Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2023:7424 - Security Advisory
Issued:
2023-11-21
Updated:
2023-11-21

RHSA-2023:7424 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel-rt security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel-rt is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead (CVE-2023-3611)
  • kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function (CVE-2023-3776)
  • kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route (CVE-2023-4128, CVE-2023-4206, CVE-2023-4207, CVE-2023-4208)
  • hw: Intel: Gather Data Sampling (GDS) side channel vulnerability (CVE-2022-40982)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for Real Time 7 x86_64
  • Red Hat Enterprise Linux for Real Time for NFV 7 x86_64

Fixes

  • BZ - 2223949 - CVE-2022-40982 hw: Intel: Gather Data Sampling (GDS) side channel vulnerability
  • BZ - 2225097 - CVE-2023-3776 kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function
  • BZ - 2225191 - CVE-2023-3611 kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead
  • BZ - 2225511 - CVE-2023-4128 CVE-2023-4206 CVE-2023-4207 CVE-2023-4208 kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route

CVEs

  • CVE-2022-40982
  • CVE-2023-3611
  • CVE-2023-3776
  • CVE-2023-4128
  • CVE-2023-4206
  • CVE-2023-4207
  • CVE-2023-4208
  • CVE-2023-31436

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/solutions/7027704
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for Real Time 7

SRPM
kernel-rt-3.10.0-1160.105.1.rt56.1256.el7.src.rpm SHA-256: 2b8a8b4ea60d32bc07bcea0622d239a46bf11c6371cb4b35507904219dfe9821
x86_64
kernel-rt-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: ad1d50d8f62d7ce187bebc026df8058a1ec2720cb9b2a0a8545fce2acd28154c
kernel-rt-debug-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: 323de3a72f6c2d9933b91c242d420d2d6815be442ec6e3dea676f180577b0a86
kernel-rt-debug-debuginfo-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: ea4133110d88efd5283bfffacaa364990dbfd7988629a1da39021c882d8fbe3f
kernel-rt-debug-devel-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: 48be1b426e96bee8196cf3b265bbaafb1881ea0f89e4fcc270b2e2b468a9981a
kernel-rt-debuginfo-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: 96cc008039f600249e6b78773d638068e1a0fc16266320f84fbaecd57638ecd4
kernel-rt-debuginfo-common-x86_64-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: 0bdd20d198c434d5f177efd66e1e770939ac0be07b742f0f2d062e64e2655918
kernel-rt-devel-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: 31b35a03d8d70b46f051900dccbb0863136d2d47de079b1caf37a5c91f420dfd
kernel-rt-doc-3.10.0-1160.105.1.rt56.1256.el7.noarch.rpm SHA-256: 7c2749324f99ac207932594bc5a581aac1e161995e14a366b04026c2a130e5b2
kernel-rt-trace-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: 6ed716aab740d939de0d4c86d62af53ae5ecf185f52887014be7b88430be53e2
kernel-rt-trace-debuginfo-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: 3c9640f8dce79c1fb633739e9b5b194a2e91054e04367aeeeb479754a2afa184
kernel-rt-trace-devel-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: 99685c46aa2da71fecb02016f95a9e613f67a7e00d964c2eb301f5706d14550f

Red Hat Enterprise Linux for Real Time for NFV 7

SRPM
kernel-rt-3.10.0-1160.105.1.rt56.1256.el7.src.rpm SHA-256: 2b8a8b4ea60d32bc07bcea0622d239a46bf11c6371cb4b35507904219dfe9821
x86_64
kernel-rt-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: ad1d50d8f62d7ce187bebc026df8058a1ec2720cb9b2a0a8545fce2acd28154c
kernel-rt-debug-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: 323de3a72f6c2d9933b91c242d420d2d6815be442ec6e3dea676f180577b0a86
kernel-rt-debug-debuginfo-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: ea4133110d88efd5283bfffacaa364990dbfd7988629a1da39021c882d8fbe3f
kernel-rt-debug-devel-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: 48be1b426e96bee8196cf3b265bbaafb1881ea0f89e4fcc270b2e2b468a9981a
kernel-rt-debug-kvm-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: 5d66ba369a2700ea6b4fb3754ccb83719efc4e767dd63f4087bfa8442c3ac289
kernel-rt-debug-kvm-debuginfo-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: af0d3f4f17dd7aaa14403efb40b9b03f28c116504a3db300b2725259b69ee29f
kernel-rt-debuginfo-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: 96cc008039f600249e6b78773d638068e1a0fc16266320f84fbaecd57638ecd4
kernel-rt-debuginfo-common-x86_64-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: 0bdd20d198c434d5f177efd66e1e770939ac0be07b742f0f2d062e64e2655918
kernel-rt-devel-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: 31b35a03d8d70b46f051900dccbb0863136d2d47de079b1caf37a5c91f420dfd
kernel-rt-doc-3.10.0-1160.105.1.rt56.1256.el7.noarch.rpm SHA-256: 7c2749324f99ac207932594bc5a581aac1e161995e14a366b04026c2a130e5b2
kernel-rt-kvm-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: 900b65151b00f1ff644876c3f0567afef11a2732599c936299f3bf62deb940c4
kernel-rt-kvm-debuginfo-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: ceeeb0fceb80c58cf96ea586efb2452a5305487879ec78515ac119f7f1294d80
kernel-rt-trace-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: 6ed716aab740d939de0d4c86d62af53ae5ecf185f52887014be7b88430be53e2
kernel-rt-trace-debuginfo-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: 3c9640f8dce79c1fb633739e9b5b194a2e91054e04367aeeeb479754a2afa184
kernel-rt-trace-devel-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: 99685c46aa2da71fecb02016f95a9e613f67a7e00d964c2eb301f5706d14550f
kernel-rt-trace-kvm-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: af82208c50cc9a03a2a571b6b97254740863bea0e66f0c9831734e5597c4d20c
kernel-rt-trace-kvm-debuginfo-3.10.0-1160.105.1.rt56.1256.el7.x86_64.rpm SHA-256: 47bb694c7411f380c07183fc5bb1b3f418abb5a83b874bb0eab7b377b742ab02

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat X (formerly Twitter)

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility