First published: Tue Apr 27 2021(Updated: )
The kernel-alt packages provide the Linux kernel version 4.x.<br>Security Fix(es):<br><li> kernel: Use after free via PI futex state (CVE-2021-3347)</li> <li> kernel: out-of-bounds read in libiscsi module (CVE-2021-27364)</li> <li> kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365)</li> <li> kernel: powerpc: guest can cause DoS on POWER9 KVM hosts (CVE-2020-11669)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> Kernel oops when resizing ext4 filesystem [rhel-alt-7.6.z] (BZ#1790900)</li> <li> [ipv6][ipsec]:unregister_netdevice: waiting for lo to become free. Usage count = 4 (BZ#1920805)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-alt | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel-abi-whitelists | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel-bootwrapper | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel-debug | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel-debug-debuginfo | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel-debug-devel | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel-debuginfo | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel-debuginfo-common-ppc64le | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel-devel | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel-doc | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel-headers | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel-tools | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel-tools-debuginfo | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel-tools-libs | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel-tools-libs-devel | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/perf | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/perf-debuginfo | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/python-perf | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/python-perf-debuginfo | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel-debug | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel-debug-debuginfo | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel-debug-devel | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel-debuginfo | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel-debuginfo-common-s390x | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel-devel | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel-headers | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel-kdump | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel-kdump-debuginfo | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/kernel-kdump-devel | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/perf | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/perf-debuginfo | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/python-perf | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
redhat/python-perf-debuginfo | <4.14.0-115.36.1.el7a | 4.14.0-115.36.1.el7a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.