[RHSA-2021:0004] kernel-rt security and bug fix update
Severity
Important
Affected Packages
12
CVEs
1
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
- kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c (CVE-2020-25211)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- kernel-rt: update RT source tree to the RHEL-8.3.z source tree (BZ#1906140)
- ID
- RHSA-2021:0004
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2021:0004
- Published
-
2021-01-04T00:00:00
(3 years ago) - Modified
-
2021-01-04T00:00:00
(3 years ago) - Rights
- Copyright 2021 Red Hat, Inc.
- Other Advisories
-
- ALAS-2020-1446
- ALAS2-2020-1495
- ALAS2-2020-1556
- DSA-4774-1
- ELSA-2020-5912
- ELSA-2020-5913
- ELSA-2021-0003
- ELSA-2021-0856
- FEDORA-2020-3c6fedeb83
- FEDORA-2020-5920a7a0b2
- MS:CVE-2020-25211
- openSUSE-SU-2021:0241-1
- RHSA-2021:0003
- RHSA-2021:0856
- RHSA-2021:0857
- SSA:2020-295-01
- SUSE-SU-2021:0347-1
- SUSE-SU-2021:0353-1
- SUSE-SU-2021:0354-1
- SUSE-SU-2021:0427-1
- SUSE-SU-2021:0434-1
- SUSE-SU-2021:0437-1
- SUSE-SU-2021:0438-1
- SUSE-SU-2021:0452-1
- USN-4657-1
- USN-4658-1
- USN-4660-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 1877571 | https://bugzilla.redhat.com/1877571 | |
RHSA | RHSA-2021:0004 | https://access.redhat.com/errata/RHSA-2021:0004 | |
CVE | CVE-2020-25211 | https://access.redhat.com/security/cve/CVE-2020-25211 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-8.3 | redhat | kernel-rt | < 4.18.0-240.10.1.rt7.64.el8_3 | redhat-8.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-modules?arch=x86_64&distro=redhat-8.3 | redhat | kernel-rt-modules | < 4.18.0-240.10.1.rt7.64.el8_3 | redhat-8.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-modules-extra?arch=x86_64&distro=redhat-8.3 | redhat | kernel-rt-modules-extra | < 4.18.0-240.10.1.rt7.64.el8_3 | redhat-8.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-kvm?arch=x86_64&distro=redhat-8.3 | redhat | kernel-rt-kvm | < 4.18.0-240.10.1.rt7.64.el8_3 | redhat-8.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-8.3 | redhat | kernel-rt-devel | < 4.18.0-240.10.1.rt7.64.el8_3 | redhat-8.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-8.3 | redhat | kernel-rt-debug | < 4.18.0-240.10.1.rt7.64.el8_3 | redhat-8.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-modules?arch=x86_64&distro=redhat-8.3 | redhat | kernel-rt-debug-modules | < 4.18.0-240.10.1.rt7.64.el8_3 | redhat-8.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-modules-extra?arch=x86_64&distro=redhat-8.3 | redhat | kernel-rt-debug-modules-extra | < 4.18.0-240.10.1.rt7.64.el8_3 | redhat-8.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-kvm?arch=x86_64&distro=redhat-8.3 | redhat | kernel-rt-debug-kvm | < 4.18.0-240.10.1.rt7.64.el8_3 | redhat-8.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-8.3 | redhat | kernel-rt-debug-devel | < 4.18.0-240.10.1.rt7.64.el8_3 | redhat-8.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-core?arch=x86_64&distro=redhat-8.3 | redhat | kernel-rt-debug-core | < 4.18.0-240.10.1.rt7.64.el8_3 | redhat-8.3 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-core?arch=x86_64&distro=redhat-8.3 | redhat | kernel-rt-core | < 4.18.0-240.10.1.rt7.64.el8_3 | redhat-8.3 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |