[RHSA-2022:7134] kernel-rt security and bug fix update
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588)
kernel: information leak in scsi_ioctl() (CVE-2022-0494)
Kernel: A kernel-info-leak issue in pfkey_register (CVE-2022-1353)
hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900)
hw: cpu: AMD: Branch Type Confusion (non-retbleed) (CVE-2022-23825)
hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
[rhel8-rt] BUG: using __this_cpu_add() in preemptible [00000000] - caller is __mod_memcg_lruvec_state+0x69/0x1c0 (BZ#2122600)
The latest RHEL 8.6.z4 kernel changes need to be merged into the RT source tree to keep source parity between the two kernels. (BZ#2125396)
- ID
- RHSA-2022:7134
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2022:7134
- Published
-
2022-10-25T00:00:00
(23 months ago) - Modified
-
2022-10-25T00:00:00
(23 months ago) - Rights
- Copyright 2022 Red Hat, Inc.
- Other Advisories
-
- ALAS-2022-1591
- ALAS-2022-1604
- ALAS-2022-1636
- ALAS2-2022-1793
- ALAS2-2022-1813
- ALAS2-2022-1838
- ALAS2-2022-1852
- ALAS2-2024-2569
- ALPINE:CVE-2022-23816
- ALPINE:CVE-2022-23825
- ALPINE:CVE-2022-29900
- ALSA-2022:6003
- ALSA-2022:7110
- ALSA-2022:8267
- DSA-5127-1
- DSA-5161-1
- DSA-5173-1
- DSA-5184-1
- DSA-5207-1
- ELSA-2022-6003
- ELSA-2022-7110
- ELSA-2022-7337
- ELSA-2022-8267
- ELSA-2022-9479
- ELSA-2022-9480
- ELSA-2022-9590
- ELSA-2022-9591
- ELSA-2022-9689
- ELSA-2022-9690
- ELSA-2022-9691
- ELSA-2022-9692
- ELSA-2022-9693
- ELSA-2022-9694
- ELSA-2022-9699
- ELSA-2022-9709
- ELSA-2022-9710
- ELSA-2022-9761
- ELSA-2022-9787
- ELSA-2022-9788
- ELSA-2022-9827
- ELSA-2022-9830
- ELSA-2024-12150
- ELSA-2024-12151
- ELSA-2024-12153
- ELSA-2024-12154
- ELSA-2024-12433
- FEDORA-2022-3e6ce58029
- FEDORA-2022-484e226872
- FEDORA-2022-8aab5b5cde
- FEDORA-2022-9bbb1d9b7b
- FEDORA-2022-a0d7a5eaf2
- FEDORA-2022-c69ef9c1dd
- GLSA-202402-07
- MS:CVE-2022-0494
- MS:CVE-2022-1353
- MS:CVE-2022-23825
- MS:CVE-2022-29900
- openSUSE-SU-2022:2549-1
- RHSA-2022:6002
- RHSA-2022:6003
- RHSA-2022:7110
- RHSA-2022:7137
- RHSA-2022:7337
- RHSA-2022:7338
- RHSA-2022:7344
- RHSA-2022:7933
- RHSA-2022:8267
- RLSA-2022:7110
- SSA:2022-129-01
- SSA:2022-237-02
- SUSE-SU-2022:1651-1
- SUSE-SU-2022:1668-1
- SUSE-SU-2022:1669-1
- SUSE-SU-2022:1676-1
- SUSE-SU-2022:1686-1
- SUSE-SU-2022:1687-1
- SUSE-SU-2022:2077-1
- SUSE-SU-2022:2082-1
- SUSE-SU-2022:2083-1
- SUSE-SU-2022:2103-1
- SUSE-SU-2022:2104-1
- SUSE-SU-2022:2111-1
- SUSE-SU-2022:2376-1
- SUSE-SU-2022:2377-1
- SUSE-SU-2022:2379-1
- SUSE-SU-2022:2382-1
- SUSE-SU-2022:2393-1
- SUSE-SU-2022:2407-1
- SUSE-SU-2022:2411-1
- SUSE-SU-2022:2424-1
- SUSE-SU-2022:2424-2
- SUSE-SU-2022:2478-1
- SUSE-SU-2022:2520-1
- SUSE-SU-2022:2549-1
- SUSE-SU-2022:2557-1
- SUSE-SU-2022:2560-1
- SUSE-SU-2022:2569-1
- SUSE-SU-2022:2574-1
- SUSE-SU-2022:2591-1
- SUSE-SU-2022:2597-1
- SUSE-SU-2022:2599-1
- SUSE-SU-2022:2599-2
- SUSE-SU-2022:2600-1
- SUSE-SU-2022:2601-1
- SUSE-SU-2022:2615-1
- SUSE-SU-2022:2629-1
- SUSE-SU-2022:2809-1
- SUSE-SU-2022:3263-1
