{"id":"RHSA-2020:4609","summary":"Red Hat Security Advisory: kernel-rt security and bug fix update","modified":"2026-02-26T10:03:00Z","published":"2024-09-13T22:43:00Z","upstream":["CVE-2019-15917","CVE-2019-15925","CVE-2019-16231","CVE-2019-16233","CVE-2019-18808","CVE-2019-18809","CVE-2019-19046","CVE-2019-19056","CVE-2019-19062","CVE-2019-19063","CVE-2019-19068","CVE-2019-19072","CVE-2019-19319","CVE-2019-19332","CVE-2019-19447","CVE-2019-19524","CVE-2019-19533","CVE-2019-19537","CVE-2019-19543","CVE-2019-19767","CVE-2019-19770","CVE-2019-20054","CVE-2019-20636","CVE-2019-9455","CVE-2019-9458","CVE-2020-0305","CVE-2020-10732","CVE-2020-10751","CVE-2020-10774","CVE-2020-10942","CVE-2020-11565","CVE-2020-11668","CVE-2020-12655","CVE-2020-12659","CVE-2020-12770","CVE-2020-12826","CVE-2020-14381","CVE-2020-25641","CVE-2020-8647","CVE-2020-8648","CVE-2020-8649","CVE-2021-3715"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:4609"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1733495"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1759052"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1760100"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1760310"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1760420"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1774946"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1774963"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1774988"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1775015"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1775021"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1775097"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1777418"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1777449"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779046"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779594"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1781679"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1781810"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1783459"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1783534"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1783561"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1784130"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1786160"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1786179"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790063"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1802555"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1802559"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1802563"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1817718"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1819377"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1819399"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1822077"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1824059"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1824792"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1824918"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1831399"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1832543"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1832876"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1833196"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1834845"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1839634"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1843410"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1846964"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1852298"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1859590"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1860065"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1874311"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1881424"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4609.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-9455"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-9455"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9455"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-9458"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-9458"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9458"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-15917"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-15917"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15917"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-15925"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-15925"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15925"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-16231"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-16231"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16231"},{"type":"ARTICLE","url":"https://lkml.org/lkml/2019/9/9/487"},{"type":"ARTICLE","url":"https://security.netapp.com/advisory/ntap-20191004-0001/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-16233"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-16233"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16233"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-18808"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-18808"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18808"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-18809"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-18809"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18809"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19046"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19046"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19046"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19056"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19056"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19056"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19062"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19062"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19062"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19063"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19063"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19063"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19068"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19068"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19068"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19072"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19072"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19072"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19319"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19319"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19319"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19332"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19332"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19332"},{"type":"ARTICLE","url":"https://lore.kernel.org/kvm/000000000000ea5ec20598d90e50@google.com/"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2019/12/16/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19447"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19447"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19447"},{"type":"ARTICLE","url":"https://bugzilla.kernel.org/show_bug.cgi?id=205433"},{"type":"ARTICLE","url":"https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19524"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19524"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19524"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19533"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19533"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19533"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19537"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19537"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19537"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19543"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19543"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19543"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19767"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19767"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19767"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19770"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19770"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19770"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-20054"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-20054"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20054"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-20636"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-20636"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20636"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-0305"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-0305"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-0305"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68faa679b8be1a74e6663c21c3a9d25d32f1c079"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-8647"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-8647"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8647"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-8648"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-8648"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8648"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-8649"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-8649"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8649"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-10732"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-10732"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10732"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-10751"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-10751"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10751"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6"},{"type":"ARTICLE","url":"https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2020/04/30/5"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-10774"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-10774"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10774"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-10942"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-10942"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10942"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-11565"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-11565"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11565"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-11668"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-11668"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11668"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-12655"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-12655"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-12655"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-12659"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-12659"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-12659"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-12770"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-12770"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-12770"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-12826"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-12826"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-12826"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1e7fd6462ca9fc76650fbe6ca800e35b24267da"},{"type":"ARTICLE","url":"https://lists.openwall.net/linux-kernel/2020/03/24/1803"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/kernel-hardening/2020/03/25/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-14381"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-14381"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-14381"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-25641"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-25641"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-25641"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124"},{"type":"ARTICLE","url":"https://www.kernel.org/doc/html/latest/block/biovecs.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3715"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1993988"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3715"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3715"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359"}],"affected":[{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-240.rt7.54.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:4609.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}