Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2024:0881 - Security Advisory
Issued:
2024-02-20
Updated:
2024-02-20

RHSA-2024:0881 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel-rt security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: net/sched: sch_hfsc UAF (CVE-2023-4623)
  • kernel: use-after-free in sch_qfq network scheduler (CVE-2023-4921)
  • kernel: inactive elements in nft_pipapo_walk (CVE-2023-6817)
  • kernel: IGB driver inadequate buffer size for frames larger than MTU (CVE-2023-45871)
  • kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination (CVE-2024-0646)
  • kernel: nfp: use-after-free in area_cache_get() (CVE-2022-3545)
  • kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip (CVE-2022-41858)
  • kernel: HID: check empty report_list in hid_validate_values() (CVE-2023-1073)
  • kernel: Possible use-after-free since the two fdget() during vhost_net_set_backend() (CVE-2023-1838)
  • kernel: NULL pointer dereference in can_rcv_filter (CVE-2023-2166)
  • kernel: Slab-out-of-bound read in compare_netdev_and_ip (CVE-2023-2176)
  • kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list (CVE-2023-5717)
  • kernel: NULL pointer dereference in nvmet_tcp_build_iovec (CVE-2023-6356)
  • kernel: NULL pointer dereference in nvmet_tcp_execute_request (CVE-2023-6535)
  • kernel: NULL pointer dereference in __nvmet_req_complete (CVE-2023-6536)
  • kernel: Out-Of-Bounds Read vulnerability in smbCalcSize (CVE-2023-6606)
  • kernel: OOB Access in smb2_dump_detail (CVE-2023-6610)
  • kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c (CVE-2023-40283)
  • kernel: SEV-ES local priv escalation (CVE-2023-46813)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for Real Time 8 x86_64
  • Red Hat Enterprise Linux for Real Time for NFV 8 x86_64

Fixes

  • BZ - 2087568 - CVE-2023-1838 kernel: Possible use-after-free since the two fdget() during vhost_net_set_backend()
  • BZ - 2144379 - CVE-2022-41858 kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip
  • BZ - 2161310 - CVE-2022-3545 kernel: nfp: use-after-free in area_cache_get()
  • BZ - 2173403 - CVE-2023-1073 kernel: HID: check empty report_list in hid_validate_values()
  • BZ - 2187813 - CVE-2023-2166 kernel: NULL pointer dereference in can_rcv_filter
  • BZ - 2187931 - CVE-2023-2176 kernel: Slab-out-of-bound read in compare_netdev_and_ip
  • BZ - 2231800 - CVE-2023-40283 kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c
  • BZ - 2237757 - CVE-2023-4623 kernel: net/sched: sch_hfsc UAF
  • BZ - 2244723 - CVE-2023-45871 kernel: IGB driver inadequate buffer size for frames larger than MTU
  • BZ - 2245514 - CVE-2023-4921 kernel: use-after-free in sch_qfq network scheduler
  • BZ - 2246944 - CVE-2023-46813 kernel: SEV-ES local priv escalation
  • BZ - 2246945 - CVE-2023-5717 kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list
  • BZ - 2253611 - CVE-2023-6606 kernel: Out-Of-Bounds Read vulnerability in smbCalcSize
  • BZ - 2253614 - CVE-2023-6610 kernel: OOB Access in smb2_dump_detail
  • BZ - 2253908 - CVE-2024-0646 kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination
  • BZ - 2254052 - CVE-2023-6536 kernel: NULL pointer dereference in __nvmet_req_complete
  • BZ - 2254053 - CVE-2023-6535 kernel: NULL pointer dereference in nvmet_tcp_execute_request
  • BZ - 2254054 - CVE-2023-6356 kernel: NULL pointer dereference in nvmet_tcp_build_iovec
  • BZ - 2255139 - CVE-2023-6817 kernel: inactive elements in nft_pipapo_walk

CVEs

  • CVE-2022-3545
  • CVE-2022-41858
  • CVE-2023-1073
  • CVE-2023-1838
  • CVE-2023-2166
  • CVE-2023-2176
  • CVE-2023-4623
  • CVE-2023-4921
  • CVE-2023-5717
  • CVE-2023-6356
  • CVE-2023-6535
  • CVE-2023-6536
  • CVE-2023-6606
  • CVE-2023-6610
  • CVE-2023-6817
  • CVE-2023-40283
  • CVE-2023-45871
  • CVE-2023-46813
  • CVE-2024-0646

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for Real Time 8

SRPM
kernel-rt-4.18.0-513.18.1.rt7.320.el8_9.src.rpm SHA-256: c878c2390f689fd1ea62d006ba11840ab937e4235c5d57848cb7a1e02cd93e70
x86_64
kernel-rt-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: f1f61af47d5397aa47d49144458779aec1106714bb9be78e8eb134b52c4dadc1
kernel-rt-core-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: 54d8c0ef1e5af315fbfa4e4dd228d5969dd177d3d8a1b3e88a4ab48bebbc8b81
kernel-rt-debug-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: b3f3d4133f9b168bf0d247d8a06f250bd459449ff88ec858e20067886b726552
kernel-rt-debug-core-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: 4c92f989bad7df44a3d9fafc7c489318e680e0037cafcd85d91f40490289fe97
kernel-rt-debug-debuginfo-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: ffecf3d6438fe44ef6c5bd400993cca95622b0e41d4117c5f3a24eb194d11f7a
kernel-rt-debug-devel-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: 9de3ef74e41470257a37f30c39c45110720afafe4cddb1290c07c449cb5d5996
kernel-rt-debug-modules-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: 9da990533c71e0791ba06d6fe1c2f4a0aa43a5083a00fc02f8c8874393c0e0d4
kernel-rt-debug-modules-extra-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: 18b95d6531b160a1800b63bafe7c3a4b967b8745e0a29c2c7f438164ed535f31
kernel-rt-debuginfo-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: adde81fdb1549ee903917902b44009dbd0aca4d272befa9874812132229a901b
kernel-rt-debuginfo-common-x86_64-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: b3ed686092e3d6daf7d2b323d6136b3bd259e32a5ee7ff2cc6ba307045ffd1c5
kernel-rt-devel-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: ce9bb8633543bf0408b9d0dce578cf43d74ad04bf92523fa8c917be0cd2a664f
kernel-rt-modules-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: 827d713a7c876922710cf799486b2b759ba682f0c8625ddcefb1bcaece36dca3
kernel-rt-modules-extra-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: a2fc53f34dfff50dcaeef630df8ce21b48fa33c90d1411eecb76c8e2bdb4fcac

Red Hat Enterprise Linux for Real Time for NFV 8

SRPM
kernel-rt-4.18.0-513.18.1.rt7.320.el8_9.src.rpm SHA-256: c878c2390f689fd1ea62d006ba11840ab937e4235c5d57848cb7a1e02cd93e70
x86_64
kernel-rt-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: f1f61af47d5397aa47d49144458779aec1106714bb9be78e8eb134b52c4dadc1
kernel-rt-core-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: 54d8c0ef1e5af315fbfa4e4dd228d5969dd177d3d8a1b3e88a4ab48bebbc8b81
kernel-rt-debug-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: b3f3d4133f9b168bf0d247d8a06f250bd459449ff88ec858e20067886b726552
kernel-rt-debug-core-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: 4c92f989bad7df44a3d9fafc7c489318e680e0037cafcd85d91f40490289fe97
kernel-rt-debug-debuginfo-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: ffecf3d6438fe44ef6c5bd400993cca95622b0e41d4117c5f3a24eb194d11f7a
kernel-rt-debug-devel-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: 9de3ef74e41470257a37f30c39c45110720afafe4cddb1290c07c449cb5d5996
kernel-rt-debug-kvm-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: 1392dbaa2622a917ff6ac207e7cff3711b184798d03b8032adfe337ad97e9fe9
kernel-rt-debug-modules-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: 9da990533c71e0791ba06d6fe1c2f4a0aa43a5083a00fc02f8c8874393c0e0d4
kernel-rt-debug-modules-extra-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: 18b95d6531b160a1800b63bafe7c3a4b967b8745e0a29c2c7f438164ed535f31
kernel-rt-debuginfo-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: adde81fdb1549ee903917902b44009dbd0aca4d272befa9874812132229a901b
kernel-rt-debuginfo-common-x86_64-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: b3ed686092e3d6daf7d2b323d6136b3bd259e32a5ee7ff2cc6ba307045ffd1c5
kernel-rt-devel-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: ce9bb8633543bf0408b9d0dce578cf43d74ad04bf92523fa8c917be0cd2a664f
kernel-rt-kvm-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: c1e30ef52813ec38f99fa51dbaee1f23438a47d375de0f921b0eff276e14db66
kernel-rt-modules-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: 827d713a7c876922710cf799486b2b759ba682f0c8625ddcefb1bcaece36dca3
kernel-rt-modules-extra-4.18.0-513.18.1.rt7.320.el8_9.x86_64.rpm SHA-256: a2fc53f34dfff50dcaeef630df8ce21b48fa33c90d1411eecb76c8e2bdb4fcac

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat X (formerly Twitter)

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility