CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
60.7%
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
access.redhat.com/errata/RHSA-2023:2736
access.redhat.com/security/cve/CVE-2021-26341
access.redhat.com/security/cve/CVE-2021-33655
access.redhat.com/security/cve/CVE-2021-33656
access.redhat.com/security/cve/CVE-2022-1462
access.redhat.com/security/cve/CVE-2022-1679
access.redhat.com/security/cve/CVE-2022-1789
access.redhat.com/security/cve/CVE-2022-20141
access.redhat.com/security/cve/CVE-2022-2196
access.redhat.com/security/cve/CVE-2022-25265
access.redhat.com/security/cve/CVE-2022-2663
access.redhat.com/security/cve/CVE-2022-3028
access.redhat.com/security/cve/CVE-2022-30594
access.redhat.com/security/cve/CVE-2022-3239
access.redhat.com/security/cve/CVE-2022-3522
access.redhat.com/security/cve/CVE-2022-3524
access.redhat.com/security/cve/CVE-2022-3564
access.redhat.com/security/cve/CVE-2022-3566
access.redhat.com/security/cve/CVE-2022-3567
access.redhat.com/security/cve/CVE-2022-3619
access.redhat.com/security/cve/CVE-2022-3623
access.redhat.com/security/cve/CVE-2022-3625
access.redhat.com/security/cve/CVE-2022-3628
access.redhat.com/security/cve/CVE-2022-3707
access.redhat.com/security/cve/CVE-2022-39188
access.redhat.com/security/cve/CVE-2022-39189
access.redhat.com/security/cve/CVE-2022-41218
access.redhat.com/security/cve/CVE-2022-4129
access.redhat.com/security/cve/CVE-2022-41674
access.redhat.com/security/cve/CVE-2022-42703
access.redhat.com/security/cve/CVE-2022-42720
access.redhat.com/security/cve/CVE-2022-42721
access.redhat.com/security/cve/CVE-2022-42722
access.redhat.com/security/cve/CVE-2022-43750
access.redhat.com/security/cve/CVE-2022-47929
access.redhat.com/security/cve/CVE-2023-0394
access.redhat.com/security/cve/CVE-2023-0461
access.redhat.com/security/cve/CVE-2023-1195
access.redhat.com/security/cve/CVE-2023-1582
access.redhat.com/security/cve/CVE-2023-23454
bugzilla.redhat.com/2055499
bugzilla.redhat.com/2061703
bugzilla.redhat.com/2078466
bugzilla.redhat.com/2084125
bugzilla.redhat.com/2085300
bugzilla.redhat.com/2090723
bugzilla.redhat.com/2108691
bugzilla.redhat.com/2108696
bugzilla.redhat.com/2114937
bugzilla.redhat.com/2122228
bugzilla.redhat.com/2122960
bugzilla.redhat.com/2123056
bugzilla.redhat.com/2124788
bugzilla.redhat.com/2127985
bugzilla.redhat.com/2130141
bugzilla.redhat.com/2133483
bugzilla.redhat.com/2134377
bugzilla.redhat.com/2134451
bugzilla.redhat.com/2134506
bugzilla.redhat.com/2134517
bugzilla.redhat.com/2134528
bugzilla.redhat.com/2137979
bugzilla.redhat.com/2143893
bugzilla.redhat.com/2143943
bugzilla.redhat.com/2144720
bugzilla.redhat.com/2150947
bugzilla.redhat.com/2150960
bugzilla.redhat.com/2150979
bugzilla.redhat.com/2150999
bugzilla.redhat.com/2151270
bugzilla.redhat.com/2154171
bugzilla.redhat.com/2154235
bugzilla.redhat.com/2160023
bugzilla.redhat.com/2162120
bugzilla.redhat.com/2165721
bugzilla.redhat.com/2168246
bugzilla.redhat.com/2168297
bugzilla.redhat.com/2176192
bugzilla.redhat.com/2180936
errata.almalinux.org/8/ALSA-2023-2736.html
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
60.7%