First published: Tue Jun 08 2021(Updated: )
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.<br>Security Fix(es):<br><li> kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)</li> <li> kernel: Use after free via PI futex state (CVE-2021-3347)</li> <li> kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)</li> <li> kernel: Improper input validation in some Intel(R) Graphics Drivers (CVE-2020-12363)</li> <li> kernel: Null pointer dereference in some Intel(R) Graphics Drivers (CVE-2020-12364)</li> <li> kernel: Speculation on pointer arithmetic against bpf_context pointer (CVE-2020-27170)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> lru-add-drain workqueue on RT is allocated without being used (BZ#1894587)</li> <li> kernel-rt: update to the latest RHEL7.9.z source tree (BZ#1953118)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <3.10.0-1160.31.1.rt56.1169.el7 | 3.10.0-1160.31.1.rt56.1169.el7 |
redhat/kernel-rt | <3.10.0-1160.31.1.rt56.1169.el7 | 3.10.0-1160.31.1.rt56.1169.el7 |
redhat/kernel-rt-debug | <3.10.0-1160.31.1.rt56.1169.el7 | 3.10.0-1160.31.1.rt56.1169.el7 |
redhat/kernel-rt-debug-debuginfo | <3.10.0-1160.31.1.rt56.1169.el7 | 3.10.0-1160.31.1.rt56.1169.el7 |
redhat/kernel-rt-debug-devel | <3.10.0-1160.31.1.rt56.1169.el7 | 3.10.0-1160.31.1.rt56.1169.el7 |
redhat/kernel-rt-debuginfo | <3.10.0-1160.31.1.rt56.1169.el7 | 3.10.0-1160.31.1.rt56.1169.el7 |
redhat/kernel-rt-devel | <3.10.0-1160.31.1.rt56.1169.el7 | 3.10.0-1160.31.1.rt56.1169.el7 |
redhat/kernel-rt-doc | <3.10.0-1160.31.1.rt56.1169.el7 | 3.10.0-1160.31.1.rt56.1169.el7 |
redhat/kernel-rt-trace | <3.10.0-1160.31.1.rt56.1169.el7 | 3.10.0-1160.31.1.rt56.1169.el7 |
redhat/kernel-rt-trace-debuginfo | <3.10.0-1160.31.1.rt56.1169.el7 | 3.10.0-1160.31.1.rt56.1169.el7 |
redhat/kernel-rt-trace-devel | <3.10.0-1160.31.1.rt56.1169.el7 | 3.10.0-1160.31.1.rt56.1169.el7 |
redhat/kernel-rt-debug-kvm | <3.10.0-1160.31.1.rt56.1169.el7 | 3.10.0-1160.31.1.rt56.1169.el7 |
redhat/kernel-rt-debug-kvm-debuginfo | <3.10.0-1160.31.1.rt56.1169.el7 | 3.10.0-1160.31.1.rt56.1169.el7 |
redhat/kernel-rt-kvm | <3.10.0-1160.31.1.rt56.1169.el7 | 3.10.0-1160.31.1.rt56.1169.el7 |
redhat/kernel-rt-kvm-debuginfo | <3.10.0-1160.31.1.rt56.1169.el7 | 3.10.0-1160.31.1.rt56.1169.el7 |
redhat/kernel-rt-trace-kvm | <3.10.0-1160.31.1.rt56.1169.el7 | 3.10.0-1160.31.1.rt56.1169.el7 |
redhat/kernel-rt-trace-kvm-debuginfo | <3.10.0-1160.31.1.rt56.1169.el7 | 3.10.0-1160.31.1.rt56.1169.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.