[RHSA-2023:3708] kernel-rt security and bug fix update
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events (CVE-2023-2235)
kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)
Kernel: bluetooth: Unauthorized management command execution (CVE-2023-2002)
kernel: OOB access in the Linux kernel's XFS subsystem (CVE-2023-2124)
kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() (CVE-2023-2194)
kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference (CVE-2023-28466)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
[RT] Single Node Openshift cluster becomes unreachable after running less than 2 hours (BZ#2186853)
kernel-rt: update RT source tree to the latest RHEL-9.2.z1 Batch (BZ#2188313)
- ID
- RHSA-2023:3708
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2023:3708
- Published
-
2023-06-21T00:00:00
(15 months ago) - Modified
-
2023-06-21T00:00:00
(15 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALAS-2023-1735
- ALAS-2023-1750
- ALAS-2023-1773
- ALAS2-2023-2027
- ALAS2-2023-2050
- ALAS2-2023-2100
- ALPINE:CVE-2023-32233
- ALSA-2023:3349
- ALSA-2023:3723
- ALSA-2023:3819
- ALSA-2023:3847
- ALSA-2023:4517
- ALSA-2023:5244
- DSA-5402-1
- DSA-5448-1
- DSA-5480-1
- ELSA-2023-12393
- ELSA-2023-12394
- ELSA-2023-12412
- ELSA-2023-12413
- ELSA-2023-3349
- ELSA-2023-3723
- ELSA-2023-3847
- ELSA-2023-4517
- ELSA-2023-5244
- ELSA-2023-5622
- ELSA-2024-2004
- FEDORA-2023-00393126a0
- FEDORA-2023-26325e5399
- FEDORA-2023-dfd4a6e8f2
- MS:CVE-2023-2235
- RHSA-2023:3349
- RHSA-2023:3350
- RHSA-2023:3351
- RHSA-2023:3705
- RHSA-2023:3723
- RHSA-2023:3819
- RHSA-2023:3847
- RHSA-2023:4517
- RHSA-2023:4541
- RHSA-2023:5244
- RHSA-2023:5255
- RHSA-2023:5574
- RHSA-2023:5621
- RHSA-2023:5622
- RHSA-2024:2003
- RHSA-2024:2004
- RLSA-2023:3847
- RLSA-2023:4517
- RLSA-2023:5244
- SSA:2023-172-02
- SSA:2023-325-01
- SUSE-SU-2023:1800-1
- SUSE-SU-2023:1802-1
- SUSE-SU-2023:1811-1
- SUSE-SU-2023:1892-1
- SUSE-SU-2023:1897-1
- SUSE-SU-2023:1992-1
- SUSE-SU-2023:2140-1
- SUSE-SU-2023:2141-1
- SUSE-SU-2023:2147-1
- SUSE-SU-2023:2148-1
- SUSE-SU-2023:2151-1
- SUSE-SU-2023:2156-1
- SUSE-SU-2023:2162-1
- SUSE-SU-2023:2163-1
- SUSE-SU-2023:2231-1
- SUSE-SU-2023:2232-1
- SUSE-SU-2023:2500-1
- SUSE-SU-2023:2501-1
- SUSE-SU-2023:2502-1
- SUSE-SU-2023:2507-1
- SUSE-SU-2023:2534-1
- SUSE-SU-2023:2537-1
- SUSE-SU-2023:2538-1
- SUSE-SU-2023:2611-1
- SUSE-SU-2023:2646-1
- SUSE-SU-2023:2651-1
- SUSE-SU-2023:2653-1
- SUSE-SU-2023:2679-1
- SUSE-SU-2023:2680-1
- SUSE-SU-2023:2681-1
- SUSE-SU-2023:2686-1
- SUSE-SU-2023:2687-1
- SUSE-SU-2023:2689-1
- SUSE-SU-2023:2694-1
- SUSE-SU-2023:2695-1
- SUSE-SU-2023:2697-1
- SUSE-SU-2023:2698-1
- SUSE-SU-2023:2701-1
- SUSE-SU-2023:2702-1
- SUSE-SU-2023:2703-1
- SUSE-SU-2023:2710-1
- SUSE-SU-2023:2714-1
- SUSE-SU-2023:2718-1
- SUSE-SU-2023:2719-1
- SUSE-SU-2023:2721-1
- SUSE-SU-2023:2724-1
- SUSE-SU-2023:2727-1
- SUSE-SU-2023:2731-1
- SUSE-SU-2023:2735-1
- SUSE-SU-2023:2741-1
- SUSE-SU-2023:2743-1
- SUSE-SU-2023:2755-1
- SUSE-SU-2023:2782-1
- SUSE-SU-2023:2804-1
- SUSE-SU-2023:2805-1
- SUSE-SU-2023:2808-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:2810-1
- SUSE-SU-2023:2822-1
- SUSE-SU-2023:2830-1
- SUSE-SU-2023:2834-1
- SUSE-SU-2023:2859-1
- SUSE-SU-2023:2871-1
- SUSE-SU-2023:3035-1
- SUSE-SU-2023:3036-1
- SUSE-SU-2023:3046-1
- SUSE-SU-2023:3055-1
- SUSE-SU-2023:3063-1
- SUSE-SU-2023:3069-1
- SUSE-SU-2023:3073-1
- SUSE-SU-2023:3075-1
- SUSE-SU-2023:3076-1
- SUSE-SU-2023:3079-1
- SUSE-SU-2023:3081-1
- SUSE-SU-2023:3083-1
- SUSE-SU-2023:3104-1
- SUSE-SU-2023:3107-1
- SUSE-SU-2023:3111-1
- SUSE-SU-2023:3116-1
- SUSE-SU-2023:3153-1
- SUSE-SU-2023:3594-1
- SUSE-SU-2023:3595-1
- SUSE-SU-2023:3607-1
- SUSE-SU-2023:3612-1
- SUSE-SU-2023:3620-1
- SUSE-SU-2023:3623-1
- SUSE-SU-2023:3627-1
- SUSE-SU-2023:3628-1
- SUSE-SU-2023:3630-1
- SUSE-SU-2023:3644-1
- SUSE-SU-2023:3647-1
- SUSE-SU-2023:3648-1
- SUSE-SU-2023:3668-1
- SUSE-SU-2023:3671-1
- SUSE-SU-2023:3675-1
- USN-6033-1
- USN-6122-1
- USN-6123-1
- USN-6124-1
- USN-6127-1
- USN-6130-1
- USN-6131-1
- USN-6132-1
- USN-6135-1
- USN-6149-1
- USN-6150-1
- USN-6162-1
- USN-6173-1
- USN-6175-1
- USN-6186-1
- USN-6206-1
- USN-6222-1
- USN-6224-1
- USN-6228-1
- USN-6231-1
- USN-6235-1
- USN-6252-1
- USN-6254-1
- USN-6256-1
- USN-6283-1
- USN-6284-1
- USN-6300-1
- USN-6301-1
- USN-6311-1
- USN-6312-1
- USN-6314-1
- USN-6331-1
- USN-6332-1
- USN-6337-1
- USN-6340-1
- USN-6340-2
- USN-6347-1
- USN-6349-1
- USN-6357-1
- USN-6385-1
- USN-6397-1
- USN-6701-1
- USN-6701-2
- USN-6701-3
- USN-6701-4
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2179000 | https://bugzilla.redhat.com/2179000 | |
Bugzilla | 2187308 | https://bugzilla.redhat.com/2187308 | |
Bugzilla | 2187439 | https://bugzilla.redhat.com/2187439 | |
Bugzilla | 2188396 | https://bugzilla.redhat.com/2188396 | |
Bugzilla | 2192589 | https://bugzilla.redhat.com/2192589 | |
Bugzilla | 2196105 | https://bugzilla.redhat.com/2196105 | |
RHSA | RHSA-2023:3708 | https://access.redhat.com/errata/RHSA-2023:3708 | |
CVE | CVE-2023-2002 | https://access.redhat.com/security/cve/CVE-2023-2002 | |
CVE | CVE-2023-2124 | https://access.redhat.com/security/cve/CVE-2023-2124 | |
CVE | CVE-2023-2194 | https://access.redhat.com/security/cve/CVE-2023-2194 | |
CVE | CVE-2023-2235 | https://access.redhat.com/security/cve/CVE-2023-2235 | |
CVE | CVE-2023-28466 | https://access.redhat.com/security/cve/CVE-2023-28466 | |
CVE | CVE-2023-32233 | https://access.redhat.com/security/cve/CVE-2023-32233 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt | < 5.14.0-284.18.1.rt14.303.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-modules?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-modules | < 5.14.0-284.18.1.rt14.303.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-modules-extra?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-modules-extra | < 5.14.0-284.18.1.rt14.303.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-modules-core?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-modules-core | < 5.14.0-284.18.1.rt14.303.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-kvm?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-kvm | < 5.14.0-284.18.1.rt14.303.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-devel | < 5.14.0-284.18.1.rt14.303.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-debug | < 5.14.0-284.18.1.rt14.303.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-modules?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-debug-modules | < 5.14.0-284.18.1.rt14.303.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-modules-extra?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-debug-modules-extra | < 5.14.0-284.18.1.rt14.303.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-modules-core?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-debug-modules-core | < 5.14.0-284.18.1.rt14.303.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-kvm?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-debug-kvm | < 5.14.0-284.18.1.rt14.303.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-debug-devel | < 5.14.0-284.18.1.rt14.303.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-core?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-debug-core | < 5.14.0-284.18.1.rt14.303.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-core?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-core | < 5.14.0-284.18.1.rt14.303.el9_2 | redhat-9.2 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |