- Issued:
- 2021-10-12
- Updated:
- 2021-10-12
RHSA-2021:3802 - Security Advisory
Synopsis
Important: kernel-rt security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
- kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)
- kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653)
- kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) (CVE-2021-3656)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- Indefinite waiting for RCU callback while removing cgroup (BZ#1967844)
- kernel-rt: update to the latest RHEL7.9.z9 source tree (BZ#2002994)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for Real Time 7 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 7 x86_64
Fixes
- BZ - 1965461 - CVE-2021-22543 kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks
- BZ - 1967844 - Indefinite waiting for RCU callback while removing cgroup
- BZ - 1983686 - CVE-2021-3653 kernel: SVM nested virtualization issue in KVM (AVIC support)
- BZ - 1983988 - CVE-2021-3656 kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)
Red Hat Enterprise Linux for Real Time 7
SRPM | |
---|---|
kernel-rt-3.10.0-1160.45.1.rt56.1185.el7.src.rpm | SHA-256: fabec7d3ee371b663c4d3b12a25493b0ec516f2375d2941f82be0159c14bff72 |
x86_64 | |
kernel-rt-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: 1532f753162ee472eb0bdc4c6dd362be5ca67826f4d63b5cea470e8672319acb |
kernel-rt-debug-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: 74d5accff12151af52d7532b2978b4ea3af6ea1895b15dce9e58a47a3d908477 |
kernel-rt-debug-debuginfo-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: 73ed8cf5596d0caa09251fa304fb4ba48397cbdc093a9d317c4e37c1a445c78f |
kernel-rt-debug-devel-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: ace693bc04d307428570e050fb81ad09689669d8f3f356247a9b55b6b889a670 |
kernel-rt-debuginfo-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: d3e9fb0a2d73048e9ba9c0efd8fea2939fd8ff078fa34751513b9e15277e4c4b |
kernel-rt-debuginfo-common-x86_64-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: 1c073f079f3e14cbacdde65699d5ab5bf7c77b990e407fb04feee3a8de01df9c |
kernel-rt-devel-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: f52da3e5da56f2e92bb74c772036d95f68a6d99f43e5d8d4cad5f980077e82fc |
kernel-rt-doc-3.10.0-1160.45.1.rt56.1185.el7.noarch.rpm | SHA-256: 9a118d065eb5b02bdbe4724ccb54f6efc5997999201c714bfef7b6160d3fd06c |
kernel-rt-trace-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: e4b6976f96443cc3039fa7aa65165f9b299ec0ffa2e435989e11278c55666a75 |
kernel-rt-trace-debuginfo-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: 6cb16ce6f949e0083dac980cff1f078bbff2f15e357e41975aab7a6c8210d700 |
kernel-rt-trace-devel-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: 7611c347278c53a6653f8a10e660ee5eb68c05eef48ebb3b66efbbbdd9592a0f |
Red Hat Enterprise Linux for Real Time for NFV 7
SRPM | |
---|---|
kernel-rt-3.10.0-1160.45.1.rt56.1185.el7.src.rpm | SHA-256: fabec7d3ee371b663c4d3b12a25493b0ec516f2375d2941f82be0159c14bff72 |
x86_64 | |
kernel-rt-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: 1532f753162ee472eb0bdc4c6dd362be5ca67826f4d63b5cea470e8672319acb |
kernel-rt-debug-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: 74d5accff12151af52d7532b2978b4ea3af6ea1895b15dce9e58a47a3d908477 |
kernel-rt-debug-debuginfo-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: 73ed8cf5596d0caa09251fa304fb4ba48397cbdc093a9d317c4e37c1a445c78f |
kernel-rt-debug-devel-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: ace693bc04d307428570e050fb81ad09689669d8f3f356247a9b55b6b889a670 |
kernel-rt-debug-kvm-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: f47e8a6001322cac6e550d99a954f855034010cda4dad59f09c5051c02cda81e |
kernel-rt-debug-kvm-debuginfo-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: a2e6903025b2cd047fc34147eea1b1bf08a64bd70881c7ddb471e71eca84fcde |
kernel-rt-debuginfo-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: d3e9fb0a2d73048e9ba9c0efd8fea2939fd8ff078fa34751513b9e15277e4c4b |
kernel-rt-debuginfo-common-x86_64-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: 1c073f079f3e14cbacdde65699d5ab5bf7c77b990e407fb04feee3a8de01df9c |
kernel-rt-devel-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: f52da3e5da56f2e92bb74c772036d95f68a6d99f43e5d8d4cad5f980077e82fc |
kernel-rt-doc-3.10.0-1160.45.1.rt56.1185.el7.noarch.rpm | SHA-256: 9a118d065eb5b02bdbe4724ccb54f6efc5997999201c714bfef7b6160d3fd06c |
kernel-rt-kvm-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: 6dfcf5794feae8338b0a94cd14e788af84cd094bb33194286f6f8238a1fc66f4 |
kernel-rt-kvm-debuginfo-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: f857c32170be0f1afe7dfefb0c92f69b89b8f2681cff0e820ea1c7992cf675be |
kernel-rt-trace-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: e4b6976f96443cc3039fa7aa65165f9b299ec0ffa2e435989e11278c55666a75 |
kernel-rt-trace-debuginfo-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: 6cb16ce6f949e0083dac980cff1f078bbff2f15e357e41975aab7a6c8210d700 |
kernel-rt-trace-devel-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: 7611c347278c53a6653f8a10e660ee5eb68c05eef48ebb3b66efbbbdd9592a0f |
kernel-rt-trace-kvm-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: 34ddedbe03538aafb555870ea38b99dd20827bf5097d4d5cbf7afc1793aac831 |
kernel-rt-trace-kvm-debuginfo-3.10.0-1160.45.1.rt56.1185.el7.x86_64.rpm | SHA-256: 6e6fdaf523d9fdc6054dbf38320a668c4628fd93d4b5f6e0f01d0c3ce358fcee |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.