First published: Tue May 10 2022(Updated: )
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.<br>Security Fix(es):<br><li> kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)</li> <li> kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)</li> <li> kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)</li> <li> kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)</li> <li> kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)</li> <li> kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)</li> <li> kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)</li> <li> kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)</li> <li> kernel: possible use-after-free in bluetooth module (CVE-2021-3752)</li> <li> kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)</li> <li> kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)</li> <li> kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)</li> <li> kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)</li> <li> kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)</li> <li> kernel: security regression for CVE-2018-13405 (CVE-2021-4037)</li> <li> kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)</li> <li> kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)</li> <li> kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)</li> <li> kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)</li> <li> hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)</li> <li> kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)</li> <li> kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)</li> <li> kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)</li> <li> kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)</li> <li> kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)</li> <li> kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)</li> <li> kernel: use-after-free in the TEE subsystem (CVE-2021-44733)</li> <li> kernel: information leak in the IPv6 implementation (CVE-2021-45485)</li> <li> kernel: information leak in the IPv4 implementation (CVE-2021-45486)</li> <li> hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)</li> <li> hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)</li> <li> kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)</li> <li> kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)</li> <li> kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)</li> <li> kernel: use-after-free in nouveau kernel module (CVE-2020-27820)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Additional Changes:<br>For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <4.18.0-372.9.1.rt7.166.el8 | 4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel-rt | <4.18.0-372.9.1.rt7.166.el8 | 4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel-rt-core | <4.18.0-372.9.1.rt7.166.el8 | 4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel-rt-debug | <4.18.0-372.9.1.rt7.166.el8 | 4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel-rt-debug-core | <4.18.0-372.9.1.rt7.166.el8 | 4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel-rt-debug-debuginfo | <4.18.0-372.9.1.rt7.166.el8 | 4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel-rt-debug-devel | <4.18.0-372.9.1.rt7.166.el8 | 4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel-rt-debug-modules | <4.18.0-372.9.1.rt7.166.el8 | 4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel-rt-debug-modules-extra | <4.18.0-372.9.1.rt7.166.el8 | 4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel-rt-debuginfo | <4.18.0-372.9.1.rt7.166.el8 | 4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel-rt-devel | <4.18.0-372.9.1.rt7.166.el8 | 4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel-rt-modules | <4.18.0-372.9.1.rt7.166.el8 | 4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel-rt-modules-extra | <4.18.0-372.9.1.rt7.166.el8 | 4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel-rt-debug-kvm | <4.18.0-372.9.1.rt7.166.el8 | 4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel-rt-kvm | <4.18.0-372.9.1.rt7.166.el8 | 4.18.0-372.9.1.rt7.166.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.