alsa-2024:2950
Vulnerability from osv_almalinux
Published
2024-05-22 00:00
Modified
2024-05-29 12:19
Summary
Moderate: kernel-rt security and bug fix update
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
References
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-rt"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.rt7.342.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-rt-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.rt7.342.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-rt-debug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.rt7.342.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-rt-debug-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.rt7.342.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-rt-debug-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.rt7.342.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-rt-debug-kvm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.rt7.342.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-rt-debug-modules"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.rt7.342.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-rt-debug-modules-extra"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.rt7.342.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-rt-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.rt7.342.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-rt-kvm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.rt7.342.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-rt-modules"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.rt7.342.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-rt-modules-extra"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-553.rt7.342.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.",
"id": "ALSA-2024:2950",
"modified": "2024-05-29T12:19:46Z",
"published": "2024-05-22T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2024:2950"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2019-13631"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2019-15505"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2020-25656"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-3753"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-4204"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-0500"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-23222"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-3565"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-45934"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-1513"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-24023"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-25775"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-28464"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-31083"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-3567"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-37453"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-38409"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-39189"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-39192"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-39193"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-39194"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-39198"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-4133"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-4244"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-42754"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-42755"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-45863"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-51779"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-51780"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52340"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52434"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52448"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52489"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52574"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52580"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52581"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52620"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-6121"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-6176"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-6622"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-6915"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-6932"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-0841"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-25742"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-25743"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26602"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26609"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-26671"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/1731000"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/1746732"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/1888726"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/1999589"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2039178"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2043520"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2044578"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2150953"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2151959"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2177759"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2179892"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2213132"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2218332"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2219359"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2221039"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2221463"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2221702"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2226777"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2226784"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2226787"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2226788"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2230042"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2231410"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2235306"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2239845"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2239847"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2244720"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2250043"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2253632"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2254961"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2254982"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2255283"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2256490"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2256822"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2257682"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2257979"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2265285"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2265653"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2267695"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2267750"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2267760"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2267761"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2269189"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2269217"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2270836"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2270883"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2272811"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2024-2950.html"
}
],
"related": [],
"summary": "Moderate: kernel-rt security and bug fix update"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…