Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2024:2950 - Security Advisory
Issued:
2024-05-22
Updated:
2024-05-22

RHSA-2024:2950 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel-rt security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for Real Time 8 x86_64
  • Red Hat Enterprise Linux for Real Time for NFV 8 x86_64

Fixes

  • BZ - 1731000 - CVE-2019-13631 kernel: OOB writes in parse_hid_report_descriptor in drivers/input/tablet/gtco.c
  • BZ - 1746732 - CVE-2019-15505 kernel: out of bounds read in drivers/media/usb/dvb-usb/technisat-usb2.c
  • BZ - 1888726 - CVE-2020-25656 kernel: use-after-free in read in vt_do_kdgkb_ioctl
  • BZ - 1999589 - CVE-2021-3753 kernel: a race out-of-bound read in vt
  • BZ - 2039178 - CVE-2021-4204 kernel: improper input validation may lead to privilege escalation
  • BZ - 2043520 - CVE-2022-23222 kernel: local privileges escalation in kernel/bpf/verifier.c
  • BZ - 2044578 - CVE-2022-0500 kernel: Linux ebpf logic vulnerability leads to critical memory read and write gaining root privileges
  • BZ - 2150953 - CVE-2022-3565 kernel: use-after-free in l1oip timer handlers
  • BZ - 2151959 - CVE-2022-45934 kernel: integer overflow in l2cap_config_req() in net/bluetooth/l2cap_core.c
  • BZ - 2177759 - CVE-2023-28464 Kernel: double free in hci_conn_cleanup of the bluetooth subsystem
  • BZ - 2179892 - CVE-2023-1513 kernel: KVM: information leak in KVM_GET_DEBUGREGS ioctl on 32-bit systems
  • BZ - 2213132 - CVE-2023-31083 kernel: race condition between HCIUARTSETPROTO and HCIUARTGETPROTO in hci_uart_tty_ioctl
  • BZ - 2218332 - CVE-2023-39198 kernel: QXL: race condition leading to use-after-free in qxl_mode_dumb_create()
  • BZ - 2219359 - CVE-2023-6176 kernel: local dos vulnerability in scatterwalk_copychunks
  • BZ - 2221039 - CVE-2023-37453 kernel: usb: out-of-bounds read in read_descriptors
  • BZ - 2221463 - CVE-2023-3567 kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race
  • BZ - 2221702 - CVE-2023-4133 kernel: cxgb4: use-after-free in ch_flower_stats_cb()
  • BZ - 2226777 - CVE-2023-39189 kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one()
  • BZ - 2226784 - CVE-2023-39192 kernel: netfilter: xtables out-of-bounds read in u32_match_it()
  • BZ - 2226787 - CVE-2023-39193 kernel: netfilter: xtables sctp out-of-bounds read in match_flags()
  • BZ - 2226788 - CVE-2023-39194 kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match()
  • BZ - 2230042 - CVE-2023-38409 kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment
  • BZ - 2231410 - CVE-2023-25775 kernel: irdma: Improper access control
  • BZ - 2235306 - CVE-2023-4244 kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction
  • BZ - 2239845 - CVE-2023-42754 kernel: ipv4: NULL pointer dereference in ipv4_send_dest_unreach()
  • BZ - 2239847 - CVE-2023-42755 kernel: rsvp: out-of-bounds read in rsvp_classify()
  • BZ - 2244720 - CVE-2023-45863 kernel: lib/kobject.c vulnerable to fill_kobj_path out-of-bounds write
  • BZ - 2250043 - CVE-2023-6121 kernel: NVMe: info leak due to out-of-bounds read in nvmet_ctrl_find_get
  • BZ - 2253632 - CVE-2023-6622 kernel: null pointer dereference vulnerability in nft_dynset_init()
  • BZ - 2254961 - CVE-2023-24023 kernel: Bluetooth Forward and Future Secrecy Attacks and Defenses
  • BZ - 2254982 - CVE-2023-6915 kernel: Null Pointer Dereference vulnerability in ida_free in lib/idr.c
  • BZ - 2255283 - CVE-2023-6932 kernel: use-after-free in IPv4 IGMP
  • BZ - 2256490 - CVE-2024-0841 kernel: hugetlbfs: Null pointer dereference in hugetlbfs_fill_super function
  • BZ - 2256822 - CVE-2023-51779 kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg
  • BZ - 2257682 - CVE-2023-51780 kernel: use-after-free in net/atm/ioctl.c
  • BZ - 2257979 - CVE-2023-52340 kernel: ICMPv6 ?Packet Too Big? packets force a DoS of the Linux kernel by forcing 100% CPU
  • BZ - 2265285 - CVE-2023-52434 kernel: smb: client: fix potential OOBs in smb2_parse_contexts()
  • BZ - 2265653 - CVE-2023-52448 kernel: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump
  • BZ - 2267695 - CVE-2024-26602 kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier
  • BZ - 2267750 - CVE-2023-52574 kernel: team: NULL pointer dereference when team device type is changed
  • BZ - 2267760 - CVE-2023-52580 kernel: net/core: kernel crash in ETH_P_1588 flow dissector
  • BZ - 2267761 - CVE-2023-52581 kernel: netfilter: nf_tables: memory leak when more than 255 elements expired
  • BZ - 2269189 - CVE-2023-52489 kernel: mm/sparsemem: fix race in accessing memory_section->usage
  • BZ - 2269217 - CVE-2024-26609 kernel: netfilter: nf_tables: reject QUEUE/DROP verdict parameters
  • BZ - 2270836 - CVE-2024-25742 CVE-2024-25743 hw: amd: Instruction raise #VC exception at exit
  • BZ - 2270883 - CVE-2023-52620 kernel: netfilter: nf_tables: disallow timeout for anonymous sets
  • BZ - 2272811 - CVE-2024-26671 kernel: blk-mq: fix IO hang from sbitmap wakeup race

CVEs

  • CVE-2019-13631
  • CVE-2019-15505
  • CVE-2020-25656
  • CVE-2021-3753
  • CVE-2021-4204
  • CVE-2022-0500
  • CVE-2022-3565
  • CVE-2022-23222
  • CVE-2022-45934
  • CVE-2023-1513
  • CVE-2023-3567
  • CVE-2023-4133
  • CVE-2023-4244
  • CVE-2023-6121
  • CVE-2023-6176
  • CVE-2023-6622
  • CVE-2023-6915
  • CVE-2023-6932
  • CVE-2023-24023
  • CVE-2023-25775
  • CVE-2023-28464
  • CVE-2023-31083
  • CVE-2023-37453
  • CVE-2023-38409
  • CVE-2023-39189
  • CVE-2023-39192
  • CVE-2023-39193
  • CVE-2023-39194
  • CVE-2023-39198
  • CVE-2023-42754
  • CVE-2023-42755
  • CVE-2023-45863
  • CVE-2023-51779
  • CVE-2023-51780
  • CVE-2023-52340
  • CVE-2023-52434
  • CVE-2023-52448
  • CVE-2023-52489
  • CVE-2023-52574
  • CVE-2023-52580
  • CVE-2023-52581
  • CVE-2023-52597
  • CVE-2023-52620
  • CVE-2024-0841
  • CVE-2024-25742
  • CVE-2024-25743
  • CVE-2024-26602
  • CVE-2024-26609
  • CVE-2024-26671

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for Real Time 8

SRPM
kernel-rt-4.18.0-553.rt7.342.el8_10.src.rpm SHA-256: 7e464d5f495abe03121fa678a33b2fb6395c864f92d058fbfbaba2e37474f1a0
x86_64
kernel-rt-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: b8a849ae518046eb3ecda1cf390b0fb2209b75c212e368d65bfda01105c5b2c2
kernel-rt-core-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: a2c982aec9e27cd12913d21f84297f28115f4f1d7cf0d8f2562259a53c3362c7
kernel-rt-debug-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: 965db4830f3165eaf6b279937c033425dab3cd96aaec3c5c8913fbf2c227ee61
kernel-rt-debug-core-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: a95e4bb4d7c15d366b16c254c2eb9721c57bdbb2bfb04db108d1de7818817b57
kernel-rt-debug-debuginfo-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: fd05fdb323a3b3d10a1a01dc30bec6aef5b2f6e31efe236f725056425feb955f
kernel-rt-debug-devel-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: 583c688a0b02dc3352a1fe4628a384d8c37a2b937ffe512bb72dfa0b675c738a
kernel-rt-debug-modules-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: 05578753fc14d5a0fe040b71066d84eed05c29eba33a879dd3d99a430c933879
kernel-rt-debug-modules-extra-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: ce69f8b8521552562280ec998afe7015b9a35ddb52ea4106dc36fad7df271f6f
kernel-rt-debuginfo-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: 39d3b88b6d6fe80c3d92dee33a29291555a6619e669c35f665fe6c2939b12e2b
kernel-rt-debuginfo-common-x86_64-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: 14a79d8999436ae67489d7ca19203e75a2def5dda61a007d6707860fc8cb080a
kernel-rt-devel-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: 9c89688439151d5b7db738633f4079e59ec2b12526ffba734f69eed8d28bfe32
kernel-rt-modules-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: c22c84cf93a11ba1087628c95077c5a6576b1d3fdb0c0b0aa3c60be478aa8a84
kernel-rt-modules-extra-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: 033b6d3698a39ec9b4b9ed7e763b5272e6222e76bd729f2646c99efe1bd62465

Red Hat Enterprise Linux for Real Time for NFV 8

SRPM
kernel-rt-4.18.0-553.rt7.342.el8_10.src.rpm SHA-256: 7e464d5f495abe03121fa678a33b2fb6395c864f92d058fbfbaba2e37474f1a0
x86_64
kernel-rt-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: b8a849ae518046eb3ecda1cf390b0fb2209b75c212e368d65bfda01105c5b2c2
kernel-rt-core-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: a2c982aec9e27cd12913d21f84297f28115f4f1d7cf0d8f2562259a53c3362c7
kernel-rt-debug-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: 965db4830f3165eaf6b279937c033425dab3cd96aaec3c5c8913fbf2c227ee61
kernel-rt-debug-core-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: a95e4bb4d7c15d366b16c254c2eb9721c57bdbb2bfb04db108d1de7818817b57
kernel-rt-debug-debuginfo-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: fd05fdb323a3b3d10a1a01dc30bec6aef5b2f6e31efe236f725056425feb955f
kernel-rt-debug-devel-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: 583c688a0b02dc3352a1fe4628a384d8c37a2b937ffe512bb72dfa0b675c738a
kernel-rt-debug-kvm-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: a672cebd3d302c65c425c76ea4ddcde6e05978009f058d16c8ddcba183285885
kernel-rt-debug-modules-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: 05578753fc14d5a0fe040b71066d84eed05c29eba33a879dd3d99a430c933879
kernel-rt-debug-modules-extra-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: ce69f8b8521552562280ec998afe7015b9a35ddb52ea4106dc36fad7df271f6f
kernel-rt-debuginfo-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: 39d3b88b6d6fe80c3d92dee33a29291555a6619e669c35f665fe6c2939b12e2b
kernel-rt-debuginfo-common-x86_64-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: 14a79d8999436ae67489d7ca19203e75a2def5dda61a007d6707860fc8cb080a
kernel-rt-devel-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: 9c89688439151d5b7db738633f4079e59ec2b12526ffba734f69eed8d28bfe32
kernel-rt-kvm-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: 72fe33abf8ed63468a3aa2a526a33477663453391f9bd9f1749885349a939415
kernel-rt-modules-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: c22c84cf93a11ba1087628c95077c5a6576b1d3fdb0c0b0aa3c60be478aa8a84
kernel-rt-modules-extra-4.18.0-553.rt7.342.el8_10.x86_64.rpm SHA-256: 033b6d3698a39ec9b4b9ed7e763b5272e6222e76bd729f2646c99efe1bd62465

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility