Lucene search

K
redhatRedHatRHSA-2024:6990
HistorySep 24, 2024 - 12:05 a.m.

(RHSA-2024:6990) Important: kernel-rt security update

2024-09-2400:05:53
access.redhat.com
4
kernel-rt packages
real time linux kernel
determinism requirements
cve-2023-52489
cve-2021-47393
cve-2021-47559
cve-2024-40984
cve-2024-40995
cve-2022-48773
cve-2022-48786
cve-2022-48799
cve-2022-48816
cve-2024-41055
cve-2024-41071
security update

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

16.4%

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • kernel: mm/sparsemem: fix race in accessing memory_section->usage (CVE-2023-52489)

  • kernel: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs (CVE-2021-47393)

  • kernel: net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk() (CVE-2021-47559)

  • kernel: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." (CVE-2024-40984)

  • kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (CVE-2024-40995)

  • kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create (CVE-2022-48773)

  • kernel: vsock: remove vsock from connected table when connect is interrupted by a signal (CVE-2022-48786)

  • kernel: perf: Fix list corruption in perf_cgroup_switch() (CVE-2022-48799)

  • kernel: SUNRPC: lock against ->sock changing during sysfs read (CVE-2022-48816)

  • kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() (CVE-2024-41055)

  • kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing (CVE-2024-41071)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

16.4%