- SUSE-SU-2022:3264-1
- SUSE-SU-2022:3265-1
- SUSE-SU-2022:3274-1
- SUSE-SU-2022:3282-1
- SUSE-SU-2022:3288-1
- SUSE-SU-2022:3291-1
- SUSE-SU-2022:3293-1
- SUSE-SU-2022:3294-1
- SUSE-SU-2022:3408-1
- SUSE-SU-2022:3422-1
- SUSE-SU-2022:3450-1
- SUSE-SU-2022:3609-1
- SUSE-SU-2022:3809-1
- SUSE-SU-2022:4024-1
- SUSE-SU-2022:4027-1
- SUSE-SU-2022:4030-1
- SUSE-SU-2022:4033-1
- SUSE-SU-2022:4034-1
- SUSE-SU-2022:4035-1
- SUSE-SU-2022:4039-1
- SUSE-SU-2022:4100-1
- SUSE-SU-2022:4112-1
- SUSE-SU-2022:4113-1
- SUSE-SU-2022:4129-1
- SUSE-SU-2022:4503-1
- SUSE-SU-2022:4505-1
- SUSE-SU-2022:4566-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4574-1
- SUSE-SU-2022:4589-1
- SUSE-SU-2022:4613-1
- SUSE-SU-2022:4614-1
- SUSE-SU-2022:4615-1
- SUSE-SU-2022:4616-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0416-1
- USN-5381-1
- USN-5467-1
- USN-5469-1
- USN-5500-1
- USN-5505-1
- USN-5513-1
- USN-5515-1
- USN-5541-1
- USN-5557-1
- USN-5560-1
- USN-5560-2
- USN-5562-1
- USN-5564-1
- USN-5565-1
- USN-5566-1
- USN-5567-1
- USN-5582-1
- USN-5588-1
- USN-5728-1
- USN-5728-2
- USN-5728-3
- USN-5854-1
- USN-5861-1
- USN-5862-1
- USN-5865-1
- USN-5883-1
- USN-5924-1
- USN-5975-1
- USN-6001-1
- USN-6007-1
- USN-6013-1
- USN-6014-1
- USN-6221-1
- VMSA-2022-0020.2
- XSA-407
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-8.6 | redhat | kernel-rt | < 4.18.0-372.32.1.rt7.189.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-modules?arch=x86_64&distro=redhat-8.6 | redhat | kernel-rt-modules | < 4.18.0-372.32.1.rt7.189.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-modules-extra?arch=x86_64&distro=redhat-8.6 | redhat | kernel-rt-modules-extra | < 4.18.0-372.32.1.rt7.189.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-kvm?arch=x86_64&distro=redhat-8.6 | redhat | kernel-rt-kvm | < 4.18.0-372.32.1.rt7.189.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-8.6 | redhat | kernel-rt-devel | < 4.18.0-372.32.1.rt7.189.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-8.6 | redhat | kernel-rt-debug | < 4.18.0-372.32.1.rt7.189.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-modules?arch=x86_64&distro=redhat-8.6 | redhat | kernel-rt-debug-modules | < 4.18.0-372.32.1.rt7.189.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-modules-extra?arch=x86_64&distro=redhat-8.6 | redhat | kernel-rt-debug-modules-extra | < 4.18.0-372.32.1.rt7.189.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-kvm?arch=x86_64&distro=redhat-8.6 | redhat | kernel-rt-debug-kvm | < 4.18.0-372.32.1.rt7.189.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-8.6 | redhat | kernel-rt-debug-devel | < 4.18.0-372.32.1.rt7.189.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-core?arch=x86_64&distro=redhat-8.6 | redhat | kernel-rt-debug-core | < 4.18.0-372.32.1.rt7.189.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-core?arch=x86_64&distro=redhat-8.6 | redhat | kernel-rt-core | < 4.18.0-372.32.1.rt7.189.el8_6 | redhat-8.6 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |