[RHSA-2021:2316] kernel-rt security and bug fix update
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)
kernel: Use after free via PI futex state (CVE-2021-3347)
kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)
kernel: Improper input validation in some Intel(R) Graphics Drivers (CVE-2020-12363)
kernel: Null pointer dereference in some Intel(R) Graphics Drivers (CVE-2020-12364)
kernel: Speculation on pointer arithmetic against bpf_context pointer (CVE-2020-27170)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
lru-add-drain workqueue on RT is allocated without being used (BZ#1894587)
kernel-rt: update to the latest RHEL7.9.z source tree (BZ#1953118)
Package | Affected Version |
---|---|
pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.31.1.rt56.1169.el7 |
pkg:rpm/redhat/kernel-rt-trace?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.31.1.rt56.1169.el7 |
pkg:rpm/redhat/kernel-rt-trace-kvm?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.31.1.rt56.1169.el7 |
pkg:rpm/redhat/kernel-rt-trace-devel?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.31.1.rt56.1169.el7 |
pkg:rpm/redhat/kernel-rt-kvm?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.31.1.rt56.1169.el7 |
pkg:rpm/redhat/kernel-rt-doc?distro=redhat-7 | < 3.10.0-1160.31.1.rt56.1169.el7 |
pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.31.1.rt56.1169.el7 |
pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.31.1.rt56.1169.el7 |
pkg:rpm/redhat/kernel-rt-debug-kvm?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.31.1.rt56.1169.el7 |
pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.31.1.rt56.1169.el7 |
- ID
- RHSA-2021:2316
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2021:2316
- Published
-
2021-06-08T00:00:00
(3 years ago) - Modified
-
2021-06-08T00:00:00
(3 years ago) - Rights
- Copyright 2021 Red Hat, Inc.
- Other Advisories
-
- ALAS-2020-1360
- ALAS-2021-1480
- ALAS2-2020-1405
- ALAS2-2021-1600
- ALSA-2020:4431
- ALSA-2021:1093
- ALSA-2021:1578
- ALSA-2021:1620
- ASA-202102-23
- ASB-A-171705902
- DSA-4698-1
- DSA-4843-1
- ELSA-2020-5670
- ELSA-2020-5676
- ELSA-2021-1093
- ELSA-2021-1578
- ELSA-2021-2314
- ELSA-2021-9084
- ELSA-2021-9085
- ELSA-2021-9086
- ELSA-2021-9087
- ELSA-2021-9140
- ELSA-2021-9141
- ELSA-2021-9222
- ELSA-2021-9223
- ELSA-2021-9434
- FEDORA-2021-6e805a5051
- FEDORA-2021-879c756377
- FEDORA-2021-9503fffad9
- FEDORA-2021-e49da8a226
- FEDORA-2021-f0181b8085
- MS:CVE-2020-27170
- MS:CVE-2020-8648
- MS:CVE-2021-3347
- openSUSE-SU-2020:0336-1
- openSUSE-SU-2021:0241-1
- openSUSE-SU-2021:0393-1
- openSUSE-SU-2021:0407-1
- openSUSE-SU-2021:0532-1
- openSUSE-SU-2021:0758-1
- openSUSE-SU-2021:1975-1
- openSUSE-SU-2021:1977-1
- RHSA-2020:4431
- RHSA-2020:4609
- RHSA-2021:1081
- RHSA-2021:1093
- RHSA-2021:1578
- RHSA-2021:1620
- RHSA-2021:1739
- RHSA-2021:2285
- RHSA-2021:2314
- SSA:2020-086-01
- SUSE-SU-2020:0511-1
- SUSE-SU-2020:0558-1
- SUSE-SU-2020:0559-1
- SUSE-SU-2020:0560-1
- SUSE-SU-2020:0580-1
- SUSE-SU-2020:0584-1
- SUSE-SU-2020:0649-1
- SUSE-SU-2020:0667-1
- SUSE-SU-2020:0688-1
- SUSE-SU-2020:0836-1
- SUSE-SU-2020:1255-1
- SUSE-SU-2020:1275-1
- SUSE-SU-2020:1663-1
- SUSE-SU-2021:0347-1
- SUSE-SU-2021:0348-1
- SUSE-SU-2021:0353-1
- SUSE-SU-2021:0354-1
- SUSE-SU-2021:0427-1
- SUSE-SU-2021:0433-1
- SUSE-SU-2021:0434-1
- SUSE-SU-2021:0437-1
- SUSE-SU-2021:0438-1
- SUSE-SU-2021:0452-1
- SUSE-SU-2021:0532-1
- SUSE-SU-2021:0694-1
- SUSE-SU-2021:0735-1
- SUSE-SU-2021:0738-1
- SUSE-SU-2021:0741-1
- SUSE-SU-2021:0809-1
- SUSE-SU-2021:0818-1
- SUSE-SU-2021:0823-1
- SUSE-SU-2021:0826-1
- SUSE-SU-2021:0840-1
- SUSE-SU-2021:0841-1
- SUSE-SU-2021:0842-1
- SUSE-SU-2021:0849-1
- SUSE-SU-2021:0853-1
- SUSE-SU-2021:0859-1
- SUSE-SU-2021:0868-1
- SUSE-SU-2021:0870-1
- SUSE-SU-2021:1175-1
- SUSE-SU-2021:1176-1
- SUSE-SU-2021:1177-1
- SUSE-SU-2021:1210-1
- SUSE-SU-2021:1211-1
- SUSE-SU-2021:1238-1
- SUSE-SU-2021:1573-1
- SUSE-SU-2021:1596-1
- SUSE-SU-2021:1624-1
- SUSE-SU-2021:1625-1
- SUSE-SU-2021:1975-1
- SUSE-SU-2021:1977-1
- USN-4342-1
- USN-4344-1
- USN-4345-1
- USN-4346-1
- USN-4878-1
- USN-4884-1
- USN-4887-1
- USN-4890-1
- USN-4907-1
- USN-4910-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 1802559 | https://bugzilla.redhat.com/1802559 | |
Bugzilla | 1922249 | https://bugzilla.redhat.com/1922249 | |
Bugzilla | 1930246 | https://bugzilla.redhat.com/1930246 | |
Bugzilla | 1930249 | https://bugzilla.redhat.com/1930249 | |
Bugzilla | 1930251 | https://bugzilla.redhat.com/1930251 | |
Bugzilla | 1940627 | https://bugzilla.redhat.com/1940627 | |
RHSA | RHSA-2021:2316 | https://access.redhat.com/errata/RHSA-2021:2316 | |
CVE | CVE-2020-12362 | https://access.redhat.com/security/cve/CVE-2020-12362 | |
CVE | CVE-2020-12363 | https://access.redhat.com/security/cve/CVE-2020-12363 | |
CVE | CVE-2020-12364 | https://access.redhat.com/security/cve/CVE-2020-12364 | |
CVE | CVE-2020-27170 | https://access.redhat.com/security/cve/CVE-2020-27170 | |
CVE | CVE-2020-8648 | https://access.redhat.com/security/cve/CVE-2020-8648 | |
CVE | CVE-2021-3347 | https://access.redhat.com/security/cve/CVE-2021-3347 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-7 | redhat | kernel-rt | < 3.10.0-1160.31.1.rt56.1169.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-trace?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-trace | < 3.10.0-1160.31.1.rt56.1169.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-trace-kvm?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-trace-kvm | < 3.10.0-1160.31.1.rt56.1169.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-trace-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-trace-devel | < 3.10.0-1160.31.1.rt56.1169.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-kvm?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-kvm | < 3.10.0-1160.31.1.rt56.1169.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-doc?distro=redhat-7 | redhat | kernel-rt-doc | < 3.10.0-1160.31.1.rt56.1169.el7 | redhat-7 | ||
Affected | pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-devel | < 3.10.0-1160.31.1.rt56.1169.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-debug | < 3.10.0-1160.31.1.rt56.1169.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-kvm?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-debug-kvm | < 3.10.0-1160.31.1.rt56.1169.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-debug-devel | < 3.10.0-1160.31.1.rt56.1169.el7 | redhat-7 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |