[ALSA-2024:10944] Moderate: kernel-rt security update
Type:
security
Severity:
moderate
Release date:
2024-12-16
Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: selinux,smack: don't bypass permissions check in inode_setsecctx hook (CVE-2024-46695) * kernel: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (CVE-2024-49949) * kernel: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (CVE-2024-50082) * kernel: arm64: probes: Remove broken LDR (literal) uprobe support (CVE-2024-50099) * kernel: xfrm: fix one more kernel-infoleak in algo dumping (CVE-2024-50110) * kernel: xfrm: validate new SA's prefixlen using SA family when sel.family is unset (CVE-2024-50142) * kernel: irqchip/gic-v4: Don't allow a VMOVP on a dying VPE (CVE-2024-50192) * kernel: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (CVE-2024-50256) * kernel: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (CVE-2024-50264) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
x86_64 kernel-rt-core-4.18.0-553.32.1.rt7.373.el8_10.x86_64.rpm 4a0b55b2714c16ad44743359bd6b9b3bb75887edf53593e07b985daed4704b6a
x86_64 kernel-rt-debug-4.18.0-553.32.1.rt7.373.el8_10.x86_64.rpm 55edca775e37f37db39e95c37ff64d1f6d9a08e8275d3d62108ca700c8cee780
x86_64 kernel-rt-modules-extra-4.18.0-553.32.1.rt7.373.el8_10.x86_64.rpm 7954fc6f4b690e62109916172c734a1b00056943a99723c55e1213f4a6abddc9
x86_64 kernel-rt-debug-devel-4.18.0-553.32.1.rt7.373.el8_10.x86_64.rpm 8b5cca2e22193d96e5fab88d6002b9d4237932933a2d7c119f0d46641a03d0ca
x86_64 kernel-rt-debug-modules-extra-4.18.0-553.32.1.rt7.373.el8_10.x86_64.rpm a1a75499b47ff857f7ac19072f114acf8ee8f3eda8994a31e84de387b26620b5
x86_64 kernel-rt-debug-modules-4.18.0-553.32.1.rt7.373.el8_10.x86_64.rpm add945679c8df41ef593e76d43f1de527942160ae53733bd06c98906da5acd29
x86_64 kernel-rt-devel-4.18.0-553.32.1.rt7.373.el8_10.x86_64.rpm c2e342042f849e57ff0318c9371e74c7e37e1290c931e601a719b3998382ee6d
x86_64 kernel-rt-modules-4.18.0-553.32.1.rt7.373.el8_10.x86_64.rpm ca1187f911d3b1a24431ce680071f83d261c4999ae47beb20439803b4e6cdc42
x86_64 kernel-rt-debug-core-4.18.0-553.32.1.rt7.373.el8_10.x86_64.rpm d1e8a990c7164a5cb20da9f34b7bd0cca3e721f9ad0265231a21ad1d11dc4ded
x86_64 kernel-rt-4.18.0-553.32.1.rt7.373.el8_10.x86_64.rpm f5a26d814f9aef1d8b1393d6931454ac3c21be6edf18002fad926b3d30622608
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.