First published: Tue Apr 02 2024(Updated: )
Important: kernel-rt security and bug fix update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <4.18.0-513.24.1.rt7.326.el8_9 | 4.18.0-513.24.1.rt7.326.el8_9 |
redhat/kernel-rt | <4.18.0-513.24.1.rt7.326.el8_9 | 4.18.0-513.24.1.rt7.326.el8_9 |
redhat/kernel-rt-core | <4.18.0-513.24.1.rt7.326.el8_9 | 4.18.0-513.24.1.rt7.326.el8_9 |
redhat/kernel-rt-debug | <4.18.0-513.24.1.rt7.326.el8_9 | 4.18.0-513.24.1.rt7.326.el8_9 |
redhat/kernel-rt-debug-core | <4.18.0-513.24.1.rt7.326.el8_9 | 4.18.0-513.24.1.rt7.326.el8_9 |
redhat/kernel-rt-debug-debuginfo | <4.18.0-513.24.1.rt7.326.el8_9 | 4.18.0-513.24.1.rt7.326.el8_9 |
redhat/kernel-rt-debug-devel | <4.18.0-513.24.1.rt7.326.el8_9 | 4.18.0-513.24.1.rt7.326.el8_9 |
redhat/kernel-rt-debug-modules | <4.18.0-513.24.1.rt7.326.el8_9 | 4.18.0-513.24.1.rt7.326.el8_9 |
redhat/kernel-rt-debug-modules-extra | <4.18.0-513.24.1.rt7.326.el8_9 | 4.18.0-513.24.1.rt7.326.el8_9 |
redhat/kernel-rt-debuginfo | <4.18.0-513.24.1.rt7.326.el8_9 | 4.18.0-513.24.1.rt7.326.el8_9 |
redhat/kernel-rt-devel | <4.18.0-513.24.1.rt7.326.el8_9 | 4.18.0-513.24.1.rt7.326.el8_9 |
redhat/kernel-rt-modules | <4.18.0-513.24.1.rt7.326.el8_9 | 4.18.0-513.24.1.rt7.326.el8_9 |
redhat/kernel-rt-modules-extra | <4.18.0-513.24.1.rt7.326.el8_9 | 4.18.0-513.24.1.rt7.326.el8_9 |
redhat/kernel-rt-debug-kvm | <4.18.0-513.24.1.rt7.326.el8_9 | 4.18.0-513.24.1.rt7.326.el8_9 |
redhat/kernel-rt-kvm | <4.18.0-513.24.1.rt7.326.el8_9 | 4.18.0-513.24.1.rt7.326.el8_9 |
Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service | ||
Red Hat Enterprise Linux for Real Time |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2024:1614 is classified as important due to security and bug fixes in the kernel-rt package.
To fix RHSA-2024:1614, you need to update the kernel-rt packages to version 4.18.0-513.24.1.rt7.326.el8_9.
RHSA-2024:1614 affects Red Hat Enterprise Linux for Real Time and Red Hat Enterprise Linux for Real Time for NFV.
RHSA-2024:1614 addresses a NULL pointer dereference vulnerability in the vmwgfx driver.
Yes, the specific package version you need for RHSA-2024:1614 is 4.18.0-513.24.1.rt7.326.el8_9.