[RHSA-2023:0400] kernel-rt security and bug fix update
Severity
Important
Affected Packages
10
CVEs
2
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)
hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- kernel-rt: update to the latest RHEL7.9.z20 source tree (BZ#2152044)
Package | Affected Version |
---|---|
pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.83.1.rt56.1228.el7 |
pkg:rpm/redhat/kernel-rt-trace?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.83.1.rt56.1228.el7 |
pkg:rpm/redhat/kernel-rt-trace-kvm?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.83.1.rt56.1228.el7 |
pkg:rpm/redhat/kernel-rt-trace-devel?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.83.1.rt56.1228.el7 |
pkg:rpm/redhat/kernel-rt-kvm?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.83.1.rt56.1228.el7 |
pkg:rpm/redhat/kernel-rt-doc?distro=redhat-7 | < 3.10.0-1160.83.1.rt56.1228.el7 |
pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.83.1.rt56.1228.el7 |
pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.83.1.rt56.1228.el7 |
pkg:rpm/redhat/kernel-rt-debug-kvm?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.83.1.rt56.1228.el7 |
pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.83.1.rt56.1228.el7 |
- ID
- RHSA-2023:0400
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2023:0400
- Published
-
2023-01-24T00:00:00
(20 months ago) - Modified
-
2023-01-24T00:00:00
(20 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALAS-2022-1571
- ALAS2-2022-1761
- ALSA-2022:1988
- ALSA-2023:0101
- ALSA-2023:0334
- ELSA-2022-1988
- ELSA-2022-9244
- ELSA-2022-9245
- ELSA-2022-9273
- ELSA-2022-9274
- ELSA-2022-9313
- ELSA-2022-9314
- ELSA-2022-9852
- ELSA-2023-0101
- ELSA-2023-0187
- ELSA-2023-0334
- ELSA-2023-0399
- openSUSE-SU-2022:0940-1
- RHSA-2022:1975
- RHSA-2022:1988
- RHSA-2023:0101
- RHSA-2023:0114
- RHSA-2023:0123
- RHSA-2023:0300
- RHSA-2023:0334
- RHSA-2023:0348
- RHSA-2023:0399
- RHSA-2023:0404
- RLSA-2022:1988
- RLSA-2023:0101
- RLSA-2023:0334
- SUSE-SU-2022:0931-1
- SUSE-SU-2022:0939-1
- SUSE-SU-2022:0940-1
- SUSE-SU-2022:1285-1
- SUSE-SU-2022:1300-1
- SUSE-SU-2022:1359-1
- SUSE-SU-2022:1375-1
- SUSE-SU-2022:1408-1
- SUSE-SU-2022:3897-1
- SUSE-SU-2022:3929-1
- SUSE-SU-2022:3930-1
- SUSE-SU-2022:3998-1
- SUSE-SU-2022:4053-1
- SUSE-SU-2022:4072-1
- SUSE-SU-2022:4272-1
- SUSE-SU-2022:4273-1
- SUSE-SU-2022:4520-1
- SUSE-SU-2022:4528-1
- SUSE-SU-2022:4550-1
- SUSE-SU-2022:4561-1
- SUSE-SU-2022:4562-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4574-1
- SUSE-SU-2022:4587-1
- SUSE-SU-2022:4589-1
- SUSE-SU-2022:4595-1
- SUSE-SU-2022:4611-1
- SUSE-SU-2022:4614-1
- SUSE-SU-2022:4615-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2024:2901-1
- SUSE-SU-2024:2929-1
- SUSE-SU-2024:2940-1
- SUSE-SU-2024:3249-1
- USN-5415-1
- USN-5417-1
- USN-5418-1
- USN-5650-1
- USN-6001-1
- USN-6013-1
- USN-6014-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2061700 | https://bugzilla.redhat.com/2061700 | |
Bugzilla | 2067482 | https://bugzilla.redhat.com/2067482 | |
RHSA | RHSA-2023:0400 | https://access.redhat.com/errata/RHSA-2023:0400 | |
CVE | CVE-2021-26401 | https://access.redhat.com/security/cve/CVE-2021-26401 | |
CVE | CVE-2022-2964 | https://access.redhat.com/security/cve/CVE-2022-2964 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-7 | redhat | kernel-rt | < 3.10.0-1160.83.1.rt56.1228.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-trace?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-trace | < 3.10.0-1160.83.1.rt56.1228.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-trace-kvm?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-trace-kvm | < 3.10.0-1160.83.1.rt56.1228.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-trace-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-trace-devel | < 3.10.0-1160.83.1.rt56.1228.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-kvm?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-kvm | < 3.10.0-1160.83.1.rt56.1228.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-doc?distro=redhat-7 | redhat | kernel-rt-doc | < 3.10.0-1160.83.1.rt56.1228.el7 | redhat-7 | ||
Affected | pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-devel | < 3.10.0-1160.83.1.rt56.1228.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-debug | < 3.10.0-1160.83.1.rt56.1228.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-kvm?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-debug-kvm | < 3.10.0-1160.83.1.rt56.1228.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-debug-devel | < 3.10.0-1160.83.1.rt56.1228.el7 | redhat-7 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |