Headline
RHSA-2023:1980: Red Hat Security Advisory: kernel-rt security and bug fix update
An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2023-0386: A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
Skip to navigation Skip to main content
Utilities
- Subscriptions
- Downloads
- Containers
- Support Cases
Infrastructure and Management
- Red Hat Enterprise Linux
- Red Hat Virtualization
- Red Hat Identity Management
- Red Hat Directory Server
- Red Hat Certificate System
- Red Hat Satellite
- Red Hat Subscription Management
- Red Hat Update Infrastructure
- Red Hat Insights
- Red Hat Ansible Automation Platform
Cloud Computing
- Red Hat OpenShift
- Red Hat CloudForms
- Red Hat OpenStack Platform
- Red Hat OpenShift Container Platform
- Red Hat OpenShift Data Science
- Red Hat OpenShift Online
- Red Hat OpenShift Dedicated
- Red Hat Advanced Cluster Security for Kubernetes
- Red Hat Advanced Cluster Management for Kubernetes
- Red Hat Quay
- Red Hat CodeReady Workspaces
- Red Hat OpenShift Service on AWS
Storage
- Red Hat Gluster Storage
- Red Hat Hyperconverged Infrastructure
- Red Hat Ceph Storage
- Red Hat OpenShift Data Foundation
Runtimes
- Red Hat Runtimes
- Red Hat JBoss Enterprise Application Platform
- Red Hat Data Grid
- Red Hat JBoss Web Server
- Red Hat Single Sign On
- Red Hat support for Spring Boot
- Red Hat build of Node.js
- Red Hat build of Thorntail
- Red Hat build of Eclipse Vert.x
- Red Hat build of OpenJDK
- Red Hat build of Quarkus
Integration and Automation
- Red Hat Process Automation
- Red Hat Process Automation Manager
- Red Hat Decision Manager
All Products
Issued:
2023-04-25
Updated:
2023-04-25
RHSA-2023:1980 - Security Advisory
- Overview
- Updated Packages
Synopsis
Important: kernel-rt security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
- kernel: FUSE filesystem low-privileged user privileges escalation (CVE-2023-0386)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- kernel-rt: update RT source tree to the latest RHEL-9.0.z8 Batch (BZ#2182175)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.0 x86_64
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.0 x86_64
Fixes
- BZ - 2159505 - CVE-2023-0386 kernel: FUSE filesystem low-privileged user privileges escalation
Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.0
SRPM
kernel-rt-5.14.0-70.53.1.rt21.124.el9_0.src.rpm
SHA-256: b051055a0d9fa676ae0668dfe0b0e95035990c28be594c0265f0a8aec3430d52
x86_64
kernel-rt-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: 2aef791cf8f31f619b71e5fdbe6ba3052e2f53ed73d4890b495167603e8221d5
kernel-rt-core-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: c387c898ce6eea80fea02b9582ef553250950281e6304610b461bbbe3fb4e53b
kernel-rt-debug-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: e2148092d24d3b99cca8732479a6408ce56bdb29b8223902d6a32ed3a690b11b
kernel-rt-debug-core-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: 723e42d66ce4bc9be86b7352f5b491a2730873c9e9105d8191639c7803109740
kernel-rt-debug-debuginfo-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: bc0afc336ce83ac7ff564c8c70e3b2b77355fd6d9a8c5e5b659b81cf1214cadc
kernel-rt-debug-devel-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: c021eaea4c47fc2032ecdd4d683405bf486175377b60379cabb68b713772128c
kernel-rt-debug-modules-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: 3fd414c653bb4a5659b434707212a67331ff4e559c048ed21d42f78ce054a5c9
kernel-rt-debug-modules-extra-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: cf0ff35494131991857380cf33242ee95fe65d6f0b2e771d6b439de877489ac7
kernel-rt-debuginfo-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: 685d04d6bba195e8ce4bdffbbf84f2c76a8a3ce0d9a316a97a89d2547a92322b
kernel-rt-debuginfo-common-x86_64-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: 106652ce1d54dbda1dbb5735724ce2dad09e770329b824f73560dd801ce93def
kernel-rt-devel-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: 20e52a8d4b394427b9a63dae48d38eda6bc45a8198a1c8295731c3e54a4b8fc2
kernel-rt-modules-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: 6c3acbfe2dd6a1bc96036feb7ac8e1af3fe9ccdf596df1d3cdf92e9745df3938
kernel-rt-modules-extra-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: fd5a0b02f15ad95b8d33a582d1456df9dcd625f56b36a171dbb420c0c6349cdb
Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.0
SRPM
kernel-rt-5.14.0-70.53.1.rt21.124.el9_0.src.rpm
SHA-256: b051055a0d9fa676ae0668dfe0b0e95035990c28be594c0265f0a8aec3430d52
x86_64
kernel-rt-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: 2aef791cf8f31f619b71e5fdbe6ba3052e2f53ed73d4890b495167603e8221d5
kernel-rt-core-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: c387c898ce6eea80fea02b9582ef553250950281e6304610b461bbbe3fb4e53b
kernel-rt-debug-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: e2148092d24d3b99cca8732479a6408ce56bdb29b8223902d6a32ed3a690b11b
kernel-rt-debug-core-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: 723e42d66ce4bc9be86b7352f5b491a2730873c9e9105d8191639c7803109740
kernel-rt-debug-debuginfo-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: bc0afc336ce83ac7ff564c8c70e3b2b77355fd6d9a8c5e5b659b81cf1214cadc
kernel-rt-debug-devel-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: c021eaea4c47fc2032ecdd4d683405bf486175377b60379cabb68b713772128c
kernel-rt-debug-kvm-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: 8527325f62c1e3df6f24e1f9c155d9bf26a36ac224ac802760c70ff807dbae2b
kernel-rt-debug-modules-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: 3fd414c653bb4a5659b434707212a67331ff4e559c048ed21d42f78ce054a5c9
kernel-rt-debug-modules-extra-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: cf0ff35494131991857380cf33242ee95fe65d6f0b2e771d6b439de877489ac7
kernel-rt-debuginfo-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: 685d04d6bba195e8ce4bdffbbf84f2c76a8a3ce0d9a316a97a89d2547a92322b
kernel-rt-debuginfo-common-x86_64-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: 106652ce1d54dbda1dbb5735724ce2dad09e770329b824f73560dd801ce93def
kernel-rt-devel-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: 20e52a8d4b394427b9a63dae48d38eda6bc45a8198a1c8295731c3e54a4b8fc2
kernel-rt-kvm-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: f9479357415b19a43797d75d920d3b2b674bec24d07b6a6a1b9975fe8b4034a2
kernel-rt-modules-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: 6c3acbfe2dd6a1bc96036feb7ac8e1af3fe9ccdf596df1d3cdf92e9745df3938
kernel-rt-modules-extra-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm
SHA-256: fd5a0b02f15ad95b8d33a582d1456df9dcd625f56b36a171dbb420c0c6349cdb
The Red Hat security contact is [email protected]. More contact details at https://access.redhat.com/security/team/contact/.
Related news
This Metasploit module exploit targets the Linux kernel bug in OverlayFS. A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system.
Cybersecurity researchers have disclosed two high-severity security flaws in the Ubuntu kernel that could pave the way for local privilege escalation attacks. Cloud security firm Wiz, in a report shared with The Hacker News, said the easy-to-exploit shortcomings have the potential to impact 40% of Ubuntu users. "The impacted Ubuntu versions are prevalent in the cloud as they serve as the default
It was discovered that the OverlayFS implementation in the Linux kernel did not properly handle copy up operation in some conditions. A local attacker could possibly use this to gain elevated privileges. It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux kernel did not properly perform data buffer size validation in some situations. A physically proximate attacker could use this to craft a malicious USB device that when inserted, could cause a denial of service (system crash) or possibly expose sensitive information. It was discovered that a race condition existed in the io_uring subsystem in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. Various other issues were also addressed.
Ubuntu Security Notice 6072-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for this CVE, kernel support for the TCINDEX classifier has been removed. Lin Ma discovered a race condition in the io_uring subsystem in the Linux kernel, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 6057-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the OverlayFS implementation in the Linux kernel did not properly handle copy up operation in some conditions. A local attacker could possibly use this to gain elevated privileges.
Red Hat Security Advisory 2023-2104-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.8 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-2083-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.5 General Availability release images, which fix bugs and security updates container images. Issues addressed include denial of service and server-side request forgery vulnerabilities.
Ubuntu Security Notice 6043-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for thisCVE, kernel support for the TCINDEX classifier has been removed. It was discovered that the OverlayFS implementation in the Linux kernel did not properly handle copy up operation in some conditions. A local attacker could possibly use this to gain elevated privileges.
Logging Subsystem 5.6.5 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-27539: A denial of service vulnerability was found in rubygem-rack in how it parses headers. A carefully crafted input can cause header parsing to take an unexpected amount of time, possibly resulting in a denial of service. * CVE-2023-28120: A Cross-Site-Scripting vulnerability was found in rubygem ActiveSupport. If the new bytesplice method is called on a SafeBuffer with untrus...
Red Hat Security Advisory 2023-1980-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Red Hat Security Advisory 2023-1970-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0386: A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges o...
Ubuntu Security Notice 6025-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the OverlayFS implementation in the Linux kernel did not properly handle copy up operation in some conditions. A local attacker could possibly use this to gain elevated privileges.
Red Hat Security Advisory 2023-1677-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include heap overflow and integer overflow vulnerabilities.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0386: A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23521: A flaw was found in Git, a distributed revision control system. When parsing gitattributes, a mechanism to allow defining attributes for paths, multiple integer overflows can occur when there is a huge number of path patterns, attributes for a single pattern, ...
Red Hat Security Advisory 2023-1660-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Red Hat Security Advisory 2023-1659-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0266: A use-after-free flaw was found in snd_ctl_elem_read in sound/core/control.c in Advanced Linux Sound Architecture (ALSA) subsystem in the Linux kernel. In this flaw a normal privileged, local attacker may impact the system due to a locking issue in the compat path, leading to a kernel information leak problem. * CVE...
Red Hat Security Advisory 2023-1584-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4269: A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of...