{"type":"TYPE_SECURITY","shortCode":"RL","name":"RLSA-2023:0979","synopsis":"Important: kernel-rt security and bug fix update","severity":"SEVERITY_IMPORTANT","topic":"An update is available for kernel-rt.\nThis update affects Rocky Linux 9.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list","description":"The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use-after-free caused by l2cap_reassemble_sdu() in net\/bluetooth\/l2cap_core.c (CVE-2022-3564)\n\n* kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)\n\n* kernel: use-after-free in __nfs42_ssc_open() in fs\/nfs\/nfs4file.c leading to remote Denial of Service attack (CVE-2022-4379)\n\n* kernel: Netfilter integer overflow vulnerability in nft_payload_copy_vlan (CVE-2023-0179)\n\n* kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest Rocky Linux-9.1.z2 Batch (BZ#2160463)","solution":null,"affectedProducts":["Rocky Linux 9"],"fixes":[{"ticket":"2119048","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2119048","description":""},{"ticket":"2150999","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2150999","description":""},{"ticket":"2152548","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2152548","description":""},{"ticket":"2152807","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2152807","description":""},{"ticket":"2161713","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2161713","description":""}],"cves":[{"name":"CVE-2022-2873","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-2873","cvss3ScoringVector":"UNKNOWN","cvss3BaseScore":"UNKNOWN","cwe":"UNKNOWN"},{"name":"CVE-2022-3564","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-3564","cvss3ScoringVector":"UNKNOWN","cvss3BaseScore":"UNKNOWN","cwe":"UNKNOWN"},{"name":"CVE-2022-4378","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-4378","cvss3ScoringVector":"UNKNOWN","cvss3BaseScore":"UNKNOWN","cwe":"UNKNOWN"},{"name":"CVE-2022-4379","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-4379","cvss3ScoringVector":"UNKNOWN","cvss3BaseScore":"UNKNOWN","cwe":"UNKNOWN"},{"name":"CVE-2023-0179","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-0179","cvss3ScoringVector":"UNKNOWN","cvss3BaseScore":"UNKNOWN","cwe":"UNKNOWN"}],"references":[],"publishedAt":"2023-03-02T01:17:39.649581Z","rpms":{"Rocky Linux 9":{"nvras":["kernel-rt-0:5.14.0-162.18.1.rt21.181.el9_1.src.rpm","kernel-rt-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm","kernel-rt-core-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm","kernel-rt-debug-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm","kernel-rt-debug-core-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm","kernel-rt-debug-debuginfo-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm","kernel-rt-debug-devel-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm","kernel-rt-debuginfo-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm","kernel-rt-debug-kvm-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm","kernel-rt-debug-modules-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm","kernel-rt-debug-modules-extra-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm","kernel-rt-devel-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm","kernel-rt-kvm-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm","kernel-rt-modules-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm","kernel-rt-modules-extra-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm"]}},"rebootSuggested":false,"buildReferences":[]}

Rocky Linux: RLSA-2023:0979 kernel-rt security and bug fix update

March 2, 2023
An update is available for kernel-rt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list

Summary

An update is available for kernel-rt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list


The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564) * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378) * kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack (CVE-2022-4379) * kernel: Netfilter integer overflow vulnerability in nft_payload_copy_vlan (CVE-2023-0179) * kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * kernel-rt: update RT source tree to the latest Rocky Linux-9.1.z2 Batch (BZ#2160463)

RPMs

kernel-rt-0:5.14.0-162.18.1.rt21.181.el9_1.src.rpm

kernel-rt-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm

kernel-rt-core-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm

kernel-rt-debug-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm

kernel-rt-debug-core-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm

kernel-rt-debug-debuginfo-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm

kernel-rt-debug-devel-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm

kernel-rt-debuginfo-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm

kernel-rt-debug-kvm-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm

kernel-rt-debug-modules-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm

kernel-rt-debug-modules-extra-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm

kernel-rt-devel-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm

kernel-rt-kvm-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm

kernel-rt-modules-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm

kernel-rt-modules-extra-0:5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm

References

No References

CVEs

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3564

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4378

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4379

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179

Severity
Name: RLSA-2023:0979
Affected Products: Rocky Linux 9

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=2119048

https://bugzilla.redhat.com/show_bug.cgi?id=2150999

https://bugzilla.redhat.com/show_bug.cgi?id=2152548

https://bugzilla.redhat.com/show_bug.cgi?id=2152807

https://bugzilla.redhat.com/show_bug.cgi?id=2161713


Related News