Security Vulnerabilities fixed in kernel RHSA-2021:1071

description-logoDescription

The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): kernel: out-of-bounds read in libiscsi module (CVE-2021-27364) kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365) kernel: iscsi: unrestricted access to sessions and handles (CVE-2021-27363) kernel: out-of-bounds read in libiscsi module (CVE-2021-27364) kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365) kernel: iscsi: unrestricted access to sessions and handles (CVE-2021-27363) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): Customer testing eMMC sees and intermittent boot problem on 7.8+, was not seen on 7.3 (BZ#1918916) tcm loopback driver causes double-start of scsi command when work is delayed (BZ#1925652) [Azure][RHEL-7]Mellanox Patches To Prevent Kernel Hang In MLX4 (BZ#1925691) A patch from upstream c365c292d059 causes us to end up leaving rt_nr_boosted in an inconsistent state, which causes a hard lockup. (BZ#1928082) [RHEL7.9.z] Add fix to update snd_wl1 in bulk receiver fast path (BZ#1929804) Customer testing eMMC sees and intermittent boot problem on 7.8+, was not seen on 7.3 (BZ#1918916) tcm loopback driver causes double-start of scsi command when work is delayed (BZ#1925652) [Azure][RHEL-7]Mellanox Patches To Prevent Kernel Hang In MLX4 (BZ#1925691) A patch from upstream c365c292d059 causes us to end up leaving rt_nr_boosted in an inconsistent state, which causes a hard lockup. (BZ#1928082) [RHEL7.9.z] Add fix to update snd_wl1 in bulk receiver fast path (BZ#1929804) SolutionFor details on how to apply this update, which includes the changes described in this advisory, refer to:https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect.

affected-products-logoAffected Applications

kernel