Headline
RHSA-2021:3445: Red Hat Security Advisory: kernel-rt security and bug fix update
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es):
- kernel: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers() of hid-input.c (CVE-2021-0512)
- kernel: use-after-free in route4_change() in net/sched/cls_route.c (CVE-2021-3715) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es):
- OSLAT spikes on subset of cpus (BZ#1986064)
- Failure to enter full_nohz due to needless SCHED softirqs (BZ#1990273)
- kernel-rt: update RT source tree to the latest RHEL-8.2.z12 Batch source tree (BZ#1997761) Related CVEs:
- CVE-2021-0512: kernel: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers() of hid-input.c
- CVE-2021-3715: kernel: use-after-free in route4_change() in net/sched/cls_route.c