First published: Tue May 18 2021(Updated: )
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.<br>Security Fix(es):<br><li> kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)</li> <li> kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (CVE-2019-19523)</li> <li> kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (CVE-2019-19528)</li> <li> kernel: possible out of bounds write in kbd_keycode of keyboard.c (CVE-2020-0431)</li> <li> kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)</li> <li> kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c (CVE-2020-12464)</li> <li> kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314)</li> <li> kernel: Use After Free vulnerability in cgroup BPF component (CVE-2020-14356)</li> <li> kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c (CVE-2020-15437)</li> <li> kernel: umask not applied on filesystem without ACL support (CVE-2020-24394)</li> <li> kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)</li> <li> kernel: incomplete permission checking for access to rbd devices (CVE-2020-25284)</li> <li> kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c (CVE-2020-25285)</li> <li> kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)</li> <li> kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)</li> <li> kernel: use-after-free in kernel midi subsystem (CVE-2020-27786)</li> <li> kernel: child process is able to access parent mm through hfi dev file handle (CVE-2020-27835)</li> <li> kernel: slab-out-of-bounds read in fbcon (CVE-2020-28974)</li> <li> kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent (CVE-2020-35508)</li> <li> kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege (CVE-2021-0342)</li> <li> kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c (CVE-2020-11608)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Additional Changes:<br>For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <4.18.0-305.rt7.72.el8 | 4.18.0-305.rt7.72.el8 |
redhat/kernel-rt | <4.18.0-305.rt7.72.el8 | 4.18.0-305.rt7.72.el8 |
redhat/kernel-rt-core | <4.18.0-305.rt7.72.el8 | 4.18.0-305.rt7.72.el8 |
redhat/kernel-rt-debug | <4.18.0-305.rt7.72.el8 | 4.18.0-305.rt7.72.el8 |
redhat/kernel-rt-debug-core | <4.18.0-305.rt7.72.el8 | 4.18.0-305.rt7.72.el8 |
redhat/kernel-rt-debug-debuginfo | <4.18.0-305.rt7.72.el8 | 4.18.0-305.rt7.72.el8 |
redhat/kernel-rt-debug-devel | <4.18.0-305.rt7.72.el8 | 4.18.0-305.rt7.72.el8 |
redhat/kernel-rt-debug-modules | <4.18.0-305.rt7.72.el8 | 4.18.0-305.rt7.72.el8 |
redhat/kernel-rt-debug-modules-extra | <4.18.0-305.rt7.72.el8 | 4.18.0-305.rt7.72.el8 |
redhat/kernel-rt-debuginfo | <4.18.0-305.rt7.72.el8 | 4.18.0-305.rt7.72.el8 |
redhat/kernel-rt-devel | <4.18.0-305.rt7.72.el8 | 4.18.0-305.rt7.72.el8 |
redhat/kernel-rt-modules | <4.18.0-305.rt7.72.el8 | 4.18.0-305.rt7.72.el8 |
redhat/kernel-rt-modules-extra | <4.18.0-305.rt7.72.el8 | 4.18.0-305.rt7.72.el8 |
redhat/kernel-rt-debug-kvm | <4.18.0-305.rt7.72.el8 | 4.18.0-305.rt7.72.el8 |
redhat/kernel-rt-kvm | <4.18.0-305.rt7.72.el8 | 4.18.0-305.rt7.72.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:1739 is classified as critical due to significant vulnerabilities affecting the Real Time Linux Kernel.
To fix RHSA-2021:1739, update the kernel-rt packages to version 4.18.0-305.rt7.72.el8.
RHSA-2021:1739 addresses an integer overflow in Intel Graphics Drivers (CVE-2020-12362) and a use-after-free vulnerability.
The affected packages include kernel-rt, kernel-rt-core, kernel-rt-debug, and several related debug packages.
RHSA-2021:1739 was released on September 29, 2021.