Security Vulnerabilities fixed in kernel-rt RHSA-2021:3328

description-logoDescription

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555) kernel: race condition for removal of the HCI controller (CVE-2021-32399) kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154) kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS (CVE-2021-29650) kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555) kernel: race condition for removal of the HCI controller (CVE-2021-32399) kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154) kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS (CVE-2021-29650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): kernel-rt: update to the latest RHEL7.9.z8 source tree (BZ#1982927) SolutionFor details on how to apply this update, which includes the changes described in this advisory, refer to:https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect.

affected-products-logoAffected Applications

kernel-rt