{"id":"RLSA-2024:0134","summary":"Important: kernel-rt security update","details":"The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use after free in unix_stream_sendpage (CVE-2023-4622)\n\n* kernel: vmwgfx: reference count issue leads to use-after-free in surface handling (CVE-2023-5633)\n\n* kernel: netfilter: potential slab-out-of-bound access due to integer underflow (CVE-2023-42753)\n\n* Kernel: UAF during login when accessing the shost ipaddress (CVE-2023-2162)\n\n* hw amd: Return Address Predictor vulnerability leading to information disclosure (CVE-2023-20569)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest Rocky Linux-8.9.z1 Batch (JIRA:Rocky Linux-17347)","modified":"2026-03-11T06:28:00.230193Z","published":"2024-01-12T19:57:11.890226Z","upstream":["CVE-2023-20569","CVE-2023-2162","CVE-2023-42753","CVE-2023-4622","CVE-2023-5633"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2024:0134"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187773"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2207625"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2237760"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2239843"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245663"}],"affected":[{"package":{"name":"kernel-rt","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/kernel-rt?distro=rocky-linux-8&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.11.1.rt7.313.el8_9"}],"database_specific":{"yum_repository":"NFV"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2024:0134.json"}}],"schema_version":"1.7.5","credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}