[RHSA-2023:0300] kernel-rt security and bug fix update
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)
kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)
kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)
kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)
kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077)
kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
DELL EMC: System is not booting into RT Kernel with perc12 kernel-rt
kernel-rt: update RT source tree to the latest RHEL-9.1.z1 Batch (BZ#2141817)
- ID
- RHSA-2023:0300
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2023:0300
- Published
-
2023-01-23T00:00:00
(20 months ago) - Modified
-
2023-01-23T00:00:00
(20 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALAS-2022-1591
- ALAS2-2022-1798
- ALSA-2022:7318
- ALSA-2023:0101
- ALSA-2023:0334
- ALSA-2023:0832
- ALSA-2023:2951
- DSA-5173-1
- DSA-5730-1
- ELSA-2022-7318
- ELSA-2022-9852
- ELSA-2023-0101
- ELSA-2023-0334
- ELSA-2023-0399
- ELSA-2023-0832
- ELSA-2023-12116
- ELSA-2023-12119
- ELSA-2023-12120
- ELSA-2023-12121
- ELSA-2023-2951
- FEDORA-2022-24041b1667
- FEDORA-2022-b36cd53dca
- FEDORA-2022-e4460c41bc
- MS:CVE-2022-2959
- MS:CVE-2022-30594
- MS:CVE-2022-3077
- MS:CVE-2022-43945
- openSUSE-SU-2022:2177-1
- RHSA-2022:7318
- RHSA-2022:7319
- RHSA-2023:0101
- RHSA-2023:0114
- RHSA-2023:0123
- RHSA-2023:0334
- RHSA-2023:0348
- RHSA-2023:0399
- RHSA-2023:0400
- RHSA-2023:0404
- RHSA-2023:0832
- RHSA-2023:0839
- RHSA-2023:0854
- RHSA-2023:2736
- RHSA-2023:2951
- RLSA-2023:0101
- RLSA-2023:0334
- RLSA-2023:0832
- SSA:2022-333-01
- SUSE-SU-2022:1939-1
- SUSE-SU-2022:1940-1
- SUSE-SU-2022:1942-1
- SUSE-SU-2022:1945-1
- SUSE-SU-2022:1947-1
- SUSE-SU-2022:1948-1
- SUSE-SU-2022:1949-1
- SUSE-SU-2022:1955-1
- SUSE-SU-2022:1974-1
- SUSE-SU-2022:1988-1
- SUSE-SU-2022:2000-1
- SUSE-SU-2022:2006-1
- SUSE-SU-2022:2010-1
- SUSE-SU-2022:2077-1
- SUSE-SU-2022:2078-1
- SUSE-SU-2022:2079-1
- SUSE-SU-2022:2080-1
- SUSE-SU-2022:2082-1
- SUSE-SU-2022:2083-1
- SUSE-SU-2022:2103-1
- SUSE-SU-2022:2104-1
- SUSE-SU-2022:2111-1
- SUSE-SU-2022:2116-1
- SUSE-SU-2022:2177-1
- SUSE-SU-2022:2268-1
- SUSE-SU-2022:2520-1
- SUSE-SU-2022:2615-1
- SUSE-SU-2022:2629-1
- SUSE-SU-2022:3288-1
- SUSE-SU-2022:3293-1
- SUSE-SU-2022:3897-1
- SUSE-SU-2022:3929-1
- SUSE-SU-2022:3930-1
- SUSE-SU-2022:3998-1
- SUSE-SU-2022:4053-1
- SUSE-SU-2022:4072-1
- SUSE-SU-2022:4113-1
- SUSE-SU-2022:4272-1
- SUSE-SU-2022:4273-1
- SUSE-SU-2022:4503-1
- SUSE-SU-2022:4504-1
- SUSE-SU-2022:4505-1
- SUSE-SU-2022:4506-1
- SUSE-SU-2022:4510-1
- SUSE-SU-2022:4513-1
- SUSE-SU-2022:4515-1
- SUSE-SU-2022:4516-1
- SUSE-SU-2022:4517-1
- SUSE-SU-2022:4518-1
- SUSE-SU-2022:4520-1
- SUSE-SU-2022:4527-1
- SUSE-SU-2022:4528-1
- SUSE-SU-2022:4533-1
- SUSE-SU-2022:4534-1
- SUSE-SU-2022:4539-1
- SUSE-SU-2022:4542-1
- SUSE-SU-2022:4543-1
- SUSE-SU-2022:4544-1
- SUSE-SU-2022:4545-1
- SUSE-SU-2022:4546-1
- SUSE-SU-2022:4550-1
- SUSE-SU-2022:4551-1
- SUSE-SU-2022:4559-1
- SUSE-SU-2022:4560-1
- SUSE-SU-2022:4561-1
- SUSE-SU-2022:4562-1
- SUSE-SU-2022:4566-1
- SUSE-SU-2022:4569-1
- SUSE-SU-2022:4572-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4574-1
- SUSE-SU-2022:4577-1
- SUSE-SU-2022:4580-1
- SUSE-SU-2022:4585-1
- SUSE-SU-2022:4587-1
- SUSE-SU-2022:4589-1
- SUSE-SU-2022:4595-1
- SUSE-SU-2022:4611-1
- SUSE-SU-2022:4613-1
- SUSE-SU-2022:4614-1
- SUSE-SU-2022:4615-1
- SUSE-SU-2022:4616-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:2146-1
- SUSE-SU-2023:2148-1
- SUSE-SU-2023:2151-1
- SUSE-SU-2023:2162-1
- SUSE-SU-2023:2163-1
- SUSE-SU-2023:2232-1
- SUSE-SU-2024:2901-1
- SUSE-SU-2024:2929-1
- SUSE-SU-2024:2940-1
- SUSE-SU-2024:3249-1
- USN-5442-1
- USN-5442-2
- USN-5443-1
- USN-5443-2
- USN-5465-1
- USN-5594-1
- USN-5599-1
- USN-5602-1
- USN-5616-1
- USN-5623-1
- USN-5650-1
- USN-5754-1
- USN-5754-2
- USN-5755-1
- USN-5755-2
- USN-5773-1
- USN-5779-1
- USN-5789-1
- USN-5794-1
- USN-5802-1
- USN-5804-1
- USN-5804-2
- USN-5808-1
- USN-5813-1
- USN-5829-1
- USN-5830-1
- USN-5859-1
- USN-5861-1
- USN-5863-1
- USN-5875-1
- USN-5911-1
- USN-5912-1
- USN-5914-1
- USN-5917-1
- USN-5918-1
- USN-5929-1
- USN-5934-1
- USN-5935-1
- USN-5938-1
- USN-5939-1
- USN-5940-1
- USN-5941-1
- USN-5950-1
- USN-5951-1
- USN-5962-1
- USN-6000-1
- USN-6089-1
- USN-6124-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2067482 | https://bugzilla.redhat.com/2067482 | |
Bugzilla | 2085300 | https://bugzilla.redhat.com/2085300 | |
Bugzilla | 2103681 | https://bugzilla.redhat.com/2103681 | |
Bugzilla | 2123309 | https://bugzilla.redhat.com/2123309 | |
Bugzilla | 2141752 | https://bugzilla.redhat.com/2141752 | |
Bugzilla | 2147572 | https://bugzilla.redhat.com/2147572 | |
RHSA | RHSA-2023:0300 | https://access.redhat.com/errata/RHSA-2023:0300 | |
CVE | CVE-2022-2959 | https://access.redhat.com/security/cve/CVE-2022-2959 | |
CVE | CVE-2022-2964 | https://access.redhat.com/security/cve/CVE-2022-2964 | |
CVE | CVE-2022-30594 | https://access.redhat.com/security/cve/CVE-2022-30594 | |
CVE | CVE-2022-3077 | https://access.redhat.com/security/cve/CVE-2022-3077 | |
CVE | CVE-2022-4139 | https://access.redhat.com/security/cve/CVE-2022-4139 | |
CVE | CVE-2022-43945 | https://access.redhat.com/security/cve/CVE-2022-43945 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-9.1 | redhat | kernel-rt | < 5.14.0-162.12.1.rt21.175.el9_1 | redhat-9.1 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-modules?arch=x86_64&distro=redhat-9.1 | redhat | kernel-rt-modules | < 5.14.0-162.12.1.rt21.175.el9_1 | redhat-9.1 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-modules-extra?arch=x86_64&distro=redhat-9.1 | redhat | kernel-rt-modules-extra | < 5.14.0-162.12.1.rt21.175.el9_1 | redhat-9.1 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-kvm?arch=x86_64&distro=redhat-9.1 | redhat | kernel-rt-kvm | < 5.14.0-162.12.1.rt21.175.el9_1 | redhat-9.1 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-9.1 | redhat | kernel-rt-devel | < 5.14.0-162.12.1.rt21.175.el9_1 | redhat-9.1 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-9.1 | redhat | kernel-rt-debug | < 5.14.0-162.12.1.rt21.175.el9_1 | redhat-9.1 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-modules?arch=x86_64&distro=redhat-9.1 | redhat | kernel-rt-debug-modules | < 5.14.0-162.12.1.rt21.175.el9_1 | redhat-9.1 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-modules-extra?arch=x86_64&distro=redhat-9.1 | redhat | kernel-rt-debug-modules-extra | < 5.14.0-162.12.1.rt21.175.el9_1 | redhat-9.1 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-kvm?arch=x86_64&distro=redhat-9.1 | redhat | kernel-rt-debug-kvm | < 5.14.0-162.12.1.rt21.175.el9_1 | redhat-9.1 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-9.1 | redhat | kernel-rt-debug-devel | < 5.14.0-162.12.1.rt21.175.el9_1 | redhat-9.1 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-core?arch=x86_64&distro=redhat-9.1 | redhat | kernel-rt-debug-core | < 5.14.0-162.12.1.rt21.175.el9_1 | redhat-9.1 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-core?arch=x86_64&distro=redhat-9.1 | redhat | kernel-rt-core | < 5.14.0-162.12.1.rt21.175.el9_1 | redhat-9.1 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |