Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:1110: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-4378: A stack overflow flaw was found in the Linux kernel’s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Red Hat Security Data
#vulnerability#web#linux#red_hat#nodejs#js#java#kubernetes#aws

Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager

All Products

Issued:

2023-03-07

Updated:

2023-03-07

RHSA-2023:1110 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel-rt security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • kernel-rt: update RT source tree to the latest RHEL-8.2.z24 Batch (BZ#2166667)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64
  • Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64

Fixes

  • BZ - 2152548 - CVE-2022-4378 kernel: stack overflow in do_proc_dointvec and proc_skip_spaces

Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2

SRPM

kernel-rt-4.18.0-193.100.1.rt13.151.el8_2.src.rpm

SHA-256: 74627b1793c5ee347e99a024dc00f29b22c1e353d4a8f156ff166c503ac8394f

x86_64

kernel-rt-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: 570e7f69ebd89674850316cf86730b705881506dc80c4e3ba9320d9ec3771e8f

kernel-rt-core-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: a75306c6852b779c325dedba252a91196b10094807d2f36379c07a4cdb91370b

kernel-rt-debug-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: 2c6c5db71f2fed1b90da6390a06dcfef0fe6601a0fb4bd9e7386c9a9a05cbaf7

kernel-rt-debug-core-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: 0f3964e5b26742b0743794478b40d1d62009cd3e724572c41be00c6cda4ddf81

kernel-rt-debug-debuginfo-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: d5d4f5001d590ef33762e8a4bbc617087ac57f2f043adb782f9953412fa547b6

kernel-rt-debug-devel-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: 374c6409a56555420e51f57768c2848dd9aeb959f22f932e027df9221dcccbd8

kernel-rt-debug-modules-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: b0ba077039fe1f1a575e38e4618cece3ce4c7488f8aca000605fbdc46698ccaa

kernel-rt-debug-modules-extra-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: 25000ee4d8e38cef7efc32022ef68099f79cc0e0cb1a0854d464740f995f5cad

kernel-rt-debuginfo-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: 42f8ccc8c49d634ba81ef6e13c85bd32810dcdbfce4fd544d56f3f9aebc97d80

kernel-rt-debuginfo-common-x86_64-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: 037cc9542435a399268d89b9abdc664a62d3e8586a88a7a9a3baacec487553ba

kernel-rt-devel-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: 8b49fa45de2ec4403fe0a723e7e7912b7c35546054d140d77914800c9936ec3c

kernel-rt-modules-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: 07fe320d27d2583039ca37071d1bd0fe6b24a9263fad671f414ba1b8c636276e

kernel-rt-modules-extra-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: 6ad607e875f074dd4cd45cb8eef22cbd5b70989d8d642ab1efbebe6a9e687335

Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2

SRPM

kernel-rt-4.18.0-193.100.1.rt13.151.el8_2.src.rpm

SHA-256: 74627b1793c5ee347e99a024dc00f29b22c1e353d4a8f156ff166c503ac8394f

x86_64

kernel-rt-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: 570e7f69ebd89674850316cf86730b705881506dc80c4e3ba9320d9ec3771e8f

kernel-rt-core-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: a75306c6852b779c325dedba252a91196b10094807d2f36379c07a4cdb91370b

kernel-rt-debug-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: 2c6c5db71f2fed1b90da6390a06dcfef0fe6601a0fb4bd9e7386c9a9a05cbaf7

kernel-rt-debug-core-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: 0f3964e5b26742b0743794478b40d1d62009cd3e724572c41be00c6cda4ddf81

kernel-rt-debug-debuginfo-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: d5d4f5001d590ef33762e8a4bbc617087ac57f2f043adb782f9953412fa547b6

kernel-rt-debug-devel-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: 374c6409a56555420e51f57768c2848dd9aeb959f22f932e027df9221dcccbd8

kernel-rt-debug-kvm-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: edc42ecd9b15e6a4cc787759b3721870a28c04fccc3093b2f37f08fcdaae7625

