Security Vulnerabilities fixed in kernel RHSA-2022:1550

description-logoDescription

The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): kernel: use-after-free in RDMA listen() (CVE-2021-4028) kernel: heap out of bounds write in nf_dup_netdev.c (CVE-2022-25636) kernel: use-after-free in RDMA listen() (CVE-2021-4028) kernel: heap out of bounds write in nf_dup_netdev.c (CVE-2022-25636) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): Backport DFS fixes from upstream (BZ#2056329) [RHEL8.5] lpfc driver often fails to detect storage directly connected to Broadcom FC HBA (BZ#2058193) nf_reinject calls nf_queue_entry_free on an already freed entry->state (BZ#2061446) gfs2 blocking in gdlm_lock (BZ#2069750) Backport DFS fixes from upstream (BZ#2056329) [RHEL8.5] lpfc driver often fails to detect storage directly connected to Broadcom FC HBA (BZ#2058193) nf_reinject calls nf_queue_entry_free on an already freed entry->state (BZ#2061446) gfs2 blocking in gdlm_lock (BZ#2069750) SolutionFor details on how to apply this update, which includes the changes described in this advisory, refer to:https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect.

affected-products-logoAffected Applications

kernel

CVE References

CVE-2021-4028 CVE-2022-25636