Headline
RHSA-2021:2719: Red Hat Security Advisory: kernel-rt security and bug fix update
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es):
- kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)
- kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)
- kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)
- kernel: security bypass in certs/blacklist.c and certs/system_keyring.c (CVE-2020-26541)
- kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent (CVE-2020-35508) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es):
- kernel-rt: update RT source tree to the latest RHEL-8.2.z10 Batch source tree (BZ#1968022) Related CVEs:
- CVE-2020-25704: kernel: perf_event_parse_addr_filter memory
- CVE-2020-26541: kernel: security bypass in certs/blacklist.c and certs/system_keyring.c
- CVE-2020-35508: kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent
- CVE-2021-33034: kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan
- CVE-2021-33909: kernel: size_t-to-int conversion vulnerability in the filesystem layer