[RHSA-2023:5091] kernel-rt security and bug fix update
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests (CVE-2023-3390)
kernel: netfilter: nf_tables: fix chain binding transaction logic in the abort path of NFT_MSG_NEWRULE (CVE-2023-3610)
kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function (CVE-2023-3776)
kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() (CVE-2023-4004)
kernel: netfilter: nf_tables_newrule when adding a rule with NFTA_RULE_CHAIN_ID leads to use-after-free (CVE-2023-4147)
kernel: nf_tables: use-after-free in nft_chain_lookup_byid() (CVE-2023-31248)
kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() (CVE-2023-35001)
kernel: save/restore speculative MSRs during S3 suspend/resume (CVE-2023-1637)
hw: amd: Cross-Process Information Leak (CVE-2023-20593)
kernel: bypass of shadow stack protection due to a logic error (CVE-2023-21102)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- kernel-rt: update RT source tree to the latest RHEL-9.2.z3 Batch (BZ#2228482)
- ID
- RHSA-2023:5091
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2023:5091
- Published
-
2023-09-12T00:00:00
(12 months ago) - Modified
-
2023-09-12T00:00:00
(12 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALAS-2022-1591
- ALAS-2023-1783
- ALAS-2023-1792
- ALAS-2023-1827
- ALAS2-2022-1793
- ALAS2-2023-2130
- ALAS2-2023-2179
- ALAS2-2023-2190
- ALAS2-2023-2268
- ALAS2-2024-2569
- ALPINE:CVE-2023-20593
- ALSA-2023:5068
- ALSA-2023:5069
- ALSA-2023:5244
- ALSA-2023:5245
- DSA-5448-1
- DSA-5453-1
- DSA-5459-1
- DSA-5461-1
- DSA-5462-1
- DSA-5480-1
- DSA-5492-1
- ELSA-2023-12654
- ELSA-2023-12655
- ELSA-2023-12656
- ELSA-2023-12657
- ELSA-2023-12689
- ELSA-2023-12690
- ELSA-2023-12691
- ELSA-2023-12692
- ELSA-2023-12836
- ELSA-2023-12839
- ELSA-2023-12842
- ELSA-2023-4819
- ELSA-2023-5068
- ELSA-2023-5069
- ELSA-2023-5244
- ELSA-2023-5622
- ELSA-2023-7423
- ELSA-2024-1831
- FEDORA-2023-04473fc41e
- FEDORA-2023-0d6aa10621
- FEDORA-2023-3661f028b8
- FEDORA-2023-7228464f28
- FEDORA-2023-e4e985b5dd
- MS:CVE-2023-3610
- MS:CVE-2023-3776
- MS:CVE-2023-4004
- MS:CVE-2023-4147
- RHSA-2023:4819
- RHSA-2023:4821
- RHSA-2023:5068
- RHSA-2023:5069
- RHSA-2023:5093
- RHSA-2023:5221
- RHSA-2023:5244
- RHSA-2023:5245
- RHSA-2023:5255
- RHSA-2023:5574
- RHSA-2023:5621
- RHSA-2023:5622
- RHSA-2023:7419
- RHSA-2023:7423
- RHSA-2023:7424
- RHSA-2023:7513
- RLSA-2023:5244
- SSA:2023-205-01
- SSA:2023-325-01
- SUSE-SU-2023:1802-1
- SUSE-SU-2023:1897-1
- SUSE-SU-2023:1992-1
- SUSE-SU-2023:2502-1
- SUSE-SU-2023:2611-1
- SUSE-SU-2023:2646-1
- SUSE-SU-2023:2651-1
- SUSE-SU-2023:2782-1
- SUSE-SU-2023:2804-1
- SUSE-SU-2023:2808-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:2820-1
- SUSE-SU-2023:2822-1
- SUSE-SU-2023:2830-1
- SUSE-SU-2023:2831-1
- SUSE-SU-2023:2871-1
- SUSE-SU-2023:2986-1
- SUSE-SU-2023:3001-1
- SUSE-SU-2023:3006-1
- SUSE-SU-2023:3019-1
- SUSE-SU-2023:3020-1
- SUSE-SU-2023:3022-1
- SUSE-SU-2023:3171-1
- SUSE-SU-2023:3172-1
- SUSE-SU-2023:3180-1
- SUSE-SU-2023:3182-1
- SUSE-SU-2023:3206-1
- SUSE-SU-2023:3302-1
- SUSE-SU-2023:3309-1
- SUSE-SU-2023:3311-1
- SUSE-SU-2023:3313-1
- SUSE-SU-2023:3318-1
- SUSE-SU-2023:3324-1
- SUSE-SU-2023:3329-1
- SUSE-SU-2023:3333-1
- SUSE-SU-2023:3349-1
- SUSE-SU-2023:3376-1
- SUSE-SU-2023:3377-1
- SUSE-SU-2023:3390-1
- SUSE-SU-2023:3391-1
- SUSE-SU-2023:3392-1
- SUSE-SU-2023:3395-1
- SUSE-SU-2023:3421-1
- SUSE-SU-2023:3446-1
- SUSE-SU-2023:3447-1
- SUSE-SU-2023:3494-1
- SUSE-SU-2023:3495-1
- SUSE-SU-2023:3496-1
- SUSE-SU-2023:3566-1
- SUSE-SU-2023:3571-1
- SUSE-SU-2023:3572-1
- SUSE-SU-2023:3576-1
- SUSE-SU-2023:3582-1
- SUSE-SU-2023:3585-1
- SUSE-SU-2023:3592-1
- SUSE-SU-2023:3594-1
- SUSE-SU-2023:3595-1
- SUSE-SU-2023:3596-1
- SUSE-SU-2023:3598-1
- SUSE-SU-2023:3599-1
- SUSE-SU-2023:3599-2
- SUSE-SU-2023:3600-1
- SUSE-SU-2023:3600-2
- SUSE-SU-2023:3603-1
- SUSE-SU-2023:3607-1
- SUSE-SU-2023:3612-1
- SUSE-SU-2023:3620-1
- SUSE-SU-2023:3621-1
- SUSE-SU-2023:3622-1
- SUSE-SU-2023:3623-1
- SUSE-SU-2023:3627-1
- SUSE-SU-2023:3628-1
- SUSE-SU-2023:3629-1
- SUSE-SU-2023:3630-1
- SUSE-SU-2023:3631-1
- SUSE-SU-2023:3632-1
- SUSE-SU-2023:3644-1
- SUSE-SU-2023:3647-1
- SUSE-SU-2023:3648-1
- SUSE-SU-2023:3653-1
- SUSE-SU-2023:3656-1
- SUSE-SU-2023:3657-1
- SUSE-SU-2023:3659-1
- SUSE-SU-2023:3668-1
- SUSE-SU-2023:3671-1
- SUSE-SU-2023:3675-1
- SUSE-SU-2023:3676-1
- SUSE-SU-2023:3677-1
- SUSE-SU-2023:3682-1
- SUSE-SU-2023:3683-1
- SUSE-SU-2023:3684-1
- SUSE-SU-2023:3704-1
- SUSE-SU-2023:3749-1
- SUSE-SU-2023:3768-1
- SUSE-SU-2023:3772-1
- SUSE-SU-2023:3773-1
- SUSE-SU-2023:3783-1
- SUSE-SU-2023:3784-1
- SUSE-SU-2023:3785-1
- SUSE-SU-2023:3786-1
- SUSE-SU-2023:3788-1
- SUSE-SU-2023:3809-1
- SUSE-SU-2023:3812-1
- SUSE-SU-2023:3838-1
- SUSE-SU-2023:3844-1
- SUSE-SU-2023:3846-1
- SUSE-SU-2023:3889-1
- SUSE-SU-2023:3892-1
- SUSE-SU-2023:3893-1
- SUSE-SU-2023:3894-1
- SUSE-SU-2023:3895-1
- SUSE-SU-2023:3902-1
- SUSE-SU-2023:3903-1
- SUSE-SU-2023:3922-1
- SUSE-SU-2023:3923-1
- SUSE-SU-2023:3924-1
- SUSE-SU-2023:3928-1
- SUSE-SU-2023:3964-1
- SUSE-SU-2023:3969-1
- SUSE-SU-2023:3971-1
- SUSE-SU-2023:3988-1
- SUSE-SU-2023:4095-1
- SUSE-SU-2023:4142-1
- SUSE-SU-2023:4165-1
- SUSE-SU-2023:4166-1
- SUSE-SU-2023:4175-1
- SUSE-SU-2023:4201-1
- SUSE-SU-2023:4219-1
- SUSE-SU-2023:4239-1
- SUSE-SU-2023:4245-1
- SUSE-SU-2023:4260-1
- SUSE-SU-2023:4261-1
- SUSE-SU-2023:4267-1
- SUSE-SU-2023:4279-1
- SUSE-SU-2023:4285-1
- SUSE-SU-2023:4301-1
- SUSE-SU-2023:4308-1
- SUSE-SU-2023:4322-1
- SUSE-SU-2023:4325-1
- SUSE-SU-2023:4326-1
- SUSE-SU-2023:4766-1
