{"id":"RLSA-2023:1469","summary":"Important: kernel-rt security and bug fix update","details":"The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: tun: avoid double free in tun_free_netdev (CVE-2022-4744)\n\n* ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266)\n\n* kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest Rocky Linux-9.1.z3 Batch (BZ#2170460)","modified":"2026-02-04T21:45:08.331780Z","published":"2023-04-06T15:23:50.022506Z","upstream":["CVE-2022-4269","CVE-2022-4744","CVE-2023-0266"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2023:1469"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150272"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156322"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2163379"}],"affected":[{"package":{"name":"kernel-rt","ecosystem":"Rocky Linux:9","purl":"pkg:rpm/rocky-linux/kernel-rt?distro=rocky-linux-9&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.22.2.rt21.186.el9_1"}],"database_specific":{"yum_repository":"RT"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2023:1469.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}