Security Vulnerabilities fixed in kernel-rt RHSA-2022:7338

description-logoDescription

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): A use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588) RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900) Branch Type Confusion (non-retbleed) (CVE-2022-23825) Intel: Post-barrier Return Stack Buffer Predictions (CVE-2022-26373) Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901) A use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588) RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900) Branch Type Confusion (non-retbleed) (CVE-2022-23825) Intel: Post-barrier Return Stack Buffer Predictions (CVE-2022-26373) Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): Update to the latest RHEL7.9.z18 source tree (BZ#2117337) SolutionFor details on how to apply this update, which includes the changes described in this advisory, refer to:https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect.

affected-products-logoAffected Applications

kernel-rt