[ALSA-2024:10282] Low: kernel-rt:4.18.0 security update
Type:
security
Severity:
low
Release date:
2024-12-02
Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: media: edia: dvbdev: fix a use-after-free (CVE-2024-27043) * kernel: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (CVE-2024-38564) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
x86_64 kernel-rt-devel-4.18.0-553.30.1.rt7.371.el8_10.x86_64.rpm 27838bd3d8f3180765446fe2786088ce7b418c0d16127201ad97dba8e07e4cb2
x86_64 kernel-rt-4.18.0-553.30.1.rt7.371.el8_10.x86_64.rpm 3c314866d748a9ea1692ba4ba25e204e612dbb0605dbc662de192517358e5fe7
x86_64 kernel-rt-modules-extra-4.18.0-553.30.1.rt7.371.el8_10.x86_64.rpm 6e9876697a25bfa49c51adc23f48b10f66e79e8270eeed5c4e63e10206089ad2
x86_64 kernel-rt-debug-devel-4.18.0-553.30.1.rt7.371.el8_10.x86_64.rpm 771b5c110cbe99b0e763955cc06f9d31d3a12a68c2a2aa0f38affc5fec586d5d
x86_64 kernel-rt-debug-modules-4.18.0-553.30.1.rt7.371.el8_10.x86_64.rpm a0b033d0c7960fa668b470c09b7d762c9ebaebedcb73e32d76f1ca70c85c2ede
x86_64 kernel-rt-debug-4.18.0-553.30.1.rt7.371.el8_10.x86_64.rpm a6b6c2eb11730214ef3b7aa48b4e17c2f28496516b676ffe2ecad7edc7d3702f
x86_64 kernel-rt-debug-modules-extra-4.18.0-553.30.1.rt7.371.el8_10.x86_64.rpm d2dc672450675f4c78f5ab2d03b1b5afed5659c0703114ec982b2050bd668cf9
x86_64 kernel-rt-modules-4.18.0-553.30.1.rt7.371.el8_10.x86_64.rpm f2f61d4d555ffd32f162cbccd4a76478c336b66c95cb11a44223b0b55cdcf2a8
x86_64 kernel-rt-core-4.18.0-553.30.1.rt7.371.el8_10.x86_64.rpm f75eadb086edf6203c03dff76f16752cabae712d4f9773b15386f9560d0b0e2f
x86_64 kernel-rt-debug-core-4.18.0-553.30.1.rt7.371.el8_10.x86_64.rpm fd047b0b160de87373512d37d7a438f78a3a12a2733f58e7a1e241ea20e02671
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.