{"id":"RLSA-2024:1614","summary":"Important: kernel-rt security and bug fix update","details":"The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query (CVE-2022-38096)\n\n* kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (CVE-2023-6931)\n\n* kernel: GSM multiplexing race condition leads to privilege escalation (CVE-2023-6546,ZDI-CAN-20527)\n\n* kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (CVE-2024-0565)\n\n* kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (CVE-2023-51042)\n\n* kernel: ext4: kernel bug in ext4_write_inline_data_end() (CVE-2021-33631)\n\n* kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (CVE-2024-1086)\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest Rocky Linux-8.9.z3 Batch (JIRA:Rocky Linux-23853)\n\n* kernel-rt: kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (JIRA:Rocky Linux-24015)\n\n* kernel-rt: kernel: vmxgfx: NULL pointer dereference in vmw_cmd_dx_define_query (JIRA:Rocky Linux-22758)\n\n* kernel-rt: kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (JIRA:Rocky Linux-22080)\n\n* kernel-rt: kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (JIRA:Rocky Linux-22933)\n\n* kernel-rt: kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (JIRA:Rocky Linux-24498)\n\n* kernel-rt: kernel: GSM multiplexing race condition leads to privilege escalation (JIRA:Rocky Linux-19966)\n\n* kernel-rt: kernel: ext4: kernel bug in ext4_write_inline_data_end() (JIRA:Rocky Linux-26334)","modified":"2026-03-11T06:30:48.620536Z","published":"2024-04-05T14:56:14.116713Z","upstream":["CVE-2021-33631","CVE-2022-38096","CVE-2023-51042","CVE-2023-6546","CVE-2023-6931","CVE-2024-0565","CVE-2024-1086"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2024:1614"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133452"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2252731"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255498"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258518"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259866"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2261976"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262126"}],"affected":[{"package":{"name":"kernel-rt","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/kernel-rt?distro=rocky-linux-8&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.24.1.rt7.326.el8_9"}],"database_specific":{"yum_repository":"NFV"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2024:1614.json"}}],"schema_version":"1.7.5","credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}