RHEL 8 : kernel-rt (RHSA-2024:7001)

high Nessus Plugin ID 207656

Synopsis

The remote Red Hat host is missing one or more security updates for kernel-rt.

Description

The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2024:7001 advisory.

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):

CVE-2023-6040 CVE-2024-26595 CVE-2021-46984 CVE-2023-52478 CVE-2023-52476 CVE-2023-52522 CVE-2021-47101 CVE-2021-47097 CVE-2023-52605 CVE-2024-26645 CVE-2024-26665 CVE-2024-26720 CVE-2024-26717 CVE-2024-26769 CVE-2024-26894 CVE-2024-26880 CVE-2024-26855 CVE-2024-26923 CVE-2024-26939 CVE-2024-27013 CVE-2024-27042 CVE-2024-35809 CVE-2023-52683 CVE-2024-35884 CVE-2024-35877 CVE-2024-35944 CVE-2024-35989 CVE-2021-47412 CVE-2021-47393 CVE-2021-47386 CVE-2021-47385 CVE-2021-47384 CVE-2021-47383 CVE-2021-47432 CVE-2021-47352 CVE-2021-47338 CVE-2021-47321 CVE-2021-47289 CVE-2021-47287 CVE-2023-52817 CVE-2023-52840 CVE-2021-47441 CVE-2021-47466 CVE-2021-47455 CVE-2021-47497 CVE-2021-47560 CVE-2021-47527 CVE-2024-36883 CVE-2024-36920 CVE-2024-36902 CVE-2024-36953 CVE-2024-36939 CVE-2024-36901 CVE-2021-47582 CVE-2021-47609 CVE-2024-38619 CVE-2022-48754 CVE-2022-48760 CVE-2024-38581 CVE-2024-38570 CVE-2024-38559 CVE-2024-38558 CVE-2024-37356 CVE-2024-39471 CVE-2024-39499 CVE-2024-39501 CVE-2024-39506 CVE-2024-40904 CVE-2024-40911 CVE-2024-40912 CVE-2024-40929 CVE-2024-40931 CVE-2024-40941 CVE-2024-40954 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40972 CVE-2024-40977 CVE-2024-40978 CVE-2024-40988 CVE-2024-40989 CVE-2024-40995 CVE-2024-40997 CVE-2024-40998 CVE-2024-41005 CVE-2024-40901 CVE-2024-41007 CVE-2024-41008 CVE-2022-48804 CVE-2022-48836 CVE-2022-48866 CVE-2024-41090 CVE-2024-41091 CVE-2024-41012 CVE-2024-41013 CVE-2024-41014 CVE-2024-41035 CVE-2024-41038 CVE-2024-41039 CVE-2024-41040 CVE-2024-41041 CVE-2024-41044 CVE-2024-41055 CVE-2024-41056 CVE-2024-41060 CVE-2024-41071 CVE-2024-41076 CVE-2024-41097 CVE-2024-42084 CVE-2024-42090 CVE-2024-42096 CVE-2024-42114 CVE-2024-42124 CVE-2024-42131 CVE-2024-42152 CVE-2024-42154 CVE-2024-42226 CVE-2024-42228 CVE-2024-42237 CVE-2024-42238 CVE-2024-42240 CVE-2024-42246 CVE-2024-42322 CVE-2024-43871 For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL kernel-rt package based on the guidance in RHSA-2024:7001.

