Lucene search

K
redhatRedHatRHSA-2023:3470
HistoryJun 06, 2023 - 8:02 a.m.

(RHSA-2023:3470) Important: kernel-rt security and bug fix update

2023-06-0608:02:43
access.redhat.com
14
kernel-rt
fine-tuning
determinism
security
cve-2023-0461
cve-2023-2008
cve-2023-32233
privilege escalation
max_lockdep_chains
rhel-9.0.z9 batch
deadline_test

0.001 Low

EPSS

Percentile

39.6%

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)

  • kernel: udmabuf: improper validation of array index leading to local privilege escalation (CVE-2023-2008)

  • kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • kernel-rt-debug: BUG: MAX_LOCKDEP_CHAINS too low (BZ#2181286)

  • kernel-rt: update RT source tree to the latest RHEL-9.0.z9 Batch (BZ#2186491)

  • kernel-rt: INFO: task deadline_test:1778 blocked for more than 622 seconds (BZ#2188662)