{"type":"TYPE_SECURITY","shortCode":"RL","name":"RLSA-2023:4541","synopsis":"Important: kernel-rt security and bug fix update","severity":"SEVERITY_IMPORTANT","topic":"An update is available for kernel-rt.\nThis update affects Rocky Linux 8.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list","description":"The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net\/bluetooth\/l2cap_core.c (CVE-2022-42896)\n\n* kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281)\n\n* kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter (CVE-2023-1829)\n\n* kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events (CVE-2023-2235)\n\n* kernel: OOB access in the Linux kernel's XFS subsystem (CVE-2023-2124)\n\n* kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() (CVE-2023-2194)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Addding the building of i915 driver to 8.8 (BZ#2208276)\n\n* kernel-rt: update RT source tree to the Rocky Linux-8.8.z2 source tree (BZ#2215026)","solution":null,"affectedProducts":["Rocky Linux 8"],"fixes":[{"ticket":"2147364","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2147364","description":""},{"ticket":"2181847","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2181847","description":""},{"ticket":"2187439","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2187439","description":""},{"ticket":"2188396","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2188396","description":""},{"ticket":"2188470","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2188470","description":""},{"ticket":"2192589","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2192589","description":""}],"cves":[{"name":"CVE-2022-42896","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-42896","cvss3ScoringVector":"CVSS:3.1\/AV:A\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:N","cvss3BaseScore":"8.1","cwe":"CWE-416"},{"name":"CVE-2023-1281","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-1281","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.8","cwe":"CWE-416"},{"name":"CVE-2023-1829","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-1829","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.4","cwe":"CWE-119"},{"name":"CVE-2023-2124","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-2124","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.0","cwe":"CWE-125"},{"name":"CVE-2023-2194","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-2194","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"6.7","cwe":"CWE-787"},{"name":"CVE-2023-2235","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-2235","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.8","cwe":"CWE-416"}],"references":[],"publishedAt":"2023-10-14T02:07:34.384336Z","rpms":{"Rocky Linux 8":{"nvras":["kernel-rt-0:4.18.0-477.21.1.rt7.284.el8_8.src.rpm","kernel-rt-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm","kernel-rt-core-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm","kernel-rt-debug-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm","kernel-rt-debug-core-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm","kernel-rt-debug-debuginfo-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm","kernel-rt-debug-devel-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm","kernel-rt-debuginfo-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm","kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm","kernel-rt-debug-kvm-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm","kernel-rt-debug-modules-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm","kernel-rt-debug-modules-extra-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm","kernel-rt-devel-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm","kernel-rt-kvm-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm","kernel-rt-modules-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm","kernel-rt-modules-extra-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm"]}},"rebootSuggested":false,"buildReferences":[]}

Rocky Linux: RLSA-2023:4541 kernel-rt security and bug fix update

October 14, 2023
An update is available for kernel-rt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list

Summary

An update is available for kernel-rt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list


The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896) * kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281) * kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter (CVE-2023-1829) * kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events (CVE-2023-2235) * kernel: OOB access in the Linux kernel's XFS subsystem (CVE-2023-2124) * kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() (CVE-2023-2194) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Addding the building of i915 driver to 8.8 (BZ#2208276) * kernel-rt: update RT source tree to the Rocky Linux-8.8.z2 source tree (BZ#2215026)

RPMs

kernel-rt-0:4.18.0-477.21.1.rt7.284.el8_8.src.rpm

kernel-rt-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm

kernel-rt-core-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm

kernel-rt-debug-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm

kernel-rt-debug-core-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm

kernel-rt-debug-debuginfo-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm

kernel-rt-debug-devel-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm

kernel-rt-debuginfo-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm

kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm

kernel-rt-debug-kvm-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm

kernel-rt-debug-modules-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm

kernel-rt-debug-modules-extra-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm

kernel-rt-devel-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm

kernel-rt-kvm-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm

kernel-rt-modules-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm

kernel-rt-modules-extra-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm

References

No References

CVEs

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1281

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1829

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2194

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2235

Severity
Name: RLSA-2023:4541
Affected Products: Rocky Linux 8

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=2147364

https://bugzilla.redhat.com/show_bug.cgi?id=2181847

https://bugzilla.redhat.com/show_bug.cgi?id=2187439

https://bugzilla.redhat.com/show_bug.cgi?id=2188396

https://bugzilla.redhat.com/show_bug.cgi?id=2188470

https://bugzilla.redhat.com/show_bug.cgi?id=2192589


Related News