First published: Tue Nov 15 2022(Updated: )
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.<br>Security Fix(es):<br><li> off-path attacker may inject data or terminate victim's TCP session (CVE-2020-36516)</li> <li> use-after-free vulnerability in function sco_sock_sendmsg() (CVE-2021-3640)</li> <li> smb2_ioctl_query_info NULL pointer dereference (CVE-2022-0168)</li> <li> NULL pointer dereference in udf_expand_file_adinicbdue() during writeback (CVE-2022-0617)</li> <li> swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854)</li> <li> uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM (CVE-2022-1016)</li> <li> race condition in snd_pcm_hw_free leading to use-after-free (CVE-2022-1048)</li> <li> use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (CVE-2022-1184)</li> <li> concurrency use-after-free between drm_setmaster_ioctl and drm_mode_getresources (CVE-2022-1280)</li> <li> kernel info leak issue in pfkey_register (CVE-2022-1353)</li> <li> use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges (CVE-2022-1679)</li> <li> NULL pointer dereference in x86_emulate_insn may lead to DoS (CVE-2022-1852)</li> <li> fanotify misuses fd_install() which could lead to use-after-free (CVE-2022-1998)</li> <li> nf_tables cross-table potential use-after-free may lead to local privilege escalation (CVE-2022-2586)</li> <li> openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)</li> <li> slab-out-of-bounds access in packet_recvmsg() (CVE-2022-20368)</li> <li> incomplete clean-up of multi-core shared buffers (aka SBDR) (CVE-2022-21123)</li> <li> incomplete clean-up of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125)</li> <li> incomplete clean-up in specific special register write operations (aka DRPW) (CVE-2022-21166)</li> <li> possible to use the debugger to write zero into a location of choice (CVE-2022-21499)</li> <li> AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900)</li> <li> AMD: Branch Type Confusion (non-retbleed) (CVE-2022-23825)</li> <li> Intel: Post-barrier Return Stack Buffer Predictions (CVE-2022-26373)</li> <li> double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c (CVE-2022-28390)</li> <li> use after free in SUNRPC subsystem (CVE-2022-28893)</li> <li> use-after-free due to improper update of reference count in net/sched/cls_u32.c (CVE-2022-29581)</li> <li> Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901)</li> <li> DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (CVE-2022-36946)</li> <li> nf_tables disallow binding to already bound chain (CVE-2022-39190)</li> <li> nfs_atomic_open() returns uninitialized data instead of ENOTDIR (CVE-2022-24448)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Additional Changes:<br>For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <5.14.0-162.6.1.rt21.168.el9_1 | 5.14.0-162.6.1.rt21.168.el9_1 |
redhat/kernel-rt | <5.14.0-162.6.1.rt21.168.el9_1 | 5.14.0-162.6.1.rt21.168.el9_1 |
redhat/kernel-rt-core | <5.14.0-162.6.1.rt21.168.el9_1 | 5.14.0-162.6.1.rt21.168.el9_1 |
redhat/kernel-rt-debug | <5.14.0-162.6.1.rt21.168.el9_1 | 5.14.0-162.6.1.rt21.168.el9_1 |
redhat/kernel-rt-debug-core | <5.14.0-162.6.1.rt21.168.el9_1 | 5.14.0-162.6.1.rt21.168.el9_1 |
redhat/kernel-rt-debug-debuginfo | <5.14.0-162.6.1.rt21.168.el9_1 | 5.14.0-162.6.1.rt21.168.el9_1 |
redhat/kernel-rt-debug-devel | <5.14.0-162.6.1.rt21.168.el9_1 | 5.14.0-162.6.1.rt21.168.el9_1 |
redhat/kernel-rt-debug-modules | <5.14.0-162.6.1.rt21.168.el9_1 | 5.14.0-162.6.1.rt21.168.el9_1 |
redhat/kernel-rt-debug-modules-extra | <5.14.0-162.6.1.rt21.168.el9_1 | 5.14.0-162.6.1.rt21.168.el9_1 |
redhat/kernel-rt-debuginfo | <5.14.0-162.6.1.rt21.168.el9_1 | 5.14.0-162.6.1.rt21.168.el9_1 |
redhat/kernel-rt-devel | <5.14.0-162.6.1.rt21.168.el9_1 | 5.14.0-162.6.1.rt21.168.el9_1 |
redhat/kernel-rt-modules | <5.14.0-162.6.1.rt21.168.el9_1 | 5.14.0-162.6.1.rt21.168.el9_1 |
redhat/kernel-rt-modules-extra | <5.14.0-162.6.1.rt21.168.el9_1 | 5.14.0-162.6.1.rt21.168.el9_1 |
redhat/kernel-rt-debug-kvm | <5.14.0-162.6.1.rt21.168.el9_1 | 5.14.0-162.6.1.rt21.168.el9_1 |
redhat/kernel-rt-kvm | <5.14.0-162.6.1.rt21.168.el9_1 | 5.14.0-162.6.1.rt21.168.el9_1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.