First published: Tue Nov 21 2023(Updated: )
Important: kernel-rt security update
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Red Hat Enterprise Linux for Real Time | ||
Red Hat Red Hat Enterprise Linux for Real Time for NFV | ||
redhat/kernel-rt | <3.10.0-1160.105.1.rt56.1256.el7 | 3.10.0-1160.105.1.rt56.1256.el7 |
redhat/kernel-rt | <3.10.0-1160.105.1.rt56.1256.el7 | 3.10.0-1160.105.1.rt56.1256.el7 |
redhat/kernel-rt-debug | <3.10.0-1160.105.1.rt56.1256.el7 | 3.10.0-1160.105.1.rt56.1256.el7 |
redhat/kernel-rt-debug-debuginfo | <3.10.0-1160.105.1.rt56.1256.el7 | 3.10.0-1160.105.1.rt56.1256.el7 |
redhat/kernel-rt-debug-devel | <3.10.0-1160.105.1.rt56.1256.el7 | 3.10.0-1160.105.1.rt56.1256.el7 |
redhat/kernel-rt-debuginfo | <3.10.0-1160.105.1.rt56.1256.el7 | 3.10.0-1160.105.1.rt56.1256.el7 |
redhat/kernel-rt-devel | <3.10.0-1160.105.1.rt56.1256.el7 | 3.10.0-1160.105.1.rt56.1256.el7 |
redhat/kernel-rt-doc | <3.10.0-1160.105.1.rt56.1256.el7 | 3.10.0-1160.105.1.rt56.1256.el7 |
redhat/kernel-rt-trace | <3.10.0-1160.105.1.rt56.1256.el7 | 3.10.0-1160.105.1.rt56.1256.el7 |
redhat/kernel-rt-trace-debuginfo | <3.10.0-1160.105.1.rt56.1256.el7 | 3.10.0-1160.105.1.rt56.1256.el7 |
redhat/kernel-rt-trace-devel | <3.10.0-1160.105.1.rt56.1256.el7 | 3.10.0-1160.105.1.rt56.1256.el7 |
redhat/kernel-rt-debug-kvm | <3.10.0-1160.105.1.rt56.1256.el7 | 3.10.0-1160.105.1.rt56.1256.el7 |
redhat/kernel-rt-debug-kvm-debuginfo | <3.10.0-1160.105.1.rt56.1256.el7 | 3.10.0-1160.105.1.rt56.1256.el7 |
redhat/kernel-rt-kvm | <3.10.0-1160.105.1.rt56.1256.el7 | 3.10.0-1160.105.1.rt56.1256.el7 |
redhat/kernel-rt-kvm-debuginfo | <3.10.0-1160.105.1.rt56.1256.el7 | 3.10.0-1160.105.1.rt56.1256.el7 |
redhat/kernel-rt-trace-kvm | <3.10.0-1160.105.1.rt56.1256.el7 | 3.10.0-1160.105.1.rt56.1256.el7 |
redhat/kernel-rt-trace-kvm-debuginfo | <3.10.0-1160.105.1.rt56.1256.el7 | 3.10.0-1160.105.1.rt56.1256.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:7424 is high, with a severity value of 7.
The following software packages are affected: kernel-rt, kernel-rt-debug, kernel-rt-debug-debuginfo, kernel-rt-debug-devel, kernel-rt-debuginfo, kernel-rt-devel, kernel-rt-doc, kernel-rt-trace, kernel-rt-trace-debuginfo, kernel-rt-trace-devel, kernel-rt-debug-kvm, kernel-rt-debug-kvm-debuginfo, kernel-rt-kvm, kernel-rt-kvm-debuginfo, kernel-rt-trace-kvm, kernel-rt-trace-kvm-debuginfo.
To fix the vulnerability in RHSA-2023:7424, update the affected software packages to version 3.10.0-1160.105.1.rt56.1256.el7 or higher.
You can find more information about RHSA-2023:7424 in the Red Hat Bugzilla reports: [link1](https://bugzilla.redhat.com/show_bug.cgi?id=2223949), [link2](https://bugzilla.redhat.com/show_bug.cgi?id=2225097), [link3](https://bugzilla.redhat.com/show_bug.cgi?id=2225191).
The CWE ID for RHSA-2023:7424 is 416.