Headline
RHSA-2021:2570: Red Hat Security Advisory: kernel security and bug fix update
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es):
- kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)
- kernel: security bypass in certs/blacklist.c and certs/system_keyring.c (CVE-2020-26541) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es):
- [ESXi][RHEL-8] VMXNET3 v4 causes invalid checksums of inner packets of VXLAN tunnel (BZ#1960702)
- fnic crash from invalid request pointer (BZ#1961705)
- GFS2: Failed FS thaw call makes the entire snapshot failed. (BZ#1961849)
- dm writecache: fix performance degradation in ssd mode (BZ#1962241)
- Kernel BUG with act_ct and IP fragments (BZ#1963940)
- core: backports from upstream (BZ#1963952)
- Hibernate resume on RHEL fails in Amazon EC2 C5.18xlarge instance (BZ#1964930)
- [SanityOnly] panic caused by i40e_msix_clean_rings (BZ#1964962)
- tc reclassification limit is too low for OVN (BZ#1965148)
- tc action ct nat src addr does not work while used with ct nat dst addr together (BZ#1965150)
- CNB: Rebase/update TC subsystem for RHEL 8.5 (BZ#1965457)
- sctp: crash due to use after free of sctp_transport structure (BZ#1965632) Related CVEs:
- CVE-2020-26541: kernel: security bypass in certs/blacklist.c and certs/system_keyring.c
- CVE-2021-33034: kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan