Lucene search

K
redhatRedHatRHSA-2024:1019
HistoryFeb 28, 2024 - 12:25 p.m.

(RHSA-2024:1019) Important: kernel-rt security update

2024-02-2812:25:09
access.redhat.com
23
kernel-rt
security update
privilege escalation
race condition
cve-2023-6546
cve-2023-6817
cve-2024-0193
cve-2022-38096
cve-2023-4244
cve-2023-6931
cve-2023-51042
cve-2023-51043
cve-2024-1085
cve-2024-1086

7.9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.3%

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: GSM multiplexing race condition leads to privilege escalation (CVE-2023-6546)

  • kernel: inactive elements in nft_pipapo_walk (CVE-2023-6817)

  • kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation (CVE-2024-0193)

  • kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query (CVE-2022-38096)

  • kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction (CVE-2023-4244)

  • kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event’s read_size (CVE-2023-6931)

  • kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (CVE-2023-51042)

  • kernel: use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (CVE-2023-51043)

  • kernel: nf_tables: use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (CVE-2024-1085)

  • kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (CVE-2024-1086)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.