An update is available for kernel-rt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896) * kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281) * kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter (CVE-2023-1829) * kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events (CVE-2023-2235) * kernel: OOB access in the Linux kernel's XFS subsystem (CVE-2023-2124) * kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() (CVE-2023-2194) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Addding the building of i915 driver to 8.8 (BZ#2208276) * kernel-rt: update RT source tree to the Rocky Linux-8.8.z2 source tree (BZ#2215026)
kernel-rt-0:4.18.0-477.21.1.rt7.284.el8_8.src.rpm
kernel-rt-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm
kernel-rt-core-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm
kernel-rt-debug-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm
kernel-rt-debug-core-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm
kernel-rt-debug-debuginfo-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm
kernel-rt-debug-devel-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm
kernel-rt-debuginfo-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm
kernel-rt-debuginfo-common-x86_64-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm
kernel-rt-debug-kvm-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm
kernel-rt-debug-modules-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm
kernel-rt-debug-modules-extra-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm
kernel-rt-devel-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm
kernel-rt-kvm-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm
kernel-rt-modules-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm
kernel-rt-modules-extra-0:4.18.0-477.21.1.rt7.284.el8_8.x86_64.rpm
No References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1281
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2235
https://bugzilla.redhat.com/show_bug.cgi?id=2147364
https://bugzilla.redhat.com/show_bug.cgi?id=2181847
https://bugzilla.redhat.com/show_bug.cgi?id=2187439
https://bugzilla.redhat.com/show_bug.cgi?id=2188396
https://bugzilla.redhat.com/show_bug.cgi?id=2188470
https://bugzilla.redhat.com/show_bug.cgi?id=2192589