-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security and bug fix update Advisory ID: RHSA-2022:8941-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:8941 Issue date: 2022-12-13 CVE Names: CVE-2022-1158 CVE-2022-2639 ==================================================================== 1. Summary: An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Real Time TUS (v. 8.2) - x86_64 Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2) - x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region (CVE-2022-1158) * kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * kernel-rt: update RT source tree to the latest RHEL-8.2.z22 Batch (BZ#2138929) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 2069793 - CVE-2022-1158 kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region 2084479 - CVE-2022-2639 kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() 6. Package List: Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2): Source: kernel-rt-4.18.0-193.95.1.rt13.146.el8_2.src.rpm x86_64: kernel-rt-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-core-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-debug-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-debug-core-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-debug-debuginfo-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-debug-devel-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-debug-kvm-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-debug-modules-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-debug-modules-extra-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-debuginfo-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-debuginfo-common-x86_64-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-devel-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-kvm-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-modules-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-modules-extra-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm Red Hat Enterprise Linux Real Time TUS (v. 8.2): Source: kernel-rt-4.18.0-193.95.1.rt13.146.el8_2.src.rpm x86_64: kernel-rt-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-core-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-debug-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-debug-core-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-debug-debuginfo-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-debug-devel-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-debug-modules-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-debug-modules-extra-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-debuginfo-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-debuginfo-common-x86_64-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-devel-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-modules-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm kernel-rt-modules-extra-4.18.0-193.95.1.rt13.146.el8_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-1158 https://access.redhat.com/security/cve/CVE-2022-2639 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBY5ipkNzjgjWX9erEAQjW1Q//R+FZ4vRNbe9sCNyKL5zWmiQk3xwDqmzH 3JvKzGhiUUNWjTZiIwXKftBKDzXBIqofDjtjHcLBH11R7wIdCY5MB708XOMEylon RJHXyZcmbotxn2jw39cd+GRSEy1elw/LGXxbPQEy7rTNAAd7nWfxXuDarf/YShZS b//Bl7alg2J71FVKqbZSZek+p2UodjB9pFoUx12B1umcIVAC4GuXhoVKzug6MbDQ eoJ5u9wz8NQjFFqSdHMManGxCPB+rKV7X9iDo/5Z3LPGaPNmPWNQet3hWmecwJYo LGL8RjlX9S6jm5lRAIl4bGhW3ygZO49s1Kqb9bGSZ9B6NaO3wljNJRJ4R40T7xWa mQTQnGyTIEpPDl9oho35ECM79SJ0zJH2/Dk3XITwIYTl1htjAIsPgHJ+tok94U97 YYj4Z60cc0vpwkCv2yokZN5aa5GxUtjqE2QRkfojKNj6pT724ZwE43Z48OpSn7m6 uNQ5pZsQtXsH/wc4dNwBNcCy7GxvrYey/AcCmjEedol7ccHJgCcwgqve2UxsV4+3 xZxbkUuA38Al+7u+XQqJlcRUhO1gJCZ2CmCMn4lYuX2wbCKn2lW2MWJ3aIzizZN+ XTRoaI1+Wp4SwkcaG7jnzHWurN5uXqpYJRfm6UJyfh1Ea3LfJxbXGTbIDn0I+8wF z2E95w0USlk=fqgU -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce