{"id":"RHSA-2020:4062","summary":"Red Hat Security Advisory: kernel-rt security and bug fix update","modified":"2026-03-04T10:02:34Z","published":"2024-09-13T22:42:29Z","upstream":["CVE-2017-18551","CVE-2018-20836","CVE-2019-15217","CVE-2019-15807","CVE-2019-15917","CVE-2019-16231","CVE-2019-16233","CVE-2019-16994","CVE-2019-17053","CVE-2019-17055","CVE-2019-18808","CVE-2019-19046","CVE-2019-19055","CVE-2019-19058","CVE-2019-19059","CVE-2019-19062","CVE-2019-19063","CVE-2019-19332","CVE-2019-19447","CVE-2019-19523","CVE-2019-19524","CVE-2019-19530","CVE-2019-19534","CVE-2019-19537","CVE-2019-19767","CVE-2019-19807","CVE-2019-20054","CVE-2019-20095","CVE-2019-20636","CVE-2019-9454","CVE-2019-9458","CVE-2020-10690","CVE-2020-10732","CVE-2020-10742","CVE-2020-10751","CVE-2020-10942","CVE-2020-11565","CVE-2020-12770","CVE-2020-12826","CVE-2020-14305","CVE-2020-1749","CVE-2020-2732","CVE-2020-8647","CVE-2020-8649","CVE-2020-9383"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:4062"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.9_release_notes/index"},{"type":"ARTICLE","url":"https://access.redhat.com/articles/5442481"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1427551"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1707796"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1745528"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1747216"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1757368"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1758242"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1758248"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1759681"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1760100"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1760310"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1760420"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1774988"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1775015"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1775021"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1775042"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1775047"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1775074"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1777418"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779594"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1781679"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1783434"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1783459"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1783518"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1783540"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1783561"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1786078"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1786160"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788009"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790063"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1791954"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1802555"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1802563"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1805135"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1809833"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1810685"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1817141"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1817718"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1818818"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1819377"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1822077"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1824059"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1824918"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1831399"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1834845"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1835127"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1839634"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1850716"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4062.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-18551"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-18551"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18551"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-20836"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-20836"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20836"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-9454"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-9454"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9454"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-9458"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-9458"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9458"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-15217"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-15217"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15217"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-15807"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-15807"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15807"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-15917"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-15917"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15917"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-16231"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-16231"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16231"},{"type":"ARTICLE","url":"https://lkml.org/lkml/2019/9/9/487"},{"type":"ARTICLE","url":"https://security.netapp.com/advisory/ntap-20191004-0001/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-16233"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-16233"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16233"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-16994"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-16994"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16994"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-17053"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-17053"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17053"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-17055"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-17055"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17055"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-18808"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-18808"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18808"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19046"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19046"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19046"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19055"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19055"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19055"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19058"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19058"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19058"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19059"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19059"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19059"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19062"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19062"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19062"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19063"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19063"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19063"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19332"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19332"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19332"},{"type":"ARTICLE","url":"https://lore.kernel.org/kvm/000000000000ea5ec20598d90e50@google.com/"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2019/12/16/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19447"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19447"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19447"},{"type":"ARTICLE","url":"https://bugzilla.kernel.org/show_bug.cgi?id=205433"},{"type":"ARTICLE","url":"https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19523"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19523"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19523"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19524"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19524"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19524"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19530"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19530"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19530"},{"type":"ARTICLE","url":"http://seclists.org/oss-sec/2019/q4/115"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2019/12/03/4"},{"type":"ARTICLE","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c52873e5a1ef72f845526d9f6a50704433f9c625"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19534"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19534"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19534"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19537"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19537"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19537"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19767"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19767"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19767"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19807"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19807"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19807"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-20054"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-20054"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20054"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-20095"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-20095"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20095"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-20636"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-20636"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20636"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-1749"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-1749"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1749"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-2732"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-2732"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2732"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-8647"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-8647"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8647"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-8649"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-8649"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8649"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-9383"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-9383"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-9383"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-10690"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-10690"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10690"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-10732"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-10732"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10732"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-10742"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-10742"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10742"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-10751"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-10751"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10751"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6"},{"type":"ARTICLE","url":"https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2020/04/30/5"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-10942"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-10942"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10942"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-11565"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-11565"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11565"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-12770"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-12770"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-12770"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-12826"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-12826"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-12826"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1e7fd6462ca9fc76650fbe6ca800e35b24267da"},{"type":"ARTICLE","url":"https://lists.openwall.net/linux-kernel/2020/03/24/1803"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/kernel-hardening/2020/03/25/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-14305"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-14305"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-14305"},{"type":"ARTICLE","url":"https://bugs.openvz.org/browse/OVZ-7188"},{"type":"ARTICLE","url":"https://patchwork.ozlabs.org/project/netfilter-devel/patch/c2385b5c-309c-cc64-2e10-a0ef62897502@virtuozzo.com/"}],"affected":[{"package":{"name":"kernel-rt","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.rt56.1131.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4062.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.rt56.1131.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4062.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.rt56.1131.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4062.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.rt56.1131.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4062.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.rt56.1131.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4062.json"}},{"package":{"name":"kernel-rt-debug-kvm-debuginfo","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.rt56.1131.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4062.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.rt56.1131.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4062.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.rt56.1131.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4062.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.rt56.1131.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4062.json"}},{"package":{"name":"kernel-rt-doc","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.rt56.1131.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4062.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.rt56.1131.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4062.json"}},{"package":{"name":"kernel-rt-kvm-debuginfo","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-kvm-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.rt56.1131.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4062.json"}},{"package":{"name":"kernel-rt-trace","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-trace"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.rt56.1131.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4062.json"}},{"package":{"name":"kernel-rt-trace-debuginfo","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-trace-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.rt56.1131.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4062.json"}},{"package":{"name":"kernel-rt-trace-devel","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-trace-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.rt56.1131.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4062.json"}},{"package":{"name":"kernel-rt-trace-kvm","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-trace-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.rt56.1131.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4062.json"}},{"package":{"name":"kernel-rt-trace-kvm-debuginfo","ecosystem":"Red Hat:rhel_extras_rt:7","purl":"pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.10.0-1160.rt56.1131.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4062.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}