[RHSA-2023:1092] kernel-rt security and bug fix update
Severity
Important
Affected Packages
10
CVEs
2
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)
kernel: use-after-free related to leaf anon_vma double reuse (CVE-2022-42703)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- kernel-rt: update to the latest RHEL7.9.z21 source tree (BZ#2159523)
Package | Affected Version |
---|---|
pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.88.1.rt56.1233.el7 |
pkg:rpm/redhat/kernel-rt-trace?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.88.1.rt56.1233.el7 |
pkg:rpm/redhat/kernel-rt-trace-kvm?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.88.1.rt56.1233.el7 |
pkg:rpm/redhat/kernel-rt-trace-devel?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.88.1.rt56.1233.el7 |
pkg:rpm/redhat/kernel-rt-kvm?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.88.1.rt56.1233.el7 |
pkg:rpm/redhat/kernel-rt-doc?distro=redhat-7 | < 3.10.0-1160.88.1.rt56.1233.el7 |
pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.88.1.rt56.1233.el7 |
pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.88.1.rt56.1233.el7 |
pkg:rpm/redhat/kernel-rt-debug-kvm?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.88.1.rt56.1233.el7 |
pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-7 | < 3.10.0-1160.88.1.rt56.1233.el7 |
- ID
- RHSA-2023:1092
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2023:1092
- Published
-
2023-03-07T00:00:00
(18 months ago) - Modified
-
2023-03-07T00:00:00
(18 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALAS2-2022-1852
- ALSA-2023:0951
- ALSA-2023:1566
- ALSA-2023:2458
- ALSA-2023:2951
- ELSA-2022-10071
- ELSA-2022-10072
- ELSA-2022-10073
- ELSA-2022-10078
- ELSA-2022-10079
- ELSA-2022-10080
- ELSA-2022-10081
- ELSA-2022-10108
- ELSA-2023-0951
- ELSA-2023-1091
- ELSA-2023-12006
- ELSA-2023-12007
- ELSA-2023-12008
- ELSA-2023-12009
- ELSA-2023-12017
- ELSA-2023-12018
- ELSA-2023-1566
- ELSA-2023-1822
- ELSA-2023-2458
- ELSA-2023-2951
- MS:CVE-2022-42703
- MS:CVE-2022-4378
- RHSA-2023:0951
- RHSA-2023:0979
- RHSA-2023:1008
- RHSA-2023:1091
- RHSA-2023:1101
- RHSA-2023:1566
- RHSA-2023:1584
- RHSA-2023:1659
- RHSA-2023:2148
- RHSA-2023:2458
- RHSA-2023:2736
- RHSA-2023:2951
- RLSA-2023:1566
- SSA:2022-333-01
- SSA:2023-048-01
- SUSE-SU-2022:3897-1
- SUSE-SU-2022:3929-1
- SUSE-SU-2022:3998-1
- SUSE-SU-2022:4024-1
- SUSE-SU-2022:4027-1
- SUSE-SU-2022:4030-1
- SUSE-SU-2022:4033-1
- SUSE-SU-2022:4034-1
- SUSE-SU-2022:4035-1
- SUSE-SU-2022:4039-1
- SUSE-SU-2022:4053-1
- SUSE-SU-2022:4072-1
- SUSE-SU-2022:4100-1
- SUSE-SU-2022:4112-1
- SUSE-SU-2022:4113-1
- SUSE-SU-2022:4129-1
- SUSE-SU-2022:4272-1
- SUSE-SU-2022:4273-1
- SUSE-SU-2022:4503-1
- SUSE-SU-2022:4504-1
- SUSE-SU-2022:4505-1
- SUSE-SU-2022:4506-1
- SUSE-SU-2022:4510-1
- SUSE-SU-2022:4513-1
- SUSE-SU-2022:4515-1
- SUSE-SU-2022:4516-1
- SUSE-SU-2022:4517-1
- SUSE-SU-2022:4518-1
- SUSE-SU-2022:4520-1
- SUSE-SU-2022:4527-1
- SUSE-SU-2022:4528-1
- SUSE-SU-2022:4533-1
- SUSE-SU-2022:4534-1
- SUSE-SU-2022:4539-1
- SUSE-SU-2022:4542-1
- SUSE-SU-2022:4543-1
- SUSE-SU-2022:4544-1
- SUSE-SU-2022:4545-1
- SUSE-SU-2022:4546-1
- SUSE-SU-2022:4550-1
- SUSE-SU-2022:4551-1
- SUSE-SU-2022:4559-1
- SUSE-SU-2022:4560-1
- SUSE-SU-2022:4561-1
- SUSE-SU-2022:4562-1
- SUSE-SU-2022:4566-1
- SUSE-SU-2022:4569-1
- SUSE-SU-2022:4572-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4574-1
- SUSE-SU-2022:4577-1
- SUSE-SU-2022:4580-1
- SUSE-SU-2022:4585-1
- SUSE-SU-2022:4587-1
- SUSE-SU-2022:4589-1
- SUSE-SU-2022:4595-1
- SUSE-SU-2022:4611-1
- SUSE-SU-2022:4613-1
- SUSE-SU-2022:4614-1
- SUSE-SU-2022:4615-1
- SUSE-SU-2022:4616-1
- SUSE-SU-2022:4617-1
- USN-5728-1
- USN-5728-2
- USN-5728-3
- USN-5755-1
- USN-5755-2
- USN-5756-1
- USN-5756-2
- USN-5756-3
- USN-5757-1
- USN-5757-2
- USN-5758-1
- USN-5773-1
- USN-5774-1
- USN-5779-1
- USN-5789-1
- USN-5799-1
- USN-5803-1
- USN-5809-1
- USN-5814-1
- USN-5831-1
- USN-5832-1
- USN-5860-1
- USN-5877-1
- USN-5879-1
- USN-5883-1
- USN-5916-1
- USN-5919-1
- USN-5920-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2133483 | https://bugzilla.redhat.com/2133483 | |
Bugzilla | 2152548 | https://bugzilla.redhat.com/2152548 | |
RHSA | RHSA-2023:1092 | https://access.redhat.com/errata/RHSA-2023:1092 | |
CVE | CVE-2022-42703 | https://access.redhat.com/security/cve/CVE-2022-42703 | |
CVE | CVE-2022-4378 | https://access.redhat.com/security/cve/CVE-2022-4378 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-7 | redhat | kernel-rt | < 3.10.0-1160.88.1.rt56.1233.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-trace?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-trace | < 3.10.0-1160.88.1.rt56.1233.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-trace-kvm?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-trace-kvm | < 3.10.0-1160.88.1.rt56.1233.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-trace-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-trace-devel | < 3.10.0-1160.88.1.rt56.1233.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-kvm?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-kvm | < 3.10.0-1160.88.1.rt56.1233.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-doc?distro=redhat-7 | redhat | kernel-rt-doc | < 3.10.0-1160.88.1.rt56.1233.el7 | redhat-7 | ||
Affected | pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-devel | < 3.10.0-1160.88.1.rt56.1233.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-debug | < 3.10.0-1160.88.1.rt56.1233.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-kvm?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-debug-kvm | < 3.10.0-1160.88.1.rt56.1233.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-7 | redhat | kernel-rt-debug-devel | < 3.10.0-1160.88.1.rt56.1233.el7 | redhat-7 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |