[RHSA-2023:7548] kernel-rt security update
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe (CVE-2023-2163)
kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags (CVE-2023-3812)
kernel: use after free in nvmet_tcp_free_crypto in NVMe (CVE-2023-5178)
kernel: use-after-free due to race condition occurring in dvb_register_device() (CVE-2022-45884)
kernel: use-after-free due to race condition occurring in dvb_net.c (CVE-2022-45886)
kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c (CVE-2022-45919)
kernel: use-after-free in smb2_is_status_io_timeout() (CVE-2023-1192)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- ID
- RHSA-2023:7548
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2023:7548
- Published
-
2023-11-28T00:00:00
(9 months ago) - Modified
-
2023-11-28T00:00:00
(9 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALSA-2023:7549
- DSA-5594-1
- ELSA-2023-12199
- ELSA-2023-12200
- ELSA-2023-12206
- ELSA-2023-12207
- ELSA-2023-13043
- ELSA-2023-13044
- ELSA-2023-13047
- ELSA-2023-13048
- ELSA-2023-13049
- ELSA-2023-7549
- ELSA-2023-7749
- ELSA-2024-0461
- ELSA-2024-12094
- MS:CVE-2023-1192
- MS:CVE-2023-3812
- MS:CVE-2023-5178
- RHSA-2023:7549
- RHSA-2023:7554
- RHSA-2024:0340
- RLSA-2023:7549
- SSA:2023-325-01
- SUSE-SU-2023:2500-1
- SUSE-SU-2023:2501-1
- SUSE-SU-2023:2502-1
- SUSE-SU-2023:2507-1
- SUSE-SU-2023:2534-1
- SUSE-SU-2023:2537-1
- SUSE-SU-2023:2538-1
- SUSE-SU-2023:2611-1
- SUSE-SU-2023:2646-1
- SUSE-SU-2023:2651-1
- SUSE-SU-2023:2653-1
- SUSE-SU-2023:2782-1
- SUSE-SU-2023:2805-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:2871-1
- SUSE-SU-2023:3171-1
- SUSE-SU-2023:3172-1
- SUSE-SU-2023:3180-1
- SUSE-SU-2023:3182-1
- SUSE-SU-2023:3302-1
- SUSE-SU-2023:3318-1
- SUSE-SU-2023:3333-1
- SUSE-SU-2023:3390-1
- SUSE-SU-2023:3391-1
- SUSE-SU-2023:3421-1
- SUSE-SU-2023:3601-1
- SUSE-SU-2023:3680-1
- SUSE-SU-2023:3681-1
- SUSE-SU-2023:3705-1
- SUSE-SU-2023:3748-1
- SUSE-SU-2023:3749-1
- SUSE-SU-2023:3768-1
- SUSE-SU-2023:3772-1
- SUSE-SU-2023:3783-1
- SUSE-SU-2023:3786-1
- SUSE-SU-2023:3788-1
- SUSE-SU-2023:3809-1
- SUSE-SU-2023:3811-1
- SUSE-SU-2023:3812-1
- SUSE-SU-2023:3838-1
- SUSE-SU-2023:3844-1
- SUSE-SU-2023:3846-1
- SUSE-SU-2023:3889-1
- SUSE-SU-2023:3892-1
- SUSE-SU-2023:3893-1
- SUSE-SU-2023:3928-1
- SUSE-SU-2023:3988-1
- SUSE-SU-2023:4028-1
- SUSE-SU-2023:4030-1
- SUSE-SU-2023:4031-1
- SUSE-SU-2023:4032-1
- SUSE-SU-2023:4033-1
- SUSE-SU-2023:4057-1
- SUSE-SU-2023:4058-1
- SUSE-SU-2023:4071-1
- SUSE-SU-2023:4072-1
- SUSE-SU-2023:4072-2
- SUSE-SU-2023:4093-1
- SUSE-SU-2023:4095-1
- SUSE-SU-2023:4142-1
- SUSE-SU-2023:4343-1
- SUSE-SU-2023:4345-1
- SUSE-SU-2023:4347-1
- SUSE-SU-2023:4348-1
- SUSE-SU-2023:4351-1
- SUSE-SU-2023:4358-1
- SUSE-SU-2023:4375-1
- SUSE-SU-2023:4377-1
- SUSE-SU-2023:4378-1
- SUSE-SU-2023:4414-1
- SUSE-SU-2023:4766-1
- SUSE-SU-2023:4775-1
- SUSE-SU-2023:4776-1
- SUSE-SU-2023:4796-1
- SUSE-SU-2023:4801-1
- SUSE-SU-2023:4802-1
- SUSE-SU-2023:4805-1
- SUSE-SU-2023:4817-1
- SUSE-SU-2023:4820-1
- SUSE-SU-2023:4822-1
- SUSE-SU-2023:4833-1
- SUSE-SU-2023:4835-1
- SUSE-SU-2023:4836-1
- SUSE-SU-2023:4839-1
- SUSE-SU-2023:4841-1
- SUSE-SU-2023:4848-1
- SUSE-SU-2023:4849-1
- SUSE-SU-2023:4862-1
- SUSE-SU-2023:4863-1
- SUSE-SU-2023:4866-1
- SUSE-SU-2023:4867-1
- SUSE-SU-2023:4871-1
- SUSE-SU-2023:4872-1
- SUSE-SU-2024:0331-1
- SUSE-SU-2024:0348-1
- SUSE-SU-2024:0352-1
- SUSE-SU-2024:0378-1
- SUSE-SU-2024:0395-1
- SUSE-SU-2024:0414-1
- SUSE-SU-2024:0421-1
- SUSE-SU-2024:1454-1
- SUSE-SU-2024:1489-1
- USN-6300-1
- USN-6311-1
- USN-6332-1
- USN-6340-1
- USN-6340-2
- USN-6347-1
- USN-6349-1
- USN-6357-1
- USN-6385-1
- USN-6397-1
- USN-6412-1
- USN-6466-1
- USN-6497-1
- USN-6534-1
- USN-6534-2
- USN-6534-3
- USN-6536-1
- USN-6537-1
- USN-6548-1
- USN-6548-2
- USN-6548-3
- USN-6548-4
- USN-6548-5
- USN-6549-1
- USN-6549-2
- USN-6549-3
- USN-6549-4
- USN-6549-5
- USN-6573-1
- USN-6635-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2148510 | https://bugzilla.redhat.com/2148510 | |
Bugzilla | 2148517 | https://bugzilla.redhat.com/2148517 | |
Bugzilla | 2151956 | https://bugzilla.redhat.com/2151956 | |
Bugzilla | 2154178 | https://bugzilla.redhat.com/2154178 | |
Bugzilla | 2224048 | https://bugzilla.redhat.com/2224048 | |
Bugzilla | 2240249 | https://bugzilla.redhat.com/2240249 | |
Bugzilla | 2241924 | https://bugzilla.redhat.com/2241924 | |
RHSA | RHSA-2023:7548 | https://access.redhat.com/errata/RHSA-2023:7548 | |
CVE | CVE-2022-45884 | https://access.redhat.com/security/cve/CVE-2022-45884 | |
CVE | CVE-2022-45886 | https://access.redhat.com/security/cve/CVE-2022-45886 | |
CVE | CVE-2022-45919 | https://access.redhat.com/security/cve/CVE-2022-45919 | |
CVE | CVE-2023-1192 | https://access.redhat.com/security/cve/CVE-2023-1192 | |
CVE | CVE-2023-2163 | https://access.redhat.com/security/cve/CVE-2023-2163 | |
CVE | CVE-2023-3812 | https://access.redhat.com/security/cve/CVE-2023-3812 | |
CVE | CVE-2023-5178 | https://access.redhat.com/security/cve/CVE-2023-5178 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-8.9 | redhat | kernel-rt | < 4.18.0-513.9.1.rt7.311.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-modules?arch=x86_64&distro=redhat-8.9 | redhat | kernel-rt-modules | < 4.18.0-513.9.1.rt7.311.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-modules-extra?arch=x86_64&distro=redhat-8.9 | redhat | kernel-rt-modules-extra | < 4.18.0-513.9.1.rt7.311.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-kvm?arch=x86_64&distro=redhat-8.9 | redhat | kernel-rt-kvm | < 4.18.0-513.9.1.rt7.311.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-8.9 | redhat | kernel-rt-devel | < 4.18.0-513.9.1.rt7.311.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-8.9 | redhat | kernel-rt-debug | < 4.18.0-513.9.1.rt7.311.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-modules?arch=x86_64&distro=redhat-8.9 | redhat | kernel-rt-debug-modules | < 4.18.0-513.9.1.rt7.311.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-modules-extra?arch=x86_64&distro=redhat-8.9 | redhat | kernel-rt-debug-modules-extra | < 4.18.0-513.9.1.rt7.311.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-kvm?arch=x86_64&distro=redhat-8.9 | redhat | kernel-rt-debug-kvm | < 4.18.0-513.9.1.rt7.311.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-8.9 | redhat | kernel-rt-debug-devel | < 4.18.0-513.9.1.rt7.311.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-core?arch=x86_64&distro=redhat-8.9 | redhat | kernel-rt-debug-core | < 4.18.0-513.9.1.rt7.311.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-core?arch=x86_64&distro=redhat-8.9 | redhat | kernel-rt-core | < 4.18.0-513.9.1.rt7.311.el8_9 | redhat-8.9 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |