RLSA-2024:1614 --- kernel-rtID: oval:org.secpod.oval:def:4501553 | Date: (C)2024-05-21 (M)2024-06-13 |
Class: PATCH | Family: unix |
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix: * kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query * kernel: Out of boundary write in perf_read_group as result of overflow a perf_event"s read_size * kernel: GSM multiplexing race condition leads to privilege escalation * kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client * kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c * kernel: ext4: kernel bug in ext4_write_inline_data_end * kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init function Bug Fix: * kernel-rt: update RT source tree to the latest Rocky Linux-8.9.z3 Batch * kernel-rt: kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init function * kernel-rt: kernel: vmxgfx: NULL pointer dereference in vmw_cmd_dx_define_query * kernel-rt: kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client * kernel-rt: kernel: Out of boundary write in perf_read_group as result of overflow a perf_event"s read_size * kernel-rt: kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c * kernel-rt: kernel: GSM multiplexing race condition leads to privilege escalation * kernel-rt: kernel: ext4: kernel bug in ext4_write_inline_data_end