[RHSA-2021:5241] kernel-rt security and bug fix update
Severity
Moderate
Affected Packages
12
CVEs
1
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
- kernel: In Overlayfs missing a check for a negative dentry before calling vfs_rename() (CVE-2021-20321)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
kernel-rt: update RT source tree to the RHEL-8.5.z1 source tree (BZ#2023988)
[rt] RHEL-8.6: disable KASAN, KCSAN and UBSAN for kernel-rt (BZ#2026384)
- ID
- RHSA-2021:5241
- Severity
- moderate
- URL
- https://access.redhat.com/errata/RHSA-2021:5241
- Published
-
2021-12-21T00:00:00
(2 years ago) - Modified
-
2021-12-21T00:00:00
(2 years ago) - Rights
- Copyright 2021 Red Hat, Inc.
- Other Advisories
-
- ALAS2-2021-1719
- ALSA-2021:5227
- DSA-5096-1
- ELSA-2021-5227
- ELSA-2022-9088
- MS:CVE-2021-20321
- RHSA-2021:5227
- SSA:2022-031-01
- SUSE-SU-2022:1651-1
- SUSE-SU-2022:1668-1
- SUSE-SU-2022:1669-1
- SUSE-SU-2022:1676-1
- SUSE-SU-2022:1686-1
- SUSE-SU-2022:1687-1
- SUSE-SU-2022:2077-1
- SUSE-SU-2022:2082-1
- SUSE-SU-2022:2083-1
- SUSE-SU-2022:2103-1
- SUSE-SU-2022:2104-1
- SUSE-SU-2022:2111-1
- USN-5208-1
- USN-5209-1
- USN-5210-1
- USN-5218-1
- USN-6221-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2013242 | https://bugzilla.redhat.com/2013242 | |
RHSA | RHSA-2021:5241 | https://access.redhat.com/errata/RHSA-2021:5241 | |
CVE | CVE-2021-20321 | https://access.redhat.com/security/cve/CVE-2021-20321 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-8.5 | redhat | kernel-rt | < 4.18.0-348.7.1.rt7.137.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-modules?arch=x86_64&distro=redhat-8.5 | redhat | kernel-rt-modules | < 4.18.0-348.7.1.rt7.137.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-modules-extra?arch=x86_64&distro=redhat-8.5 | redhat | kernel-rt-modules-extra | < 4.18.0-348.7.1.rt7.137.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-kvm?arch=x86_64&distro=redhat-8.5 | redhat | kernel-rt-kvm | < 4.18.0-348.7.1.rt7.137.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-8.5 | redhat | kernel-rt-devel | < 4.18.0-348.7.1.rt7.137.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-8.5 | redhat | kernel-rt-debug | < 4.18.0-348.7.1.rt7.137.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-modules?arch=x86_64&distro=redhat-8.5 | redhat | kernel-rt-debug-modules | < 4.18.0-348.7.1.rt7.137.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-modules-extra?arch=x86_64&distro=redhat-8.5 | redhat | kernel-rt-debug-modules-extra | < 4.18.0-348.7.1.rt7.137.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-kvm?arch=x86_64&distro=redhat-8.5 | redhat | kernel-rt-debug-kvm | < 4.18.0-348.7.1.rt7.137.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-8.5 | redhat | kernel-rt-debug-devel | < 4.18.0-348.7.1.rt7.137.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-core?arch=x86_64&distro=redhat-8.5 | redhat | kernel-rt-debug-core | < 4.18.0-348.7.1.rt7.137.el8_5 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-core?arch=x86_64&distro=redhat-8.5 | redhat | kernel-rt-core | < 4.18.0-348.7.1.rt7.137.el8_5 | redhat-8.5 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |