Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2021:3725 - Security Advisory
Issued:
2021-10-05
Updated:
2021-10-05

RHSA-2021:3725 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)
  • kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)
  • kernel: race condition for removal of the HCI controller (CVE-2021-32399)
  • kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975161)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 7.4 x86_64

Fixes

  • BZ - 1965461 - CVE-2021-22543 kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks
  • BZ - 1970807 - CVE-2021-32399 kernel: race condition for removal of the HCI controller
  • BZ - 1980101 - CVE-2021-22555 kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c
  • BZ - 1986506 - CVE-2021-37576 kernel: powerpc: KVM guest OS users can cause host OS memory corruption

CVEs

  • CVE-2021-22543
  • CVE-2021-22555
  • CVE-2021-32399
  • CVE-2021-37576

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 7.4

SRPM
kernel-3.10.0-693.94.1.el7.src.rpm SHA-256: a8c7c11dbc44f5325460e47f448e49880a32b6200fbd7e2c8ffde2d5591481d2
x86_64
kernel-3.10.0-693.94.1.el7.x86_64.rpm SHA-256: 6b9a9de8b2a14878e89ad07801ac6d2e1b3a7998cc3a308c32a7fa2183cf1d87
kernel-abi-whitelists-3.10.0-693.94.1.el7.noarch.rpm SHA-256: 1d800be6db3049563c66da3c3125940efe1515616fc4d113c0f70109e2b8c947
kernel-debug-3.10.0-693.94.1.el7.x86_64.rpm SHA-256: 8641dbc43309c25b1ad085ea22ad42a901b527ff14590209afab98d448a46f0b
kernel-debug-debuginfo-3.10.0-693.94.1.el7.x86_64.rpm SHA-256: 7e08c317aa543c1c1a2dac7b0a1e20ca657571b0ce0852aaf50b84785a1192b1
kernel-debug-debuginfo-3.10.0-693.94.1.el7.x86_64.rpm SHA-256: 7e08c317aa543c1c1a2dac7b0a1e20ca657571b0ce0852aaf50b84785a1192b1
kernel-debug-devel-3.10.0-693.94.1.el7.x86_64.rpm SHA-256: d9e0c432c4a06a118f6fdcdf983a0eccdfb0105899f0db74caa41ee4d88a0075
kernel-debuginfo-3.10.0-693.94.1.el7.x86_64.rpm SHA-256: 53a3ea37241eaeb6212c278d781474c2030b55b12eb46b63445fb8c270d677a5
kernel-debuginfo-3.10.0-693.94.1.el7.x86_64.rpm SHA-256: 53a3ea37241eaeb6212c278d781474c2030b55b12eb46b63445fb8c270d677a5
kernel-debuginfo-common-x86_64-3.10.0-693.94.1.el7.x86_64.rpm SHA-256: 5f9e9cfe493fea7aa359cbb8446eed32877bde8cdb0259b3461de38b596cc671
kernel-debuginfo-common-x86_64-3.10.0-693.94.1.el7.x86_64.rpm SHA-256: 5f9e9cfe493fea7aa359cbb8446eed32877bde8cdb0259b3461de38b596cc671
kernel-devel-3.10.0-693.94.1.el7.x86_64.rpm SHA-256: 3a577732ec7d6abf63119fa05718f792bc42618f4fb550a11c5e6d97e77d11e8
kernel-doc-3.10.0-693.94.1.el7.noarch.rpm SHA-256: a5927e37d931bd8b30321236a371090cb72b683f474466e720779561a9562724
kernel-headers-3.10.0-693.94.1.el7.x86_64.rpm SHA-256: ca3ad64147b869e3fde4256121d49fa43cc08d1c6fa7b52120be10265263086b
kernel-tools-3.10.0-693.94.1.el7.x86_64.rpm SHA-256: 9295b757a5e221caacaaf5fec4a77b43de2c929d37219292f2284da7c6c4303b
kernel-tools-debuginfo-3.10.0-693.94.1.el7.x86_64.rpm SHA-256: db2207e29648397cd7fda0cd0eb55c939cda4aaa48576b553e19e079086824da
kernel-tools-debuginfo-3.10.0-693.94.1.el7.x86_64.rpm SHA-256: db2207e29648397cd7fda0cd0eb55c939cda4aaa48576b553e19e079086824da
kernel-tools-libs-3.10.0-693.94.1.el7.x86_64.rpm SHA-256: 2a627ad7e359fac170fe026c60ba1d26b2b65964daf31cd95747934883d6373e
kernel-tools-libs-devel-3.10.0-693.94.1.el7.x86_64.rpm SHA-256: 6ef786a4993439491d0f26df852476f138dc725bfb7c7552cb48f6c9ee76d3ab
perf-3.10.0-693.94.1.el7.x86_64.rpm SHA-256: bc2b16b24c3558d0935cddc4cf669bb60883833b73b05a7b05e63a50a3cb1792
perf-debuginfo-3.10.0-693.94.1.el7.x86_64.rpm SHA-256: 131c1a69dfb3c413ce92290b0c41e31cc3dc98227ebf91bbd15faa2ec2c20105
perf-debuginfo-3.10.0-693.94.1.el7.x86_64.rpm SHA-256: 131c1a69dfb3c413ce92290b0c41e31cc3dc98227ebf91bbd15faa2ec2c20105
python-perf-3.10.0-693.94.1.el7.x86_64.rpm SHA-256: 82c1b21ac660733ca98c6bcd5121baf07605237032c804073600b2d7a9431ecf
python-perf-debuginfo-3.10.0-693.94.1.el7.x86_64.rpm SHA-256: 891318e9d714a60a3c45672cea7c20d44d1f3d1728047bf5b6464702e1867f79
python-perf-debuginfo-3.10.0-693.94.1.el7.x86_64.rpm SHA-256: 891318e9d714a60a3c45672cea7c20d44d1f3d1728047bf5b6464702e1867f79

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility