[RHSA-2021:3044] kpatch-patch security update
Severity
Important
Affected Packages
16
CVEs
3
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)
kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)
kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- ID
- RHSA-2021:3044
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2021:3044
- Published
-
2021-08-10T00:00:00
(3 years ago) - Modified
-
2021-08-10T00:00:00
(3 years ago) - Rights
- Copyright 2021 Red Hat, Inc.
- Other Advisories
-
- ALAS-2021-1539
- ALAS2-2021-1627
- ALAS2-2021-1699
- ALSA-2021:3057
- ASA-202107-48
- ASA-202107-49
- ASA-202107-50
- ASA-202107-51
- DSA-4941-1
- ELSA-2021-3057
- ELSA-2021-3327
- ELSA-2021-3801
- ELSA-2021-9395
- ELSA-2021-9442
- ELSA-2021-9450
- ELSA-2021-9451
- ELSA-2021-9452
- ELSA-2021-9453
- FEDORA-2021-95f2f1cfc7
- FEDORA-2021-fe826f202e
- MS:CVE-2021-3609
- openSUSE-SU-2021:1076-1
- openSUSE-SU-2021:1142-1
- openSUSE-SU-2021:2409-1
- openSUSE-SU-2021:2415-1
- openSUSE-SU-2021:2427-1
- openSUSE-SU-2021:2645-1
- openSUSE-SU-2021:2687-1
- openSUSE-SU-2021:3876-1
- RHSA-2021:3057
- RHSA-2021:3088
- RHSA-2021:3327
- RHSA-2021:3328
- RHSA-2021:3381
- RHSA-2021:3768
- RHSA-2021:3801
- RHSA-2021:3802
- RLSA-2021:3057
- SSA:2021-202-01
- SUSE-SU-2021:2406-1
- SUSE-SU-2021:2407-1
- SUSE-SU-2021:2408-1
- SUSE-SU-2021:2409-1
- SUSE-SU-2021:2415-1
- SUSE-SU-2021:2416-1
- SUSE-SU-2021:2421-1
- SUSE-SU-2021:2422-1
- SUSE-SU-2021:2427-1
- SUSE-SU-2021:2438-1
- SUSE-SU-2021:2451-1
- SUSE-SU-2021:2487-1
- SUSE-SU-2021:2538-1
- SUSE-SU-2021:2542-1
- SUSE-SU-2021:2559-1
- SUSE-SU-2021:2560-1
- SUSE-SU-2021:2577-1
- SUSE-SU-2021:2584-1
- SUSE-SU-2021:2599-1
- SUSE-SU-2021:2599-2
- SUSE-SU-2021:2643-1
- SUSE-SU-2021:2644-1
- SUSE-SU-2021:2645-1
- SUSE-SU-2021:2646-1
- SUSE-SU-2021:2647-1
- SUSE-SU-2021:2678-1
- SUSE-SU-2021:2687-1
- SUSE-SU-2021:2695-1
- SUSE-SU-2021:2746-1
- SUSE-SU-2021:2756-1
- SUSE-SU-2021:2842-1
- SUSE-SU-2021:3876-1
- SUSE-SU-2021:3969-1
- SUSE-SU-2021:3972-1
- USN-4997-1
- USN-4997-2
- USN-4999-1
- USN-5000-1
- USN-5000-2
- USN-5001-1
- USN-5002-1
- USN-5003-1
- USN-5039-1
- USN-5070-1
- USN-5071-1
- USN-5071-2
- USN-5071-3
- USN-5082-1
- USN-5094-1
- USN-5094-2
- USN-5106-1
- USN-5120-1
- USN-5505-1
- USN-5513-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 1965461 | https://bugzilla.redhat.com/1965461 | |
Bugzilla | 1971651 | https://bugzilla.redhat.com/1971651 | |
Bugzilla | 1980101 | https://bugzilla.redhat.com/1980101 | |
RHSA | RHSA-2021:3044 | https://access.redhat.com/errata/RHSA-2021:3044 | |
CVE | CVE-2021-22543 | https://access.redhat.com/security/cve/CVE-2021-22543 | |
CVE | CVE-2021-22555 | https://access.redhat.com/security/cve/CVE-2021-22555 | |
CVE | CVE-2021-3609 | https://access.redhat.com/security/cve/CVE-2021-3609 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1?arch=x86_64&distro=redhat-8.4 | redhat | kpatch-patch-4_18_0-305_7_1 | < 1-2.el8_4 | redhat-8.4 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1?arch=ppc64le&distro=redhat-8.4 | redhat | kpatch-patch-4_18_0-305_7_1 | < 1-2.el8_4 | redhat-8.4 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1?arch=x86_64&distro=redhat-8.4 | redhat | kpatch-patch-4_18_0-305_3_1 | < 1-3.el8_4 | redhat-8.4 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1?arch=ppc64le&distro=redhat-8.4 | redhat | kpatch-patch-4_18_0-305_3_1 | < 1-3.el8_4 | redhat-8.4 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2?arch=x86_64&distro=redhat-8.4 | redhat | kpatch-patch-4_18_0-305_10_2 | < 1-1.el8_4 | redhat-8.4 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2?arch=ppc64le&distro=redhat-8.4 | redhat | kpatch-patch-4_18_0-305_10_2 | < 1-1.el8_4 | redhat-8.4 | ppc64le | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-305?arch=x86_64&distro=redhat-8 | redhat | kpatch-patch-4_18_0-305 | < 1-4.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kpatch-patch-4_18_0-305?arch=ppc64le&distro=redhat-8 | redhat | kpatch-patch-4_18_0-305 | < 1-4.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.4 | redhat | kernel | < 4.18.0-305.3.1.el8_4 | redhat-8.4 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.4 | redhat | kernel | < 4.18.0-305.7.1.el8_4 | redhat-8.4 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.4 | redhat | kernel | < 4.18.0-305.10.2.el8_4 | redhat-8.4 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8 | redhat | kernel | < 4.18.0-305.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.4 | redhat | kernel | < 4.18.0-305.3.1.el8_4 | redhat-8.4 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.4 | redhat | kernel | < 4.18.0-305.7.1.el8_4 | redhat-8.4 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.4 | redhat | kernel | < 4.18.0-305.10.2.el8_4 | redhat-8.4 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8 | redhat | kernel | < 4.18.0-305.el8 | redhat-8 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |