Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2024:1382 - Security Advisory
Issued:
2024-03-19
Updated:
2024-03-19

RHSA-2024:1382 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel-rt security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query (CVE-2022-38096)
  • null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip (CVE-2022-41858)
  • nfp: use-after-free in area_cache_get() (CVE-2022-3545)
  • NULL pointer dereference in can_rcv_filter (CVE-2023-2166)
  • Slab-out-of-bound read in compare_netdev_and_ip (CVE-2023-2176)
  • out-of-bounds write in qfq_change_class function (CVE-2023-31436)
  • NULL pointer dereference in vmxnet3_rq_cleanup() (CVE-2023-4459)
  • net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead (CVE-2023-3611)
  • ktls overwrites readonly memory pages when using function splice with a ktls socket as destination (CVE-2024-0646)
  • inactive elements in nft_pipapo_walk (CVE-2023-6817)
  • refcount leak in ctnetlink_create_conntrack() (CVE-2023-7192)

Bug Fix(es):

  • out-of-bounds write in qfq_change_class function (JIRA:RHEL-12700)
  • vmxnet3: NULL pointer dereference in vmxnet3_rq_cleanup() (JIRA:RHEL-18192)
  • refcount leak in ctnetlink_create_conntrack() (JIRA:RHEL-20302)
  • inactive elements in nft_pipapo_walk (JIRA:RHEL-20703)
  • ktls overwrites readonly memory pages when using function splice with a ktls socket as destination (JIRA:RHEL-22099)
  • update RT source tree to the latest RHEL-8.4.z Batch 23 (JIRA:RHEL-23825)
  • null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip (JIRA:RHEL-19023)
  • Slab-out-of-bound read in compare_netdev_and_ip (JIRA:RHEL-19404)
  • A flaw leading to a use-after-free in area_cache_get() (JIRA:RHEL-19530)
  • vmxgfx: NULL pointer dereference in vmw_cmd_dx_define_query (JIRA:RHEL-22755)
  • NULL pointer dereference in can_rcv_filter (JIRA:RHEL-19520)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4 x86_64
  • Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64
  • Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64

Fixes

  • BZ - 2133452 - CVE-2022-38096 kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query
  • BZ - 2144379 - CVE-2022-41858 kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip
  • BZ - 2161310 - CVE-2022-3545 kernel: nfp: use-after-free in area_cache_get()
  • BZ - 2187813 - CVE-2023-2166 kernel: NULL pointer dereference in can_rcv_filter
  • BZ - 2187931 - CVE-2023-2176 kernel: Slab-out-of-bound read in compare_netdev_and_ip
  • BZ - 2192671 - CVE-2023-31436 kernel: out-of-bounds write in qfq_change_class function
  • BZ - 2219268 - CVE-2023-4459 kernel: vmxnet3: NULL pointer dereference in vmxnet3_rq_cleanup()
  • BZ - 2225191 - CVE-2023-3611 kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead
  • BZ - 2253908 - CVE-2024-0646 kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination
  • BZ - 2255139 - CVE-2023-6817 kernel: inactive elements in nft_pipapo_walk
  • BZ - 2256279 - CVE-2023-7192 kernel: refcount leak in ctnetlink_create_conntrack()

CVEs

  • CVE-2022-3545
  • CVE-2022-38096
  • CVE-2022-41858
  • CVE-2023-2166
  • CVE-2023-2176
  • CVE-2023-3611
  • CVE-2023-4459
  • CVE-2023-6817
  • CVE-2023-7192
  • CVE-2023-31436
  • CVE-2024-0646

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4

SRPM
kernel-rt-4.18.0-305.125.1.rt7.201.el8_4.src.rpm SHA-256: 5ed83131c0d72670af0be5be922797b3867786cf33228dda8d53c73391e078ef
x86_64
kernel-rt-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: cd467f7521b47fa482c556a786460ae61b0e0aef846103c576d0bf6a247b040a
kernel-rt-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: cd467f7521b47fa482c556a786460ae61b0e0aef846103c576d0bf6a247b040a
kernel-rt-core-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: c02beb2dd5a31580013713527c86d64170a0f162122542c55a51027251ec29fe
kernel-rt-core-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: c02beb2dd5a31580013713527c86d64170a0f162122542c55a51027251ec29fe
kernel-rt-debug-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: 39af1d9f048be5041d2d1e5214a897ecbd5d3c8f621988c11f92456a92b0b260
kernel-rt-debug-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: 39af1d9f048be5041d2d1e5214a897ecbd5d3c8f621988c11f92456a92b0b260
kernel-rt-debug-core-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: b24fe102136ac4d056a332886faa8dfbbc705ebb282a1bdfe242d394b3c16b0a
kernel-rt-debug-core-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: b24fe102136ac4d056a332886faa8dfbbc705ebb282a1bdfe242d394b3c16b0a
kernel-rt-debug-debuginfo-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: 856c06c11540bfa03b06c466f3719cd45aeafc853daf6bfc7793c04a743ce444
kernel-rt-debug-debuginfo-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: 856c06c11540bfa03b06c466f3719cd45aeafc853daf6bfc7793c04a743ce444
kernel-rt-debug-devel-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: dcd781a01e939264511e77b2be209631e7e0a80a1d69c8383e098b7f1d80ad99
kernel-rt-debug-devel-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: dcd781a01e939264511e77b2be209631e7e0a80a1d69c8383e098b7f1d80ad99
kernel-rt-debug-kvm-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: f7cbf0e58559d25c9d04d9fda6152ba46732720bdcc35427ac531dacd6a71f86
kernel-rt-debug-modules-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: d722709b71438705860945b10a6cba0f530800b9ed30d1d78ed506d8e62e7256
kernel-rt-debug-modules-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: d722709b71438705860945b10a6cba0f530800b9ed30d1d78ed506d8e62e7256
kernel-rt-debug-modules-extra-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: dc4cbec83631fd414910b0fa60c234ad0fdaa11ea69100c208345e882bb81d24
kernel-rt-debug-modules-extra-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: dc4cbec83631fd414910b0fa60c234ad0fdaa11ea69100c208345e882bb81d24
kernel-rt-debuginfo-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: ea710a85017d835059dd6dde8c63701b7aa91a45de341c9bbd70384a33752ce9
kernel-rt-debuginfo-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: ea710a85017d835059dd6dde8c63701b7aa91a45de341c9bbd70384a33752ce9
kernel-rt-debuginfo-common-x86_64-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: 2a0461afa4347439fda83e3b1380faebcde1b3bd3aae0a03f31cbf817cffc9b3
kernel-rt-debuginfo-common-x86_64-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: 2a0461afa4347439fda83e3b1380faebcde1b3bd3aae0a03f31cbf817cffc9b3
kernel-rt-devel-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: 25398096dc73509168d09861097805b9fa131a3a093a0568761b757ce1cc8d65
kernel-rt-devel-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: 25398096dc73509168d09861097805b9fa131a3a093a0568761b757ce1cc8d65
kernel-rt-kvm-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: c436e0439614ab9570b254d18481e188a0171f9fd1275ca873dbe4fc00b79f0a
kernel-rt-modules-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: e5280acd1da71cf3d35ef24df0308b45832ebd8825cef798c857a5c97128e4da
kernel-rt-modules-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: e5280acd1da71cf3d35ef24df0308b45832ebd8825cef798c857a5c97128e4da
kernel-rt-modules-extra-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: 7a77cf9bc9e941a4acfdc8461c499d10f99d341b615bdba46df9f3b671262a10
kernel-rt-modules-extra-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: 7a77cf9bc9e941a4acfdc8461c499d10f99d341b615bdba46df9f3b671262a10

Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4

SRPM
kernel-rt-4.18.0-305.125.1.rt7.201.el8_4.src.rpm SHA-256: 5ed83131c0d72670af0be5be922797b3867786cf33228dda8d53c73391e078ef
x86_64
kernel-rt-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: cd467f7521b47fa482c556a786460ae61b0e0aef846103c576d0bf6a247b040a
kernel-rt-core-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: c02beb2dd5a31580013713527c86d64170a0f162122542c55a51027251ec29fe
kernel-rt-debug-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: 39af1d9f048be5041d2d1e5214a897ecbd5d3c8f621988c11f92456a92b0b260
kernel-rt-debug-core-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: b24fe102136ac4d056a332886faa8dfbbc705ebb282a1bdfe242d394b3c16b0a
kernel-rt-debug-debuginfo-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: 856c06c11540bfa03b06c466f3719cd45aeafc853daf6bfc7793c04a743ce444
kernel-rt-debug-devel-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: dcd781a01e939264511e77b2be209631e7e0a80a1d69c8383e098b7f1d80ad99
kernel-rt-debug-modules-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: d722709b71438705860945b10a6cba0f530800b9ed30d1d78ed506d8e62e7256
kernel-rt-debug-modules-extra-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: dc4cbec83631fd414910b0fa60c234ad0fdaa11ea69100c208345e882bb81d24
kernel-rt-debuginfo-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: ea710a85017d835059dd6dde8c63701b7aa91a45de341c9bbd70384a33752ce9
kernel-rt-debuginfo-common-x86_64-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: 2a0461afa4347439fda83e3b1380faebcde1b3bd3aae0a03f31cbf817cffc9b3
kernel-rt-devel-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: 25398096dc73509168d09861097805b9fa131a3a093a0568761b757ce1cc8d65
kernel-rt-modules-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: e5280acd1da71cf3d35ef24df0308b45832ebd8825cef798c857a5c97128e4da
kernel-rt-modules-extra-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: 7a77cf9bc9e941a4acfdc8461c499d10f99d341b615bdba46df9f3b671262a10

Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4

SRPM
kernel-rt-4.18.0-305.125.1.rt7.201.el8_4.src.rpm SHA-256: 5ed83131c0d72670af0be5be922797b3867786cf33228dda8d53c73391e078ef
x86_64
kernel-rt-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: cd467f7521b47fa482c556a786460ae61b0e0aef846103c576d0bf6a247b040a
kernel-rt-core-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: c02beb2dd5a31580013713527c86d64170a0f162122542c55a51027251ec29fe
kernel-rt-debug-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: 39af1d9f048be5041d2d1e5214a897ecbd5d3c8f621988c11f92456a92b0b260
kernel-rt-debug-core-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: b24fe102136ac4d056a332886faa8dfbbc705ebb282a1bdfe242d394b3c16b0a
kernel-rt-debug-debuginfo-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: 856c06c11540bfa03b06c466f3719cd45aeafc853daf6bfc7793c04a743ce444
kernel-rt-debug-devel-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: dcd781a01e939264511e77b2be209631e7e0a80a1d69c8383e098b7f1d80ad99
kernel-rt-debug-kvm-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: f7cbf0e58559d25c9d04d9fda6152ba46732720bdcc35427ac531dacd6a71f86
kernel-rt-debug-modules-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: d722709b71438705860945b10a6cba0f530800b9ed30d1d78ed506d8e62e7256
kernel-rt-debug-modules-extra-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: dc4cbec83631fd414910b0fa60c234ad0fdaa11ea69100c208345e882bb81d24
kernel-rt-debuginfo-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: ea710a85017d835059dd6dde8c63701b7aa91a45de341c9bbd70384a33752ce9
kernel-rt-debuginfo-common-x86_64-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: 2a0461afa4347439fda83e3b1380faebcde1b3bd3aae0a03f31cbf817cffc9b3
kernel-rt-devel-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: 25398096dc73509168d09861097805b9fa131a3a093a0568761b757ce1cc8d65
kernel-rt-kvm-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: c436e0439614ab9570b254d18481e188a0171f9fd1275ca873dbe4fc00b79f0a
kernel-rt-modules-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: e5280acd1da71cf3d35ef24df0308b45832ebd8825cef798c857a5c97128e4da
kernel-rt-modules-extra-4.18.0-305.125.1.rt7.201.el8_4.x86_64.rpm SHA-256: 7a77cf9bc9e941a4acfdc8461c499d10f99d341b615bdba46df9f3b671262a10

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility