[RHSA-2021:2599] kernel-rt security and bug fix update
Severity
Important
Affected Packages
12
CVEs
2
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)
kernel: security bypass in certs/blacklist.c and certs/system_keyring.c (CVE-2020-26541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
kernel-rt: update RT source tree to the RHEL-8.4.z1 source tree (BZ#1965378)
panic caused by i40e_msix_clean_rings rhel-rt
- ID
- RHSA-2021:2599
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2021:2599
- Published
-
2021-06-29T00:00:00
(3 years ago) - Modified
-
2021-06-29T00:00:00
(3 years ago) - Rights
- Copyright 2021 Red Hat, Inc.
- Other Advisories
-
- ALAS2-2021-1685
- ALSA-2021:2570
- ELSA-2020-5912
- ELSA-2020-5913
- ELSA-2021-2570
- ELSA-2021-2725
- ELSA-2021-9346
- ELSA-2021-9349
- ELSA-2021-9351
- ELSA-2021-9362
- ELSA-2021-9363
- FEDORA-2021-bae582b42c
- MS:CVE-2020-26541
- MS:CVE-2021-33034
- openSUSE-SU-2021:0843-1
- openSUSE-SU-2021:0947-1
- openSUSE-SU-2021:1975-1
- openSUSE-SU-2021:1977-1
- openSUSE-SU-2022:2173-1
- openSUSE-SU-2022:2177-1
- RHSA-2021:2563
- RHSA-2021:2570
- RHSA-2021:2725
- RHSA-2021:2726
- RHSA-2021:2727
- RLSA-2021:2570
- SSA:2021-202-01
- SUSE-SU-2021:1887-1
- SUSE-SU-2021:1888-1
- SUSE-SU-2021:1889-1
- SUSE-SU-2021:1890-1
- SUSE-SU-2021:1891-1
- SUSE-SU-2021:1899-1
- SUSE-SU-2021:1912-1
- SUSE-SU-2021:1913-1
- SUSE-SU-2021:1975-1
- SUSE-SU-2021:1977-1
- SUSE-SU-2021:2020-1
- SUSE-SU-2021:2025-1
- SUSE-SU-2021:2026-1
- SUSE-SU-2021:2027-1
- SUSE-SU-2021:2042-1
- SUSE-SU-2021:2057-1
- SUSE-SU-2021:2060-1
- SUSE-SU-2021:2067-1
- SUSE-SU-2021:2198-1
- SUSE-SU-2021:2208-1
- SUSE-SU-2021:2406-1
- SUSE-SU-2021:2421-1
- SUSE-SU-2021:2451-1
- SUSE-SU-2021:2577-1
- SUSE-SU-2022:2104-1
- SUSE-SU-2022:2111-1
- SUSE-SU-2022:2172-1
- SUSE-SU-2022:2173-1
- SUSE-SU-2022:2177-1
- SUSE-SU-2022:2377-1
- SUSE-SU-2022:2382-1
- SUSE-SU-2022:2393-1
- SUSE-SU-2022:2407-1
- SUSE-SU-2022:2629-1
- SUSE-SU-2022:4561-1
- SUSE-SU-2022:4611-1
- USN-4997-1
- USN-4997-2
- USN-5000-1
- USN-5000-2
- USN-5001-1
- USN-5016-1
- USN-5018-1
- USN-5070-1
- USN-5106-1
- USN-5120-1
- USN-5210-1
- USN-5299-1
- USN-5343-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 1886285 | https://bugzilla.redhat.com/1886285 | |
Bugzilla | 1961305 | https://bugzilla.redhat.com/1961305 | |
RHSA | RHSA-2021:2599 | https://access.redhat.com/errata/RHSA-2021:2599 | |
CVE | CVE-2020-26541 | https://access.redhat.com/security/cve/CVE-2020-26541 | |
CVE | CVE-2021-33034 | https://access.redhat.com/security/cve/CVE-2021-33034 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-8.4 | redhat | kernel-rt | < 4.18.0-305.7.1.rt7.79.el8_4 | redhat-8.4 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-modules?arch=x86_64&distro=redhat-8.4 | redhat | kernel-rt-modules | < 4.18.0-305.7.1.rt7.79.el8_4 | redhat-8.4 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-modules-extra?arch=x86_64&distro=redhat-8.4 | redhat | kernel-rt-modules-extra | < 4.18.0-305.7.1.rt7.79.el8_4 | redhat-8.4 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-kvm?arch=x86_64&distro=redhat-8.4 | redhat | kernel-rt-kvm | < 4.18.0-305.7.1.rt7.79.el8_4 | redhat-8.4 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-8.4 | redhat | kernel-rt-devel | < 4.18.0-305.7.1.rt7.79.el8_4 | redhat-8.4 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-8.4 | redhat | kernel-rt-debug | < 4.18.0-305.7.1.rt7.79.el8_4 | redhat-8.4 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-modules?arch=x86_64&distro=redhat-8.4 | redhat | kernel-rt-debug-modules | < 4.18.0-305.7.1.rt7.79.el8_4 | redhat-8.4 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-modules-extra?arch=x86_64&distro=redhat-8.4 | redhat | kernel-rt-debug-modules-extra | < 4.18.0-305.7.1.rt7.79.el8_4 | redhat-8.4 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-kvm?arch=x86_64&distro=redhat-8.4 | redhat | kernel-rt-debug-kvm | < 4.18.0-305.7.1.rt7.79.el8_4 | redhat-8.4 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-8.4 | redhat | kernel-rt-debug-devel | < 4.18.0-305.7.1.rt7.79.el8_4 | redhat-8.4 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-core?arch=x86_64&distro=redhat-8.4 | redhat | kernel-rt-debug-core | < 4.18.0-305.7.1.rt7.79.el8_4 | redhat-8.4 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-core?arch=x86_64&distro=redhat-8.4 | redhat | kernel-rt-core | < 4.18.0-305.7.1.rt7.79.el8_4 | redhat-8.4 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |