Security Vulnerabilities fixed in kernel-rt RHSA-2022:7319

description-logoDescription

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): posix cpu timer use-after-free may lead to local privilege escalation (CVE-2022-2585) Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594) posix cpu timer use-after-free may lead to local privilege escalation (CVE-2022-2585) Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): Update RT source tree to the latest RHEL-9.0.z4 Batch (BZ#2123498) SolutionFor details on how to apply this update, which includes the changes described in this advisory, refer to:https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect.

affected-products-logoAffected Applications

kernel-rt

CVE References

CVE-2022-2585 CVE-2022-30594