- Issued:
- 2021-03-09
- Updated:
- 2021-03-09
RHSA-2021:0774 - Security Advisory
Synopsis
Important: kernel-rt security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
- kernel: bad kfree in auditfilter.c may lead to escalation of privilege (CVE-2020-0444)
- kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c (CVE-2020-25211)
- kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free (CVE-2020-29661)
- kernel: performance counters race condition use-after-free (CVE-2020-14351)
- kernel: ICMP rate limiting can be used for DNS poisoning attack (CVE-2020-25705)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- kernel-rt: update RT source tree to the latest RHEL-8.2.z7 Batch source tree (BZ#1915947)
- kernel-rt possible livelock: WARNING: CPU: 28 PID: 3109 at kernel/ptrace.c:242 ptrace_check_attach+0xdd/0x1a0 (BZ#1925309)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64
- Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64
Fixes
- BZ - 1862849 - CVE-2020-14351 kernel: performance counters race condition use-after-free
- BZ - 1877571 - CVE-2020-25211 kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c
- BZ - 1894579 - CVE-2020-25705 kernel: ICMP rate limiting can be used for DNS poisoning attack
- BZ - 1906525 - CVE-2020-29661 kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free
- BZ - 1915947 - kernel-rt: update RT source tree to the latest RHEL-8.2.z7 Batch source tree
- BZ - 1920474 - CVE-2020-0444 kernel: bad kfree in auditfilter.c may lead to escalation of privilege
Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2
SRPM | |
---|---|
kernel-rt-4.18.0-193.46.1.rt13.96.el8_2.src.rpm | SHA-256: 9f363b11a04f5f7cc712c6874b92181d573ce58fa2938103dee6a4cb4d7aef01 |
x86_64 | |
kernel-rt-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: fcfeac9338d38ee061311ad0a098876119432742f6264cb162c854d079731ea6 |
kernel-rt-core-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: e312b11d890e2c0beea5b2aa23841ecd2e4371d11777d243ce27ff71b2a32e4b |
kernel-rt-debug-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: 1e71ee86f25097ba34d8dfb855276f1dc9ed8b890ca9dc2069a8e3e5c8309de9 |
kernel-rt-debug-core-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: cbb1f59bb56deb9405e9185d314bcc577983ff254630634bf374134cffdf9a8f |
kernel-rt-debug-debuginfo-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: 756db36c619ddb2feba5a9653ba1fede182feaf5d7c311e97baee0415521a6ad |
kernel-rt-debug-devel-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: 9c4be23ba22a46bf756a84967657e60372ff459db65f182dad4b71724a81e6c5 |
kernel-rt-debug-modules-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: eacb2bd954b487b54ae3aef09e074228d3f6f2caf18680e7e1c1e7eebc9ec512 |
kernel-rt-debug-modules-extra-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: 2490f5306875a1a83f5dd1fa212c42787be03c27b17af7b51e607ca9e752b6e2 |
kernel-rt-debuginfo-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: 7d650d356bb413ea24d4eb1922fecae9c2f3478223c3b27cd6cc9332761f1b74 |
kernel-rt-debuginfo-common-x86_64-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: f3423a42caaba8799f0eb9c529190bb22103a74067062324799ab6b561e9e59a |
kernel-rt-devel-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: 4a02ac707a5e27ce26a1ebf5a35c99a1b5bec00f752a51700d7800fa09d24bdc |
kernel-rt-modules-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: ad99a810f2ce35a29d91705c36c52237931c4b1c987b9cc6c1690561bb55d2d7 |
kernel-rt-modules-extra-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: 84f895558c680b751c23db70d02561f2f1d051cca386d9f2f8fb1935db5e36dd |
Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2
SRPM | |
---|---|
kernel-rt-4.18.0-193.46.1.rt13.96.el8_2.src.rpm | SHA-256: 9f363b11a04f5f7cc712c6874b92181d573ce58fa2938103dee6a4cb4d7aef01 |
x86_64 | |
kernel-rt-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: fcfeac9338d38ee061311ad0a098876119432742f6264cb162c854d079731ea6 |
kernel-rt-core-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: e312b11d890e2c0beea5b2aa23841ecd2e4371d11777d243ce27ff71b2a32e4b |
kernel-rt-debug-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: 1e71ee86f25097ba34d8dfb855276f1dc9ed8b890ca9dc2069a8e3e5c8309de9 |
kernel-rt-debug-core-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: cbb1f59bb56deb9405e9185d314bcc577983ff254630634bf374134cffdf9a8f |
kernel-rt-debug-debuginfo-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: 756db36c619ddb2feba5a9653ba1fede182feaf5d7c311e97baee0415521a6ad |
kernel-rt-debug-devel-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: 9c4be23ba22a46bf756a84967657e60372ff459db65f182dad4b71724a81e6c5 |
kernel-rt-debug-kvm-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: f5700a6a94febd08e69d6da68bc95e5cea8e47bab4b2f25ce192f78375014a5e |
kernel-rt-debug-modules-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: eacb2bd954b487b54ae3aef09e074228d3f6f2caf18680e7e1c1e7eebc9ec512 |
kernel-rt-debug-modules-extra-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: 2490f5306875a1a83f5dd1fa212c42787be03c27b17af7b51e607ca9e752b6e2 |
kernel-rt-debuginfo-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: 7d650d356bb413ea24d4eb1922fecae9c2f3478223c3b27cd6cc9332761f1b74 |
kernel-rt-debuginfo-common-x86_64-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: f3423a42caaba8799f0eb9c529190bb22103a74067062324799ab6b561e9e59a |
kernel-rt-devel-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: 4a02ac707a5e27ce26a1ebf5a35c99a1b5bec00f752a51700d7800fa09d24bdc |
kernel-rt-kvm-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: 39b8d865ff893d74f428320103fb1022df9f73410f4d5ffa68f1693ebb321720 |
kernel-rt-modules-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: ad99a810f2ce35a29d91705c36c52237931c4b1c987b9cc6c1690561bb55d2d7 |
kernel-rt-modules-extra-4.18.0-193.46.1.rt13.96.el8_2.x86_64.rpm | SHA-256: 84f895558c680b751c23db70d02561f2f1d051cca386d9f2f8fb1935db5e36dd |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.