{"type":"TYPE_SECURITY","shortCode":"RL","name":"RLSA-2023:4378","synopsis":"Important: kernel-rt security and bug fix update","severity":"SEVERITY_IMPORTANT","topic":"An update is available for kernel-rt.\nThis update affects Rocky Linux 9.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list","description":"The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: ipvlan: out-of-bounds write caused by unclear skb->cb (CVE-2023-3090)\n\n* kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() (CVE-2023-35788)\n\n* kernel: KVM: x86\/mmu: race condition in direct_page_fault() (CVE-2022-45869)\n\n* kernel: speculative pointer dereference in do_prlimit() in kernel\/sys.c (CVE-2023-0458)\n\n* kernel: Spectre v2 SMT mitigations problem (CVE-2023-1998)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Rocky Linux9 rt: blktests block\/024 failed (BZ#2209920)\n\n* Backport pinned timers RT specific behavior for FIFO tasks (BZ#2210071)\n\n* kernel-rt: update RT source tree to the Rocky Linux-9.2z2 source tree (BZ#2215122)\n\n* kernel-rt: update RT source tree to the Rocky Linux-9.2z2b source tree (BZ#2222796)","solution":null,"affectedProducts":["Rocky Linux 9"],"fixes":[{"ticket":"2151317","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2151317","description":""},{"ticket":"2187257","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2187257","description":""},{"ticket":"2193219","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2193219","description":""},{"ticket":"2215768","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2215768","description":""},{"ticket":"2218672","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2218672","description":""}],"cves":[{"name":"CVE-2022-45869","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-45869","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"5.5","cwe":"CWE-362"},{"name":"CVE-2023-0458","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-0458","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:H\/I:N\/A:N","cvss3BaseScore":"4.7","cwe":"CWE-476"},{"name":"CVE-2023-1998","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-1998","cvss3ScoringVector":"CVSS:3.0\/AV:L\/AC:H\/PR:L\/UI:N\/S:C\/C:H\/I:N\/A:N","cvss3BaseScore":"5.6","cwe":"CWE-226->CWE-385->CWE-200"},{"name":"CVE-2023-3090","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-3090","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.8","cwe":"CWE-787"},{"name":"CVE-2023-35788","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-35788","cvss3ScoringVector":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.8","cwe":"CWE-787"}],"references":[],"publishedAt":"2023-08-08T12:34:53.910286Z","rpms":{"Rocky Linux 9":{"nvras":["kernel-rt-debug-modules-core-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm","kernel-rt-0:5.14.0-284.25.1.rt14.310.el9_2.src.rpm","kernel-rt-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm","kernel-rt-core-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm","kernel-rt-debug-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm","kernel-rt-debug-core-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm","kernel-rt-debug-debuginfo-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm","kernel-rt-debug-devel-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm","kernel-rt-debuginfo-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm","kernel-rt-debug-kvm-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm","kernel-rt-debug-modules-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm","kernel-rt-debug-modules-extra-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm","kernel-rt-devel-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm","kernel-rt-kvm-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm","kernel-rt-modules-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm","kernel-rt-modules-core-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm","kernel-rt-modules-extra-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm"]}},"rebootSuggested":false,"buildReferences":[]}

Rocky Linux: RLSA-2023:4378 kernel-rt security and bug fix update

August 8, 2023
An update is available for kernel-rt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list

Summary

An update is available for kernel-rt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list


The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: ipvlan: out-of-bounds write caused by unclear skb->cb (CVE-2023-3090) * kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() (CVE-2023-35788) * kernel: KVM: x86/mmu: race condition in direct_page_fault() (CVE-2022-45869) * kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c (CVE-2023-0458) * kernel: Spectre v2 SMT mitigations problem (CVE-2023-1998) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rocky Linux9 rt: blktests block/024 failed (BZ#2209920) * Backport pinned timers RT specific behavior for FIFO tasks (BZ#2210071) * kernel-rt: update RT source tree to the Rocky Linux-9.2z2 source tree (BZ#2215122) * kernel-rt: update RT source tree to the Rocky Linux-9.2z2b source tree (BZ#2222796)

RPMs

kernel-rt-debug-modules-core-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm

kernel-rt-0:5.14.0-284.25.1.rt14.310.el9_2.src.rpm

kernel-rt-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm

kernel-rt-core-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm

kernel-rt-debug-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm

kernel-rt-debug-core-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm

kernel-rt-debug-debuginfo-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm

kernel-rt-debug-devel-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm

kernel-rt-debuginfo-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm

kernel-rt-debug-kvm-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm

kernel-rt-debug-modules-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm

kernel-rt-debug-modules-extra-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm

kernel-rt-devel-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm

kernel-rt-kvm-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm

kernel-rt-modules-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm

kernel-rt-modules-core-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm

kernel-rt-modules-extra-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm

References

No References

CVEs

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45869

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0458

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1998

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788

Severity
Name: RLSA-2023:4378
Affected Products: Rocky Linux 9

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=2151317

https://bugzilla.redhat.com/show_bug.cgi?id=2187257

https://bugzilla.redhat.com/show_bug.cgi?id=2193219

https://bugzilla.redhat.com/show_bug.cgi?id=2215768

https://bugzilla.redhat.com/show_bug.cgi?id=2218672


Related News