-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security and bug fix update Advisory ID: RHSA-2023:1980-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2023:1980 Issue date: 2023-04-25 CVE Names: CVE-2023-0386 ==================================================================== 1. Summary: An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Real Time EUS (v.9.0) - x86_64 Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0) - x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: FUSE filesystem low-privileged user privileges escalation (CVE-2023-0386) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * kernel-rt: update RT source tree to the latest RHEL-9.0.z8 Batch (BZ#2182175) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 2159505 - CVE-2023-0386 kernel: FUSE filesystem low-privileged user privileges escalation 6. Package List: Red Hat Enterprise Linux Real Time for NFV EUS (v.9.0): Source: kernel-rt-5.14.0-70.53.1.rt21.124.el9_0.src.rpm x86_64: kernel-rt-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-core-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-debug-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-debug-core-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-debug-debuginfo-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-debug-devel-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-debug-kvm-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-debug-modules-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-debug-modules-extra-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-debuginfo-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-debuginfo-common-x86_64-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-devel-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-kvm-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-modules-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-modules-extra-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm Red Hat Enterprise Linux Real Time EUS (v.9.0): Source: kernel-rt-5.14.0-70.53.1.rt21.124.el9_0.src.rpm x86_64: kernel-rt-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-core-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-debug-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-debug-core-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-debug-debuginfo-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-debug-devel-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-debug-modules-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-debug-modules-extra-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-debuginfo-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-debuginfo-common-x86_64-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-devel-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-modules-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm kernel-rt-modules-extra-5.14.0-70.53.1.rt21.124.el9_0.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2023-0386 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBZEe/MdzjgjWX9erEAQhhpg//fGcucGqgFdE3jllEcS9paAgaZ2B+OCdO d/+rlhabtnc48n0M2JEwfKm87EleC2rPgewrsDvDowaerJWzQF9SDDkJL6fiNBEO 5eGPLL9Xzjwv6H2WPPeZWj+fzNYCIRkrHXROCyAQC4MRD1VRrlM4XdJ1RycHxVdG QpyD3AWFXSX+Un73qRXHG8VwTd8PQiSf1XM/0FK4J3Ym+KM9rQxtT6SRhS0NFLvl IK9hdsPrx7j2p6UUG/c+hg7gedqCRpQoJ6KIKho2+05G7d6SmrFtwTIVcBGouOFp Ef0HFSIhHn0It70oLx77AlVc96dkNP9luuA140FkoQMTrY4k8JpVnNYT84HMrWyr U2MBYER+kWq/2x1RKseM1H39MQdkPWnjGVU+XSbGen6z2TsrN17zavBsrk6sGk/4 ZcLlyEpOlOnzXjeC8v1jsgJwdlg3f9CUNWqK7Q6fcgw8EOI499StThoV/0Q9TdG7 jd2im+QpugUnMEAI7V+fgfA6Yfvm4S5p+WBxKo5ujLv/GQvcymW2ocfZrcPP8qtr cOq0NlBthTFjXp6+u+PsUlagZE7wXsSu6ISM1b/qwsZB/JjXKeRTJyHKSG/d431z cxE5DgErN2nsEb0NS7pL04gk7N1U9LVnQEIj+WTQF0gTrYVGawOlgR8eqFVSKlgb skYVo8EvyXA=USzD -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce