Security Vulnerabilities fixed in kernel RHSA-2021:2570

description-logoDescription

The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034) kernel: security bypass in certs/blacklist.c and certs/system_keyring.c (CVE-2020-26541) kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034) kernel: security bypass in certs/blacklist.c and certs/system_keyring.c (CVE-2020-26541) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): [ESXi][RHEL-8] VMXNET3 v4 causes invalid checksums of inner packets of VXLAN tunnel (BZ#1960702) fnic crash from invalid request pointer (BZ#1961705) GFS2: Failed FS thaw call makes the entire snapshot failed. (BZ#1961849) dm writecache: fix performance degradation in ssd mode (BZ#1962241) Kernel BUG with act_ct and IP fragments (BZ#1963940) core: backports from upstream (BZ#1963952) Hibernate resume on RHEL fails in Amazon EC2 C5.18xlarge instance (BZ#1964930) [SanityOnly] panic caused by i40e_msix_clean_rings (BZ#1964962) tc reclassification limit is too low for OVN (BZ#1965148) tc action ct nat src addr does not work while used with ct nat dst addr together (BZ#1965150) CNB: Rebase/update TC subsystem for RHEL 8.5 (BZ#1965457) sctp: crash due to use after free of sctp_transport structure (BZ#1965632) [ESXi][RHEL-8] VMXNET3 v4 causes invalid checksums of inner packets of VXLAN tunnel (BZ#1960702) fnic crash from invalid request pointer (BZ#1961705) GFS2: Failed FS thaw call makes the entire snapshot failed. (BZ#1961849) dm writecache: fix performance degradation in ssd mode (BZ#1962241) Kernel BUG with act_ct and IP fragments (BZ#1963940) core: backports from upstream (BZ#1963952) Hibernate resume on RHEL fails in Amazon EC2 C5.18xlarge instance (BZ#1964930) [SanityOnly] panic caused by i40e_msix_clean_rings (BZ#1964962) tc reclassification limit is too low for OVN (BZ#1965148) tc action ct nat src addr does not work while used with ct nat dst addr together (BZ#1965150) CNB: Rebase/update TC subsystem for RHEL 8.5 (BZ#1965457) sctp: crash due to use after free of sctp_transport structure (BZ#1965632) SolutionFor details on how to apply this update, which includes the changes described in this advisory, refer to:https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect.

affected-products-logoAffected Applications

kernel