CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
50.6%
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination (CVE-2024-0646)
kernel: sctp: fail if no bound addresses can be used for a given scope (CVE-2023-1074)
kernel: NULL pointer dereference in nvmet_tcp_build_iovec (CVE-2023-6356)
kernel: NULL pointer dereference in nvmet_tcp_execute_request (CVE-2023-6535)
kernel: NULL pointer dereference in __nvmet_req_complete (CVE-2023-6536)
kernel: Out-Of-Bounds Read vulnerability in smbCalcSize (CVE-2023-6606)
kernel: OOB Access in smb2_dump_detail (CVE-2023-6610)
kernel: use-after-free in IPv4 IGMP (CVE-2023-6932)
kernel: refcount leak in ctnetlink_create_conntrack() (CVE-2023-7192)
kernel: drivers/usb/storage/ene_ub6250.c (CVE-2023-45862)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.