[ALSA-2025:7532] Important: kernel-rt security update
Type:
security
Severity:
important
Release date:
2025-05-16
Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() (CVE-2022-49011) * kernel: netfilter: ipset: add missing range check in bitmap_ip_uadt (CVE-2024-53141) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
x86_64 kernel-rt-debug-core-4.18.0-553.52.1.rt7.393.el8_10.x86_64.rpm 02c868f88d59e80033624eeba44dbf6261cee91ceb511324b91a6b456c772bc2
x86_64 kernel-rt-modules-4.18.0-553.52.1.rt7.393.el8_10.x86_64.rpm 272b5537bc422158c38cd44d9fe0afd89654d2130f5a55e4f69f167afd808a04
x86_64 kernel-rt-4.18.0-553.52.1.rt7.393.el8_10.x86_64.rpm 285610b03f05e9627eb8594258bf9bc209e6b374ea72cae4378a935d728449a0
x86_64 kernel-rt-core-4.18.0-553.52.1.rt7.393.el8_10.x86_64.rpm 2c2e7459ab126012b1a4479e9e702bd9f18ff16a778d149326caf02d45036ff0
x86_64 kernel-rt-debug-devel-4.18.0-553.52.1.rt7.393.el8_10.x86_64.rpm 38210805632d19cc1f5a4bc64267cbdb5f37666cb547f7371afb8462fc595426
x86_64 kernel-rt-modules-extra-4.18.0-553.52.1.rt7.393.el8_10.x86_64.rpm 6a40f9766a3bc53cc3a2d763da13f9eb73b439f595485e04f427b0417aadfbd1
x86_64 kernel-rt-devel-4.18.0-553.52.1.rt7.393.el8_10.x86_64.rpm 773c9227082c1cb4152089249ccab09d20fe084301628e0557b6c169d0fb2433
x86_64 kernel-rt-debug-modules-4.18.0-553.52.1.rt7.393.el8_10.x86_64.rpm 91de704c623643371d79c155efafcab3fb8f02f1bafb5557884fb9220230eb12
x86_64 kernel-rt-debug-modules-extra-4.18.0-553.52.1.rt7.393.el8_10.x86_64.rpm ceb182c1a44828cc1fe9fa6dfc51ec5527fff0dfe7b50e4708d40822bc7801a6
x86_64 kernel-rt-debug-4.18.0-553.52.1.rt7.393.el8_10.x86_64.rpm e28d3ed29f96f8bfdcd3ebb11366cc26e78186e984b10865cf372116e202a2d5
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.