i40e_ndo_set_vf_mac() and i40e_vsi_clear() in the i40e driver causes a use after free condition of the kmalloc-4096 slab cache.
* netxen driver performs poorly with RT kernel
* gendisk->disk_part_tbl->last_lookup retains pointer after partition deletion
* Kernel experiences panic in update_group_power() due to division error even with Bug 1701115 fix
* zfcp: fix handling of FCP_RESID_OVER bit in fcp ingress path
* mm/THP: do not access vma->vm_mm after calling handle_userfault
* raid: wrong raid io account
* qla2x00_status_cont_entry() missing upstream patch that prevents unnecessary ABRT/warnings
* System hang caused by workqueue stall in qla2xxx driver
* selinux: setsebool can trigger a deadlock
* [Hyper-V] Cannot boot kernel 3.10.0-1160.21.1.el7.x86_64 on Hyper-V

CVE-2020-12362
Integer overflow in the firmware for some Intel(R) Graphics Drivers for Windows * before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable an escalation of privilege via local access.
CVE-2020-12363
Improper input validation in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.
CVE-2020-12364
Null pointer reference in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before version Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.
CVE-2020-27170
An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.
CVE-2020-8648
There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.
CVE-2021-3347
An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-3.10.0-1160.31.1.el7.src.rpm
    MD5: 60038a1947a042780f264c25c7d535dc
    SHA-256: 05a453a91da5f759e800a0607b1c36125ebc2c27445b5a0208c5bdd45b96a6e1
    Size: 99.94 MB

Asianux Server 7 for x86_64
  1. bpftool-3.10.0-1160.31.1.el7.x86_64.rpm
    MD5: b36bd79b20a9295cd9d76cb05129b8de
    SHA-256: fe09c5e581db2ecbeb8eb2cca1cb65e9bfa684fe1f1325aa8300352ea256638a
    Size: 8.48 MB
  2. kernel-3.10.0-1160.31.1.el7.x86_64.rpm
    MD5: 9e04b88f3123d5ac98db460162972d9e
    SHA-256: a9d854268f47b5f268eab3d4d1c86da70ff2facfe5c69d8f546e71d2a6764b29
    Size: 50.32 MB
  3. kernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm
    MD5: 48c31665af3aeea42142d511adedff4e
    SHA-256: 069f9af271126cba247fcf21629931bda06de7664e74be560b068827363c07f1
    Size: 8.05 MB
  4. kernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm
    MD5: 1745373b1dbd945122c0c37fd2b0eb64
    SHA-256: de81861d5e26360622bc46af909c7b118b061bd039edc488aa0cc0bcf012740d
    Size: 52.62 MB
  5. kernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm
    MD5: 517e9e081b061cfbf066801184f65522
    SHA-256: 377b12a2bf09622a8998ce0682dc834e5381c96f515b5e985982922f43c2f200
    Size: 18.03 MB
  6. kernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm
    MD5: 5395e2f694be523cedcda58c0a778ca7
    SHA-256: f22da4a5151bed1a965a2c6bd86cd99f190660420bac28c2b6c512a7c46d1188
    Size: 17.96 MB
  7. kernel-doc-3.10.0-1160.31.1.el7.noarch.rpm
    MD5: ea93797f5cc0a61148118918d9de07ac
    SHA-256: f6121f4cac96bd934bb95a894e710f49b4eb993dddbbdd05e5da7eae5be6d44a
    Size: 19.52 MB
  8. kernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm
    MD5: d266e27c0f740dc36994085669638761
    SHA-256: 758c277e057a30686c5e88436d8de1e13b37909a4bc87164edcc26e1b673a1ce
    Size: 9.03 MB
  9. kernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm
    MD5: b0731730b624bc7cb7c2cd0295bf618d
    SHA-256: 078caf0da4a628c3f8a480ccba8d26049fe2f2caa83be824e59797f76ea33207
    Size: 8.14 MB
  10. kernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm
    MD5: 2dab2e11cc29334df54b1497ec25dcd3
    SHA-256: 92fcc367a938ea06efcdd199d9d134a3a3e18a3844021247f4db8c1bfe936e3a
    Size: 8.04 MB
  11. perf-3.10.0-1160.31.1.el7.x86_64.rpm
    MD5: 64917239c82c64a333c645c21aef3c6b
    SHA-256: 8fc0eb1a3bd8f9322a383c5f42df688221c2d7c01c5a40d4feb60916c813dbda
    Size: 9.68 MB
  12. python-perf-3.10.0-1160.31.1.el7.x86_64.rpm
    MD5: 7e07a66a29c65e1ae1e377634ab2f849
    SHA-256: ad762d4bdbbe329b4004583f4527133c5b8baa78db8651a56dd78682e26fe72f
    Size: 8.13 MB