Synopsis:          Important: kernel security and bug fix update
Advisory ID:       SLSA-2019:2736-1
Issue Date:        2019-09-12
CVE Numbers:       None
--

Security Fix(es):
    
    * kernel: Memory corruption due to incorrect socket cloning (CVE-2018-9568)
    
    * kernel: a NULL pointer dereference in
    drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS (CVE-2019-11810)
    
    For more details about the security issue(s), including the impact, a CVSS
    score, acknowledgments, and other related information, refer to the CVE
    page(s) listed in the References section.
    
    Bug Fix(es):
    
    * fragmented packets timing out (BZ#1728931)
    
    * Backport TCP follow-up for small buffers (BZ#1732107)
--

SL6
  x86_64
    kernel-2.6.32-754.22.1.el6.x86_64.rpm
    kernel-debug-2.6.32-754.22.1.el6.x86_64.rpm
    kernel-debug-debuginfo-2.6.32-754.22.1.el6.i686.rpm
    kernel-debug-debuginfo-2.6.32-754.22.1.el6.x86_64.rpm
    kernel-debug-devel-2.6.32-754.22.1.el6.i686.rpm
    kernel-debug-devel-2.6.32-754.22.1.el6.x86_64.rpm
    kernel-debuginfo-2.6.32-754.22.1.el6.i686.rpm
    kernel-debuginfo-2.6.32-754.22.1.el6.x86_64.rpm
    kernel-debuginfo-common-i686-2.6.32-754.22.1.el6.i686.rpm
    kernel-debuginfo-common-x86_64-2.6.32-754.22.1.el6.x86_64.rpm
    kernel-devel-2.6.32-754.22.1.el6.x86_64.rpm
    kernel-headers-2.6.32-754.22.1.el6.x86_64.rpm
    perf-2.6.32-754.22.1.el6.x86_64.rpm
    perf-debuginfo-2.6.32-754.22.1.el6.i686.rpm
    perf-debuginfo-2.6.32-754.22.1.el6.x86_64.rpm
    python-perf-debuginfo-2.6.32-754.22.1.el6.i686.rpm
    python-perf-debuginfo-2.6.32-754.22.1.el6.x86_64.rpm
    python-perf-2.6.32-754.22.1.el6.x86_64.rpm
  i386
    kernel-2.6.32-754.22.1.el6.i686.rpm
    kernel-debug-2.6.32-754.22.1.el6.i686.rpm
    kernel-debug-debuginfo-2.6.32-754.22.1.el6.i686.rpm
    kernel-debug-devel-2.6.32-754.22.1.el6.i686.rpm
    kernel-debuginfo-2.6.32-754.22.1.el6.i686.rpm
    kernel-debuginfo-common-i686-2.6.32-754.22.1.el6.i686.rpm
    kernel-devel-2.6.32-754.22.1.el6.i686.rpm
    kernel-headers-2.6.32-754.22.1.el6.i686.rpm
    perf-2.6.32-754.22.1.el6.i686.rpm
    perf-debuginfo-2.6.32-754.22.1.el6.i686.rpm
    python-perf-debuginfo-2.6.32-754.22.1.el6.i686.rpm
    python-perf-2.6.32-754.22.1.el6.i686.rpm
  noarch
    kernel-abi-whitelists-2.6.32-754.22.1.el6.noarch.rpm
    kernel-doc-2.6.32-754.22.1.el6.noarch.rpm
    kernel-firmware-2.6.32-754.22.1.el6.noarch.rpm

- Scientific Linux Development Team

SciLinux: SLSA-2019-2736-1 Important: kernel on SL6.x i386/x86_64

kernel: Memory corruption due to incorrect socket cloning (CVE-2018-9568) * kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS (CVE-2019...

Summary

Important: kernel security and bug fix update



Security Fixes

* kernel: Memory corruption due to incorrect socket cloning (CVE-2018-9568)
* kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS (CVE-2019-11810)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Severity
Advisory ID: SLSA-2019:2736-1
Issued Date: : 2019-09-12
CVE Numbers: None

Related News