[RHSA-2023:0114] kernel-rt security and bug fix update
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)
kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
The latest RHEL 8.7.z1 kernel changes need to be merged into the RT source tree to keep source parity between the two kernels. (BZ#2137411)
[DELL EMC 8.6-RT BUG] System is not booting into RT Kernel with perc12. (BZ#2139867)
- ID
- RHSA-2023:0114
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2023:0114
- Published
-
2023-01-12T00:00:00
(20 months ago) - Modified
-
2023-01-12T00:00:00
(20 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALSA-2023:0101
- ALSA-2023:0334
- ELSA-2022-9852
- ELSA-2023-0101
- ELSA-2023-0334
- ELSA-2023-0399
- ELSA-2023-12116
- ELSA-2023-12119
- ELSA-2023-12120
- ELSA-2023-12121
- FEDORA-2022-24041b1667
- FEDORA-2022-b36cd53dca
- FEDORA-2022-e4460c41bc
- RHSA-2023:0101
- RHSA-2023:0123
- RHSA-2023:0300
- RHSA-2023:0334
- RHSA-2023:0348
- RHSA-2023:0399
- RHSA-2023:0400
- RHSA-2023:0404
- RLSA-2023:0101
- RLSA-2023:0334
- SUSE-SU-2022:3897-1
- SUSE-SU-2022:3929-1
- SUSE-SU-2022:3930-1
- SUSE-SU-2022:3998-1
- SUSE-SU-2022:4053-1
- SUSE-SU-2022:4072-1
- SUSE-SU-2022:4272-1
- SUSE-SU-2022:4273-1
- SUSE-SU-2022:4503-1
- SUSE-SU-2022:4504-1
- SUSE-SU-2022:4513-1
- SUSE-SU-2022:4515-1
- SUSE-SU-2022:4516-1
- SUSE-SU-2022:4517-1
- SUSE-SU-2022:4518-1
- SUSE-SU-2022:4520-1
- SUSE-SU-2022:4528-1
- SUSE-SU-2022:4534-1
- SUSE-SU-2022:4542-1
- SUSE-SU-2022:4543-1
- SUSE-SU-2022:4544-1
- SUSE-SU-2022:4550-1
- SUSE-SU-2022:4551-1
- SUSE-SU-2022:4559-1
- SUSE-SU-2022:4560-1
- SUSE-SU-2022:4561-1
- SUSE-SU-2022:4562-1
- SUSE-SU-2022:4569-1
- SUSE-SU-2022:4572-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4574-1
- SUSE-SU-2022:4580-1
- SUSE-SU-2022:4585-1
- SUSE-SU-2022:4587-1
- SUSE-SU-2022:4589-1
- SUSE-SU-2022:4595-1
- SUSE-SU-2022:4611-1
- SUSE-SU-2022:4613-1
- SUSE-SU-2022:4614-1
- SUSE-SU-2022:4615-1
- SUSE-SU-2022:4616-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2024:2901-1
- SUSE-SU-2024:2929-1
- SUSE-SU-2024:2940-1
- SUSE-SU-2024:3249-1
- USN-5650-1
- USN-5859-1
- USN-5911-1
- USN-5912-1
- USN-5917-1
- USN-5929-1
- USN-5934-1
- USN-5935-1
- USN-5938-1
- USN-5939-1
- USN-5940-1
- USN-5941-1
- USN-5950-1
- USN-5951-1
- USN-5962-1
- USN-6000-1
- USN-6089-1
- USN-6124-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2067482 | https://bugzilla.redhat.com/2067482 | |
Bugzilla | 2147572 | https://bugzilla.redhat.com/2147572 | |
RHSA | RHSA-2023:0114 | https://access.redhat.com/errata/RHSA-2023:0114 | |
CVE | CVE-2022-2964 | https://access.redhat.com/security/cve/CVE-2022-2964 | |
CVE | CVE-2022-4139 | https://access.redhat.com/security/cve/CVE-2022-4139 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-8.7 | redhat | kernel-rt | < 4.18.0-425.10.1.rt7.220.el8_7 | redhat-8.7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-modules?arch=x86_64&distro=redhat-8.7 | redhat | kernel-rt-modules | < 4.18.0-425.10.1.rt7.220.el8_7 | redhat-8.7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-modules-extra?arch=x86_64&distro=redhat-8.7 | redhat | kernel-rt-modules-extra | < 4.18.0-425.10.1.rt7.220.el8_7 | redhat-8.7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-kvm?arch=x86_64&distro=redhat-8.7 | redhat | kernel-rt-kvm | < 4.18.0-425.10.1.rt7.220.el8_7 | redhat-8.7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-8.7 | redhat | kernel-rt-devel | < 4.18.0-425.10.1.rt7.220.el8_7 | redhat-8.7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-8.7 | redhat | kernel-rt-debug | < 4.18.0-425.10.1.rt7.220.el8_7 | redhat-8.7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-modules?arch=x86_64&distro=redhat-8.7 | redhat | kernel-rt-debug-modules | < 4.18.0-425.10.1.rt7.220.el8_7 | redhat-8.7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-modules-extra?arch=x86_64&distro=redhat-8.7 | redhat | kernel-rt-debug-modules-extra | < 4.18.0-425.10.1.rt7.220.el8_7 | redhat-8.7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-kvm?arch=x86_64&distro=redhat-8.7 | redhat | kernel-rt-debug-kvm | < 4.18.0-425.10.1.rt7.220.el8_7 | redhat-8.7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-8.7 | redhat | kernel-rt-debug-devel | < 4.18.0-425.10.1.rt7.220.el8_7 | redhat-8.7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-core?arch=x86_64&distro=redhat-8.7 | redhat | kernel-rt-debug-core | < 4.18.0-425.10.1.rt7.220.el8_7 | redhat-8.7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-core?arch=x86_64&distro=redhat-8.7 | redhat | kernel-rt-core | < 4.18.0-425.10.1.rt7.220.el8_7 | redhat-8.7 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |