CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
kernel: Bluetooth: af_bluetooth: Fix deadlock (CVE-2024-26886)
kernel: crypto: qat - resolve race condition during AER recovery (CVE-2024-26974)
kernel: tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (CVE-2023-52880)
kernel: cpufreq: exit() callback is optional (CVE-2024-38615)
kernel: cppc_cpufreq: Fix possible null pointer dereference (CVE-2024-38573)
kernel: scsi: qedf: Ensure the copied buf is NUL terminated (CVE-2024-38559)
kernel: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." (CVE-2024-40984)
kernel: sched/deadline: Fix task_struct reference leak (CVE-2024-41023)
kernel: mm/filemap: skip to create PMD-sized page cache if needed (CVE-2024-41031)
kernel: mm/shmem: disable PMD-sized page cache if needed (CVE-2024-42241)
kernel: mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray (CVE-2024-42243)
kernel: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket (CVE-2024-42246)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.