See Also

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=2258012

https://bugzilla.redhat.com/show_bug.cgi?id=2258013

https://bugzilla.redhat.com/show_bug.cgi?id=2260038

https://bugzilla.redhat.com/show_bug.cgi?id=2265799

https://bugzilla.redhat.com/show_bug.cgi?id=2266358

https://bugzilla.redhat.com/show_bug.cgi?id=2266750

https://bugzilla.redhat.com/show_bug.cgi?id=2267036

https://bugzilla.redhat.com/show_bug.cgi?id=2267041

https://bugzilla.redhat.com/show_bug.cgi?id=2267795

https://bugzilla.redhat.com/show_bug.cgi?id=2267916

https://bugzilla.redhat.com/show_bug.cgi?id=2267925

https://bugzilla.redhat.com/show_bug.cgi?id=2268295

https://bugzilla.redhat.com/show_bug.cgi?id=2271648

https://bugzilla.redhat.com/show_bug.cgi?id=2271796

https://bugzilla.redhat.com/show_bug.cgi?id=2272793

https://bugzilla.redhat.com/show_bug.cgi?id=2273141

https://bugzilla.redhat.com/show_bug.cgi?id=2273148

https://bugzilla.redhat.com/show_bug.cgi?id=2273180

https://bugzilla.redhat.com/show_bug.cgi?id=2275661

https://bugzilla.redhat.com/show_bug.cgi?id=2275690

https://bugzilla.redhat.com/show_bug.cgi?id=2275742

https://bugzilla.redhat.com/show_bug.cgi?id=2277171

https://bugzilla.redhat.com/show_bug.cgi?id=2278220

https://bugzilla.redhat.com/show_bug.cgi?id=2278270

https://bugzilla.redhat.com/show_bug.cgi?id=2278447

https://bugzilla.redhat.com/show_bug.cgi?id=2281217

https://bugzilla.redhat.com/show_bug.cgi?id=2281317

https://bugzilla.redhat.com/show_bug.cgi?id=2281704

https://bugzilla.redhat.com/show_bug.cgi?id=2281720

https://bugzilla.redhat.com/show_bug.cgi?id=2301544

https://bugzilla.redhat.com/show_bug.cgi?id=2303077

http://www.nessus.org/u?5e5dffaf

https://access.redhat.com/errata/RHSA-2024:7001

https://bugzilla.redhat.com/show_bug.cgi?id=2281807

https://bugzilla.redhat.com/show_bug.cgi?id=2281847

https://bugzilla.redhat.com/show_bug.cgi?id=2282324

https://bugzilla.redhat.com/show_bug.cgi?id=2282345

https://bugzilla.redhat.com/show_bug.cgi?id=2282354

https://bugzilla.redhat.com/show_bug.cgi?id=2282355

https://bugzilla.redhat.com/show_bug.cgi?id=2282356

https://bugzilla.redhat.com/show_bug.cgi?id=2282357

https://bugzilla.redhat.com/show_bug.cgi?id=2282366

https://bugzilla.redhat.com/show_bug.cgi?id=2282401

https://bugzilla.redhat.com/show_bug.cgi?id=2282422

https://bugzilla.redhat.com/show_bug.cgi?id=2282440

https://bugzilla.redhat.com/show_bug.cgi?id=2282508

https://bugzilla.redhat.com/show_bug.cgi?id=2282511

https://bugzilla.redhat.com/show_bug.cgi?id=2282676

https://bugzilla.redhat.com/show_bug.cgi?id=2282757

https://bugzilla.redhat.com/show_bug.cgi?id=2282851

https://bugzilla.redhat.com/show_bug.cgi?id=2282890

https://bugzilla.redhat.com/show_bug.cgi?id=2282903

https://bugzilla.redhat.com/show_bug.cgi?id=2282918

https://bugzilla.redhat.com/show_bug.cgi?id=2283389

https://bugzilla.redhat.com/show_bug.cgi?id=2283424

https://bugzilla.redhat.com/show_bug.cgi?id=2284271

https://bugzilla.redhat.com/show_bug.cgi?id=2284515

https://bugzilla.redhat.com/show_bug.cgi?id=2284545

https://bugzilla.redhat.com/show_bug.cgi?id=2284596

https://bugzilla.redhat.com/show_bug.cgi?id=2284628

https://bugzilla.redhat.com/show_bug.cgi?id=2284634

https://bugzilla.redhat.com/show_bug.cgi?id=2293247

https://bugzilla.redhat.com/show_bug.cgi?id=2293270

https://bugzilla.redhat.com/show_bug.cgi?id=2293273

https://bugzilla.redhat.com/show_bug.cgi?id=2293304

https://bugzilla.redhat.com/show_bug.cgi?id=2293377

https://bugzilla.redhat.com/show_bug.cgi?id=2293408

https://bugzilla.redhat.com/show_bug.cgi?id=2293423

https://bugzilla.redhat.com/show_bug.cgi?id=2293440

https://bugzilla.redhat.com/show_bug.cgi?id=2293441

https://bugzilla.redhat.com/show_bug.cgi?id=2293658

https://bugzilla.redhat.com/show_bug.cgi?id=2294313

https://bugzilla.redhat.com/show_bug.cgi?id=2297471

https://bugzilla.redhat.com/show_bug.cgi?id=2297473

https://bugzilla.redhat.com/show_bug.cgi?id=2297478

https://bugzilla.redhat.com/show_bug.cgi?id=2297488

https://bugzilla.redhat.com/show_bug.cgi?id=2297495

https://bugzilla.redhat.com/show_bug.cgi?id=2297496

https://bugzilla.redhat.com/show_bug.cgi?id=2297513

https://bugzilla.redhat.com/show_bug.cgi?id=2297515

https://bugzilla.redhat.com/show_bug.cgi?id=2297525

https://bugzilla.redhat.com/show_bug.cgi?id=2297538

https://bugzilla.redhat.com/show_bug.cgi?id=2297542

https://bugzilla.redhat.com/show_bug.cgi?id=2297543

https://bugzilla.redhat.com/show_bug.cgi?id=2297544

https://bugzilla.redhat.com/show_bug.cgi?id=2297556

https://bugzilla.redhat.com/show_bug.cgi?id=2297561

https://bugzilla.redhat.com/show_bug.cgi?id=2297562

https://bugzilla.redhat.com/show_bug.cgi?id=2297572

https://bugzilla.redhat.com/show_bug.cgi?id=2297573

https://bugzilla.redhat.com/show_bug.cgi?id=2297579

https://bugzilla.redhat.com/show_bug.cgi?id=2297581

https://bugzilla.redhat.com/show_bug.cgi?id=2297582

https://bugzilla.redhat.com/show_bug.cgi?id=2297589

https://bugzilla.redhat.com/show_bug.cgi?id=2297706

https://bugzilla.redhat.com/show_bug.cgi?id=2297909

https://bugzilla.redhat.com/show_bug.cgi?id=2298079

https://bugzilla.redhat.com/show_bug.cgi?id=2298140

https://bugzilla.redhat.com/show_bug.cgi?id=2298177

https://bugzilla.redhat.com/show_bug.cgi?id=2298640

https://bugzilla.redhat.com/show_bug.cgi?id=2299240

https://bugzilla.redhat.com/show_bug.cgi?id=2299336

https://bugzilla.redhat.com/show_bug.cgi?id=2299452

https://bugzilla.redhat.com/show_bug.cgi?id=2300296

https://bugzilla.redhat.com/show_bug.cgi?id=2300297

https://bugzilla.redhat.com/show_bug.cgi?id=2300402

https://bugzilla.redhat.com/show_bug.cgi?id=2300407

https://bugzilla.redhat.com/show_bug.cgi?id=2300408

https://bugzilla.redhat.com/show_bug.cgi?id=2300409

https://bugzilla.redhat.com/show_bug.cgi?id=2300410

https://bugzilla.redhat.com/show_bug.cgi?id=2300414

https://bugzilla.redhat.com/show_bug.cgi?id=2300429

https://bugzilla.redhat.com/show_bug.cgi?id=2300430

https://bugzilla.redhat.com/show_bug.cgi?id=2300434

https://bugzilla.redhat.com/show_bug.cgi?id=2300448

https://bugzilla.redhat.com/show_bug.cgi?id=2300453

https://bugzilla.redhat.com/show_bug.cgi?id=2300492

https://bugzilla.redhat.com/show_bug.cgi?id=2300533

https://bugzilla.redhat.com/show_bug.cgi?id=2300552

https://bugzilla.redhat.com/show_bug.cgi?id=2300713

https://bugzilla.redhat.com/show_bug.cgi?id=2301477

https://bugzilla.redhat.com/show_bug.cgi?id=2301489

https://bugzilla.redhat.com/show_bug.cgi?id=2301496

https://bugzilla.redhat.com/show_bug.cgi?id=2301519

https://bugzilla.redhat.com/show_bug.cgi?id=2301522

Plugin Details

Severity: High

ID: 207656

File Name: redhat-RHSA-2024-7001.nasl

Version: 1.4

Type: local

Agent: unix

Published: 9/24/2024

Updated: 11/11/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-41071

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:kernel-rt, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-core, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-devel, p-cpe:/a:redhat:enterprise_linux:kernel-rt-devel, p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm, p-cpe:/a:redhat:enterprise_linux:kernel-rt-core, p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules-extra, p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules-extra, cpe:/o:redhat:rhel_eus:8.10, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/24/2024

