Oval Definition:oval:com.redhat.rhsa:def:20211578
Revision Date:2021-05-18Version:636
Title:RHSA-2021:1578: kernel security, bug fix, and enhancement update (Important)
Description:The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)

  • kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c (CVE-2019-18811)

  • kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (CVE-2019-19523)

  • kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (CVE-2019-19528)

  • kernel: possible out of bounds write in kbd_keycode of keyboard.c (CVE-2020-0431)

  • kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)

  • kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c (CVE-2020-12464)

  • kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314)

  • kernel: Use After Free vulnerability in cgroup BPF component (CVE-2020-14356)

  • kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c (CVE-2020-15437)

  • kernel: umask not applied on filesystem without ACL support (CVE-2020-24394)

  • kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)

  • kernel: incomplete permission checking for access to rbd devices (CVE-2020-25284)

  • kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c (CVE-2020-25285)

  • kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)

  • kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)

  • kernel: use-after-free in kernel midi subsystem (CVE-2020-27786)

  • kernel: child process is able to access parent mm through hfi dev file handle (CVE-2020-27835)

  • kernel: slab-out-of-bounds read in fbcon (CVE-2020-28974)

  • kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent (CVE-2020-35508)

  • kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations (CVE-2020-36322)

  • kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege (CVE-2021-0342)

  • kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c (CVE-2020-11608)

    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

    Additional Changes:

    For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.
  • Family:unixClass:patch
    Status:Reference(s):CVE-2019-18811
    CVE-2019-19523
    CVE-2019-19528
    CVE-2020-0431
    CVE-2020-11608
    CVE-2020-12114
    CVE-2020-12362
    CVE-2020-12363
    CVE-2020-12364
    CVE-2020-12464
    CVE-2020-14314
    CVE-2020-14356
    CVE-2020-15437
    CVE-2020-24394
    CVE-2020-25212
    CVE-2020-25284
    CVE-2020-25285
    CVE-2020-25643
    CVE-2020-25704
    CVE-2020-27786
    CVE-2020-27835
    CVE-2020-28974
    CVE-2020-35508
    CVE-2020-36322
    CVE-2020-36557
    CVE-2021-0342
    CVE-2021-0605
    CVE-2023-1390
    RHSA-2021:1578
    Platform(s):Red Hat Enterprise Linux 8
    Product(s):
    Definition Synopsis
  • Red Hat Enterprise Linux must be installed
  • OR Package Information
  • Red Hat Enterprise Linux 8 is installed
  • OR Red Hat CoreOS 4 is installed
  • AND
  • kernel earlier than 0:4.18.0-305.el8 is currently running
  • OR kernel earlier than 0:4.18.0-305.el8 is set to boot up on next boot
  • AND
  • bpftool is earlier than 0:4.18.0-305.el8
  • AND bpftool is signed with Red Hat redhatrelease2 key
  • kernel is earlier than 0:4.18.0-305.el8
  • AND kernel is signed with Red Hat redhatrelease2 key
  • kernel-abi-stablelists is earlier than 0:4.18.0-305.el8
  • AND kernel-abi-stablelists is signed with Red Hat redhatrelease2 key
  • kernel-core is earlier than 0:4.18.0-305.el8
  • AND kernel-core is signed with Red Hat redhatrelease2 key
  • kernel-cross-headers is earlier than 0:4.18.0-305.el8
  • AND kernel-cross-headers is signed with Red Hat redhatrelease2 key
  • kernel-debug is earlier than 0:4.18.0-305.el8
  • AND kernel-debug is signed with Red Hat redhatrelease2 key
  • kernel-debug-core is earlier than 0:4.18.0-305.el8
  • AND kernel-debug-core is signed with Red Hat redhatrelease2 key
  • kernel-debug-devel is earlier than 0:4.18.0-305.el8
  • AND kernel-debug-devel is signed with Red Hat redhatrelease2 key
  • kernel-debug-modules is earlier than 0:4.18.0-305.el8
  • AND kernel-debug-modules is signed with Red Hat redhatrelease2 key
  • kernel-debug-modules-extra is earlier than 0:4.18.0-305.el8
  • AND kernel-debug-modules-extra is signed with Red Hat redhatrelease2 key
  • kernel-devel is earlier than 0:4.18.0-305.el8
  • AND kernel-devel is signed with Red Hat redhatrelease2 key
  • kernel-doc is earlier than 0:4.18.0-305.el8
  • AND kernel-doc is signed with Red Hat redhatrelease2 key
  • kernel-headers is earlier than 0:4.18.0-305.el8
  • AND kernel-headers is signed with Red Hat redhatrelease2 key
  • kernel-modules is earlier than 0:4.18.0-305.el8
  • AND kernel-modules is signed with Red Hat redhatrelease2 key
  • kernel-modules-extra is earlier than 0:4.18.0-305.el8
  • AND kernel-modules-extra is signed with Red Hat redhatrelease2 key
  • kernel-tools is earlier than 0:4.18.0-305.el8
  • AND kernel-tools is signed with Red Hat redhatrelease2 key
  • kernel-tools-libs is earlier than 0:4.18.0-305.el8
  • AND kernel-tools-libs is signed with Red Hat redhatrelease2 key
  • kernel-tools-libs-devel is earlier than 0:4.18.0-305.el8
  • AND kernel-tools-libs-devel is signed with Red Hat redhatrelease2 key
  • kernel-zfcpdump is earlier than 0:4.18.0-305.el8
  • AND kernel-zfcpdump is signed with Red Hat redhatrelease2 key
  • kernel-zfcpdump-core is earlier than 0:4.18.0-305.el8
  • AND kernel-zfcpdump-core is signed with Red Hat redhatrelease2 key
  • kernel-zfcpdump-devel is earlier than 0:4.18.0-305.el8
  • AND kernel-zfcpdump-devel is signed with Red Hat redhatrelease2 key
  • kernel-zfcpdump-modules is earlier than 0:4.18.0-305.el8
  • AND kernel-zfcpdump-modules is signed with Red Hat redhatrelease2 key
  • kernel-zfcpdump-modules-extra is earlier than 0:4.18.0-305.el8
  • AND kernel-zfcpdump-modules-extra is signed with Red Hat redhatrelease2 key
  • perf is earlier than 0:4.18.0-305.el8
  • AND perf is signed with Red Hat redhatrelease2 key
  • python3-perf is earlier than 0:4.18.0-305.el8
  • AND python3-perf is signed with Red Hat redhatrelease2 key
  • BACK