{"id":"ALSA-2024:2950","summary":"Moderate: kernel-rt security and bug fix update","details":"The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.","modified":"2024-05-29T12:19:46Z","published":"2024-05-22T00:00:00Z","references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:2950"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-13631"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-15505"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-25656"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3753"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-4204"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0500"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-23222"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3565"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-45934"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1513"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24023"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25775"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-28464"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-31083"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3567"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-37453"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-38409"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-39189"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-39192"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-39193"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-39194"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-39198"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4133"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4244"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-42754"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-42755"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-45863"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-51779"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-51780"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52340"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52434"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52448"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52489"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52574"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52580"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52581"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52620"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6121"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6176"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6622"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6915"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6932"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-0841"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-25742"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-25743"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26602"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26609"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26671"},{"type":"REPORT","url":"https://bugzilla.redhat.com/1731000"},{"type":"REPORT","url":"https://bugzilla.redhat.com/1746732"},{"type":"REPORT","url":"https://bugzilla.redhat.com/1888726"},{"type":"REPORT","url":"https://bugzilla.redhat.com/1999589"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2039178"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043520"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2044578"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2150953"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2151959"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2177759"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2179892"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2213132"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2218332"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2219359"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2221039"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2221463"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2221702"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2226777"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2226784"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2226787"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2226788"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2230042"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2231410"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2235306"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2239845"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2239847"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2244720"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2250043"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2253632"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2254961"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2254982"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2255283"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2256490"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2256822"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2257682"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2257979"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2265285"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2265653"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2267695"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2267750"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2267760"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2267761"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2269189"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2269217"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2270836"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2270883"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2272811"},{"type":"ADVISORY","url":"https://errata.almalinux.org/8/ALSA-2024-2950.html"}],"affected":[{"package":{"name":"kernel-rt","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:2950.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:2950.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:2950.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:2950.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:2950.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:2950.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:2950.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:2950.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:2950.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:2950.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:2950.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:2950.json"}}],"schema_version":"1.7.3"}