CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
16.3%
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
kernel: vmwgfx: multiple flaws (CVE-2022-36402, CVE-2022-40133, CVE-2022-38457, CVE-2023-5633)
kernel: nftables: (CVE-2024-26581)
kernel: uio: (CVE-2023-52439)
kernel: smb: (CVE-2023-52434)
kernel: intel: (CVE-2023-52450)
kernel: net: multiple flaws (CVE-2023-52578, CVE-2024-36978, CVE-2022-48743)
kernel: Bluetooth: (CVE-2023-52518)
kernel: netfilter: multiple flaws (CVE-2024-26668, CVE-2024-26808, CVE-2024-26925, CVE-2024-27020, CVE-2024-27019, CVE-2024-27016, CVE-2024-27065, CVE-2024-35899, CVE-2024-35897)
kernel: hv_netvsc: (CVE-2024-26698)
kernel: ext4: multiple flaws (CVE-2024-26704, CVE-2024-26773)
kernel: net/sched: (CVE-2024-26739)
kernel: vfio/pci: (CVE-2024-26810)
kernel: dm: (CVE-2024-26880)
kernel: af_unix: multiple flaws (CVE-2024-26923, CVE-2024-38596)
kernel: scsi: multiple flaws (CVE-2024-26931, CVE-2024-26929, CVE-2023-52811, CVE-2024-36025, CVE-2024-36924, CVE-2024-36952)
kernel: Squashfs: (CVE-2024-26982)
kernel: KVM: (CVE-2024-35791)
kernel: ipv6: (CVE-2024-27417)
kernel: drm/client: (CVE-2024-35950)
kernel: sched/psi: (CVE-2023-52707)
kernel: can: (CVE-2021-47459)
kernel: tcp: (CVE-2024-36904)
kernel: tls: (CVE-2024-36489)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.