{"id":"RHSA-2018:3096","summary":"Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update","modified":"2026-01-14T11:01:57.569802Z","published":"2024-09-13T19:49:33Z","upstream":["CVE-2015-8830","CVE-2016-4913","CVE-2017-0861","CVE-2017-10661","CVE-2017-17805","CVE-2017-18208","CVE-2017-18232","CVE-2017-18344","CVE-2017-18360","CVE-2018-1000026","CVE-2018-10322","CVE-2018-10878","CVE-2018-10879","CVE-2018-10881","CVE-2018-10883","CVE-2018-10902","CVE-2018-1092","CVE-2018-1094","CVE-2018-10940","CVE-2018-1118","CVE-2018-1120","CVE-2018-1130","CVE-2018-13405","CVE-2018-18690","CVE-2018-5344","CVE-2018-5391","CVE-2018-5803","CVE-2018-5848","CVE-2018-7740","CVE-2018-7757","CVE-2018-8781"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3096"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/articles/3553061"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.6_Release_Notes/index.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1314275"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1337528"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1481136"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1510602"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1512875"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1528312"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1533909"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1541846"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1551051"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1551565"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1552867"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1553351"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1553361"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1558066"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1560777"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1560788"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1563994"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1569910"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1571062"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1571623"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1573699"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1575472"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1576419"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1577408"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1590720"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1590799"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1596802"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1596806"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1596828"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1596846"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1599161"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1608672"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1609664"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1610958"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3096.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8830"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8830"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8830"},{"type":"ARTICLE","url":"http://seclists.org/oss-sec/2016/q2/479"},{"type":"ARTICLE","url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=735"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4913"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4913"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4913"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-0861"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-0861"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0861"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-10661"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-10661"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-10661"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-17805"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-17805"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17805"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-18208"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-18208"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18208"},{"type":"ARTICLE","url":"https://lwn.net/Articles/618064/"},{"type":"ARTICLE","url":"https://www.kernel.org/doc/Documentation/filesystems/dax.txt"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-18232"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-18232"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18232"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-18344"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-18344"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18344"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-18360"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1671343"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-18360"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18360"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1092"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1092"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1092"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1094"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1094"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1094"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1118"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1118"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1118"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1120"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1120"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1120"},{"type":"ARTICLE","url":"http://seclists.org/oss-sec/2018/q2/122"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1130"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1130"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1130"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-5344"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-5344"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5344"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-5391"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-5391"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5391"},{"type":"ADVISORY","url":"https://www.kb.cert.org/vuls/id/641765"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-5803"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-5803"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5803"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-5848"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-5848"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5848"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-7740"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-7740"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-7740"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-7757"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-7757"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-7757"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-8781"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-8781"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8781"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-10322"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-10322"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10322"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-10878"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-10878"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10878"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-10879"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-10879"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10879"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-10881"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-10881"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10881"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-10883"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-10883"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10883"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-10902"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-10902"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10902"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-10940"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-10940"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10940"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-13405"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-13405"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-13405"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-18690"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1643988"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-18690"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-18690"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000026"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000026"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000026"}],"affected":[{"package":{"name":"kernel-rt","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-957.rt56.910.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3096.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-957.rt56.910.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3096.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-957.rt56.910.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3096.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-957.rt56.910.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3096.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-957.rt56.910.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3096.json"}},{"package":{"name":"kernel-rt-debug-kvm-debuginfo","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-957.rt56.910.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3096.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-957.rt56.910.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3096.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-957.rt56.910.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3096.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-957.rt56.910.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3096.json"}},{"package":{"name":"kernel-rt-doc","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-957.rt56.910.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3096.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-957.rt56.910.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3096.json"}},{"package":{"name":"kernel-rt-kvm-debuginfo","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-kvm-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-957.rt56.910.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3096.json"}},{"package":{"name":"kernel-rt-trace","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-trace"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-957.rt56.910.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3096.json"}},{"package":{"name":"kernel-rt-trace-debuginfo","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-trace-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-957.rt56.910.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3096.json"}},{"package":{"name":"kernel-rt-trace-devel","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-trace-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-957.rt56.910.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3096.json"}},{"package":{"name":"kernel-rt-trace-kvm","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-trace-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-957.rt56.910.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3096.json"}},{"package":{"name":"kernel-rt-trace-kvm-debuginfo","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-957.rt56.910.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3096.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}