[ALSA-2024:7001] Important: kernel-rt security update
Type:
security
Severity:
important
Release date:
2024-09-24
Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): CVE-2023-6040 CVE-2024-26595 CVE-2021-46984 CVE-2023-52478 CVE-2023-52476 CVE-2023-52522 CVE-2021-47101 CVE-2021-47097 CVE-2023-52605 CVE-2024-26645 CVE-2024-26665 CVE-2024-26720 CVE-2024-26717 CVE-2024-26769 CVE-2024-26894 CVE-2024-26880 CVE-2024-26855 CVE-2024-26923 CVE-2024-26939 CVE-2024-27013 CVE-2024-27042 CVE-2024-35809 CVE-2023-52683 CVE-2024-35884 CVE-2024-35877 CVE-2024-35944 CVE-2024-35989 CVE-2021-47412 CVE-2021-47393 CVE-2021-47386 CVE-2021-47385 CVE-2021-47384 CVE-2021-47383 CVE-2021-47432 CVE-2021-47352 CVE-2021-47338 CVE-2021-47321 CVE-2021-47289 CVE-2021-47287 CVE-2023-52817 CVE-2023-52840 CVE-2021-47441 CVE-2021-47466 CVE-2021-47455 CVE-2021-47497 CVE-2021-47560 CVE-2021-47527 CVE-2024-36883 CVE-2024-36920 CVE-2024-36902 CVE-2024-36953 CVE-2024-36939 CVE-2024-36901 CVE-2021-47582 CVE-2021-47609 CVE-2024-38619 CVE-2022-48754 CVE-2022-48760 CVE-2024-38581 CVE-2024-38570 CVE-2024-38559 CVE-2024-38558 CVE-2024-37356 CVE-2024-39471 CVE-2024-39499 CVE-2024-39501 CVE-2024-39506 CVE-2024-40904 CVE-2024-40911 CVE-2024-40912 CVE-2024-40929 CVE-2024-40931 CVE-2024-40941 CVE-2024-40954 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40972 CVE-2024-40977 CVE-2024-40978 CVE-2024-40988 CVE-2024-40989 CVE-2024-40995 CVE-2024-40997 CVE-2024-40998 CVE-2024-41005 CVE-2024-40901 CVE-2024-41007 CVE-2024-41008 CVE-2022-48804 CVE-2022-48836 CVE-2022-48866 CVE-2024-41090 CVE-2024-41091 CVE-2024-41012 CVE-2024-41013 CVE-2024-41014 CVE-2024-41035 CVE-2024-41038 CVE-2024-41039 CVE-2024-41040 CVE-2024-41041 CVE-2024-41044 CVE-2024-41055 CVE-2024-41056 CVE-2024-41060 CVE-2024-41071 CVE-2024-41076 CVE-2024-41097 CVE-2024-42084 CVE-2024-42090 CVE-2024-42096 CVE-2024-42114 CVE-2024-42124 CVE-2024-42131 CVE-2024-42152 CVE-2024-42154 CVE-2024-42226 CVE-2024-42228 CVE-2024-42237 CVE-2024-42238 CVE-2024-42240 CVE-2024-42246 CVE-2024-42322 CVE-2024-43871 For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
References:
Updated packages listed below:
Architecture Package Checksum
x86_64 kernel-rt-modules-4.18.0-553.22.1.rt7.363.el8_10.x86_64.rpm 3217d8e5afe67d3a0974e79d54b1a9b6b5e550ba49f456a4ea005306ff1c5c75
x86_64 kernel-rt-4.18.0-553.22.1.rt7.363.el8_10.x86_64.rpm 4783045f6dc7ccebadeab5fbb012da5284b5a18e9dc7d5cdf2ad03515e9aaba6
x86_64 kernel-rt-kvm-4.18.0-553.22.1.rt7.363.el8_10.x86_64.rpm 62595572ef709649df100e3aba916011fea4bdc9e401d30dc1489e07847aab73
x86_64 kernel-rt-debug-4.18.0-553.22.1.rt7.363.el8_10.x86_64.rpm 81361945578ba87dd0e9fe497f3ae3a27b2a0f0be8663d9ccb4781bb7f3af541
x86_64 kernel-rt-debug-kvm-4.18.0-553.22.1.rt7.363.el8_10.x86_64.rpm 84ae70994b45fb6d8e93cdf6ba092392066b7f626ef26e24a0f596912df7a1d3
x86_64 kernel-rt-devel-4.18.0-553.22.1.rt7.363.el8_10.x86_64.rpm a68acb894ab91e08f6d9f5b688846a122f0679349bba27373d08bb58e3cd0e6d
x86_64 kernel-rt-debug-devel-4.18.0-553.22.1.rt7.363.el8_10.x86_64.rpm b4524160e81a06299c551ecef0b4d48c6835b7ff47ca71847d18f8744081d417
x86_64 kernel-rt-debug-core-4.18.0-553.22.1.rt7.363.el8_10.x86_64.rpm c269d038e1af116df6fcb57d2017637271e3bcf426e81c3ef4a3f39d57707b3b
x86_64 kernel-rt-modules-extra-4.18.0-553.22.1.rt7.363.el8_10.x86_64.rpm e88ca44d99b32ba0ee6291390b57e935199fa0a3baa9a4d848eb30eb1695a9f8
x86_64 kernel-rt-debug-modules-extra-4.18.0-553.22.1.rt7.363.el8_10.x86_64.rpm efa9322250cb485503c7dc09fa313a61f4ec4683decadb43222093ee867bc205
x86_64 kernel-rt-debug-modules-4.18.0-553.22.1.rt7.363.el8_10.x86_64.rpm f47d62e5ef5715cb1e5f9cc25a3d8a6c0d570e8b8b746a178e14034c5eff98b8
x86_64 kernel-rt-core-4.18.0-553.22.1.rt7.363.el8_10.x86_64.rpm fe862c65839064ddefde7a394bf8dfd26f3951b1d3403184bcdb713f9323a5d4
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.