Scientific Linux Security Update : kernel on SL7.x x86_64 (20191205)


Security Fix(es) : - Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821) - kernel: local attacker can trigger multiple use-after-free conditions results in privilege escalation (CVE-2019-15239) Bug Fix(es) : - On SL 7.7 kernel SCSI VPD information for NVMe drives is missing (breaks InfoScale) - SL7 fnic spamming logs: Current vnic speed set to : 40000 - kernel build: parallelize redhat/mod-sign.sh - kernel build: speed up module compression step - Nested VirtualBox VMs on Windows guest has the potential of impacting memory region allocated to other KVM guests - NULL pointer dereference at check_preempt_wakeup+0x109 - Regression: panic in pick_next_task_rt - ixgbe reports 'Detected Tx Unit Hang' with adapter reset on SL 7 - [Intel 7.8 Bug] [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM. - nvme: dead loop in blk_mq_tagset_wait_completed_request() when it is called from timeout handler - [mlx5] VF Representer naming is not consistent/persistent through reboots with OSPD deployment - OS getting restarted because of driver issue with QLogic Corp. ISP2532-based 8Gb Fibre Channel to PCI Express HBA [1077:2532] (rev 02). - mlx5: Load balancing not working over VF LAG configuration - SL7.8 - ISST-LTE: vimlp1: Running LTP af_alg04.c (crypto) crash the LPAR - SL7.5 - Fix security issues on crypto vmx - SL 7.7 RC1 - Host crashes about 4.5 hours into switch port bounce test - SL7.6 - cacheinfo code unsafe vs LPM - xfs hangs on acquiring xfs_buf semaphore - single CPU VM hangs during open_posix_testsuite - rcu_sched self-detected stall on CPU while booting with nohz_full