Vulnerability Publication Date: 3/7/2022

Reference Information

CVE: CVE-2021-46984, CVE-2021-47097, CVE-2021-47101, CVE-2021-47287, CVE-2021-47289, CVE-2021-47321, CVE-2021-47338, CVE-2021-47352, CVE-2021-47383, CVE-2021-47384, CVE-2021-47385, CVE-2021-47386, CVE-2021-47393, CVE-2021-47412, CVE-2021-47432, CVE-2021-47441, CVE-2021-47455, CVE-2021-47466, CVE-2021-47497, CVE-2021-47527, CVE-2021-47560, CVE-2021-47582, CVE-2021-47609, CVE-2022-48619, CVE-2022-48754, CVE-2022-48760, CVE-2022-48804, CVE-2022-48836, CVE-2022-48866, CVE-2023-52470, CVE-2023-52476, CVE-2023-52478, CVE-2023-52522, CVE-2023-52605, CVE-2023-52683, CVE-2023-52817, CVE-2023-52840, CVE-2023-6040, CVE-2024-23848, CVE-2024-26595, CVE-2024-26645, CVE-2024-26649, CVE-2024-26665, CVE-2024-26717, CVE-2024-26720, CVE-2024-26769, CVE-2024-26855, CVE-2024-26880, CVE-2024-26894, CVE-2024-26923, CVE-2024-26939, CVE-2024-27013, CVE-2024-27042, CVE-2024-35809, CVE-2024-35877, CVE-2024-35884, CVE-2024-35944, CVE-2024-35989, CVE-2024-36883, CVE-2024-36901, CVE-2024-36902, CVE-2024-36920, CVE-2024-36939, CVE-2024-36953, CVE-2024-37356, CVE-2024-38558, CVE-2024-38559, CVE-2024-38570, CVE-2024-38581, CVE-2024-38619, CVE-2024-39471, CVE-2024-39499, CVE-2024-39501, CVE-2024-39506, CVE-2024-40901, CVE-2024-40904, CVE-2024-40911, CVE-2024-40912, CVE-2024-40929, CVE-2024-40931, CVE-2024-40941, CVE-2024-40954, CVE-2024-40958, CVE-2024-40959, CVE-2024-40960, CVE-2024-40972, CVE-2024-40977, CVE-2024-40978, CVE-2024-40988, CVE-2024-40989, CVE-2024-40995, CVE-2024-40997, CVE-2024-40998, CVE-2024-41005, CVE-2024-41007, CVE-2024-41008, CVE-2024-41012, CVE-2024-41013, CVE-2024-41014, CVE-2024-41035, CVE-2024-41038, CVE-2024-41039, CVE-2024-41040, CVE-2024-41041, CVE-2024-41044, CVE-2024-41055, CVE-2024-41056, CVE-2024-41060, CVE-2024-41071, CVE-2024-41076, CVE-2024-41090, CVE-2024-41091, CVE-2024-41097, CVE-2024-42084, CVE-2024-42090, CVE-2024-42096, CVE-2024-42114, CVE-2024-42124, CVE-2024-42131, CVE-2024-42152, CVE-2024-42154, CVE-2024-42226, CVE-2024-42228, CVE-2024-42237, CVE-2024-42238, CVE-2024-42240, CVE-2024-42246, CVE-2024-42322, CVE-2024-43871

CWE: 119, 122, 125, 130, 158, 190, 20, 362, 369, 372, 388, 400, 401, 402, 404, 416, 457, 476, 665, 667, 690, 754, 787, 820, 822, 825, 833, 835, 911, 96, 99

RHSA: 2024:7001