kernel-rt-debug-modules-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: b0ba077039fe1f1a575e38e4618cece3ce4c7488f8aca000605fbdc46698ccaa

kernel-rt-debug-modules-extra-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: 25000ee4d8e38cef7efc32022ef68099f79cc0e0cb1a0854d464740f995f5cad

kernel-rt-debuginfo-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: 42f8ccc8c49d634ba81ef6e13c85bd32810dcdbfce4fd544d56f3f9aebc97d80

kernel-rt-debuginfo-common-x86_64-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: 037cc9542435a399268d89b9abdc664a62d3e8586a88a7a9a3baacec487553ba

kernel-rt-devel-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: 8b49fa45de2ec4403fe0a723e7e7912b7c35546054d140d77914800c9936ec3c

kernel-rt-kvm-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: 2b554a6a040a11e3bc52283ad63f2b6a63d5208c95627de0f8e75611c31021e1

kernel-rt-modules-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: 07fe320d27d2583039ca37071d1bd0fe6b24a9263fad671f414ba1b8c636276e

kernel-rt-modules-extra-4.18.0-193.100.1.rt13.151.el8_2.x86_64.rpm

SHA-256: 6ad607e875f074dd4cd45cb8eef22cbd5b70989d8d642ab1efbebe6a9e687335

The Red Hat security contact is [email protected]. More contact details at https://access.redhat.com/security/team/contact/.

Related news

CVE-2022-43908: Security Bulletin: IBM Security Guardium is affected by several vulnerabilities

IBM Security Guardium 11.3 could allow an authenticated user to cause a denial of service due to improper input validation. IBM X-Force ID: 240903.

Red Hat Security Advisory 2023-3431-01

Red Hat Security Advisory 2023-3431-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

CVE-2023-23694: DSA-2023-071: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities – 7.0.450

Dell VxRail versions earlier than 7.0.450, contain(s) an OS command injection vulnerability in VxRail Manager. A local authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.

Red Hat Security Advisory 2023-2104-01

Red Hat Security Advisory 2023-2104-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.8 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-1953-01

Red Hat Security Advisory 2023-1953-01 - Red Hat OpenShift Logging Subsystem 5.6.5 update. Issues addressed include cross site scripting and denial of service vulnerabilities.

Red Hat Security Advisory 2023-1659-01

Red Hat Security Advisory 2023-1659-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

RHSA-2023:1584: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4269: A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of...

RHSA-2023:1393: Red Hat Security Advisory: OpenShift Container Platform 4.10.55 security update

Red Hat OpenShift Container Platform release 4.10.55 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4238: A flaw was found in goutils where randomly generated alphanumeric strings contain significantly less entropy than expected. Both the `RandomAlphaNumeric` and `CryptoRandomAlphaNumeric` functions always return strings containing at least one digit from 0 to 9. This issu...

Red Hat Security Advisory 2023-1202-01

Red Hat Security Advisory 2023-1202-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service, integer overflow, and use-after-free vulnerabilities.

RHSA-2023:1251: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4378: A stack ove...

RHSA-2023:1220: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4269: A flaw was fou...

RHSA-2023:1203: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4269: A flaw was fou...

Red Hat Security Advisory 2023-1091-01

Red Hat Security Advisory 2023-1091-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-1092-01

Red Hat Security Advisory 2023-1092-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-0945-01

Red Hat Security Advisory 2023-0945-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

RHSA-2023:0944: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalat...

Red Hat Security Advisory 2023-0858-01

Red Hat Security Advisory 2023-0858-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

Ubuntu Security Notice USN-5879-1

Ubuntu Security Notice 5879-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5814-1

Ubuntu Security Notice 5814-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5809-1

Ubuntu Security Notice 5809-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5799-1

Ubuntu Security Notice 5799-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code.

CVE-2022-4378: Linux kernel stack-based buffer overflow

A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.