- SUSE-SU-2023:4805-1
- SUSE-SU-2023:4822-1
- SUSE-SU-2023:4841-1
- SUSE-SU-2023:4848-1
- SUSE-SU-2023:4849-1
- SUSE-SU-2023:4872-1
- SUSE-SU-2024:0884-1
- SUSE-SU-2024:0885-1
- SUSE-SU-2024:3190-1
- SUSE-SU-2024:3209-1
- USN-6079-1
- USN-6091-1
- USN-6096-1
- USN-6134-1
- USN-6244-1
- USN-6246-1
- USN-6247-1
- USN-6248-1
- USN-6250-1
- USN-6251-1
- USN-6252-1
- USN-6254-1
- USN-6255-1
- USN-6260-1
- USN-6261-1
- USN-6285-1
- USN-6309-1
- USN-6315-1
- USN-6316-1
- USN-6317-1
- USN-6318-1
- USN-6321-1
- USN-6324-1
- USN-6325-1
- USN-6327-1
- USN-6328-1
- USN-6329-1
- USN-6330-1
- USN-6331-1
- USN-6332-1
- USN-6341-1
- USN-6342-1
- USN-6342-2
- USN-6346-1
- USN-6348-1
- USN-6357-1
- USN-6385-1
- USN-6397-1
- USN-6442-1
- USN-6460-1
- USN-6532-1
- XSA-433
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt | < 5.14.0-284.30.1.rt14.315.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-modules?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-modules | < 5.14.0-284.30.1.rt14.315.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-modules-extra?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-modules-extra | < 5.14.0-284.30.1.rt14.315.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-modules-core?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-modules-core | < 5.14.0-284.30.1.rt14.315.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-kvm?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-kvm | < 5.14.0-284.30.1.rt14.315.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-devel | < 5.14.0-284.30.1.rt14.315.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-debug | < 5.14.0-284.30.1.rt14.315.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-modules?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-debug-modules | < 5.14.0-284.30.1.rt14.315.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-modules-extra?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-debug-modules-extra | < 5.14.0-284.30.1.rt14.315.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-modules-core?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-debug-modules-core | < 5.14.0-284.30.1.rt14.315.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-kvm?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-debug-kvm | < 5.14.0-284.30.1.rt14.315.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-debug-devel | < 5.14.0-284.30.1.rt14.315.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-core?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-debug-core | < 5.14.0-284.30.1.rt14.315.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-core?arch=x86_64&distro=redhat-9.2 | redhat | kernel-rt-core | < 5.14.0-284.30.1.rt14.315.el9_2 | redhat-9.2 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |