{"id":"RHSA-2021:4140","summary":"Red Hat Security Advisory: kernel-rt security and bug fix update","modified":"2026-03-21T10:30:31.869158Z","published":"2024-09-13T23:13:13Z","upstream":["CVE-2019-14615","CVE-2020-0427","CVE-2020-24502","CVE-2020-24503","CVE-2020-24504","CVE-2020-24586","CVE-2020-24587","CVE-2020-24588","CVE-2020-26139","CVE-2020-26140","CVE-2020-26141","CVE-2020-26143","CVE-2020-26144","CVE-2020-26145","CVE-2020-26146","CVE-2020-26147","CVE-2020-29368","CVE-2020-29660","CVE-2020-36158","CVE-2020-36312","CVE-2020-36386","CVE-2021-0129","CVE-2021-20194","CVE-2021-20239","CVE-2021-23133","CVE-2021-28950","CVE-2021-28971","CVE-2021-29155","CVE-2021-29646","CVE-2021-29650","CVE-2021-31440","CVE-2021-31829","CVE-2021-31916","CVE-2021-33033","CVE-2021-33200","CVE-2021-3348","CVE-2021-3489","CVE-2021-3564","CVE-2021-3573","CVE-2021-3600","CVE-2021-3635","CVE-2021-3659","CVE-2021-3679","CVE-2021-3732","CVE-2021-46905","CVE-2022-20166"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2021:4140"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1875275"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1902412"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1903244"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1905747"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1906522"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1912683"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1913348"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1919893"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1921958"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1923636"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1930376"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1930379"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1930381"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1941762"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1941784"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1945345"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1945388"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1946965"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1948772"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951595"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1957788"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1959559"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1959642"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1959654"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1959657"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1959663"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1960490"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1960492"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1960496"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1960498"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1960500"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1960502"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1960504"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1964028"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1964139"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1965038"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1965458"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1966578"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1969489"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1975949"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1976946"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1981954"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1989165"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1995249"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4140.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-14615"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1789209"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-14615"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14615"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-0427"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-0427"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-0427"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-24502"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-24502"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-24502"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-24503"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-24503"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-24503"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-24504"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-24504"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-24504"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-24586"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-24586"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-24586"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-24587"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-24587"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-24587"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-24588"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-24588"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-24588"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-26139"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-26139"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26139"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-26140"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-26140"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26140"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-26141"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-26141"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26141"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-26143"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-26143"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26143"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-26144"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-26144"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26144"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-26145"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-26145"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26145"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-26146"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-26146"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26146"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-26147"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-26147"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26147"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-29368"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-29368"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-29368"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-29660"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-29660"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-29660"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-36158"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-36158"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36158"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-36312"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1947991"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-36312"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36312"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-36386"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-36386"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36386"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-0129"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-0129"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-0129"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3348"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3348"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3348"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3489"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3489"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3489"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2021/05/11/10"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3564"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3564"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3564"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2021/05/25/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3573"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3573"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3573"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2021/06/08/2"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3600"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3600"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3600"},{"type":"ARTICLE","url":"https://lore.kernel.org/patchwork/patch/1379497/"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2021/06/23/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3635"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3635"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3635"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3659"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3659"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3659"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3679"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3679"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3679"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3732"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3732"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3732"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-20194"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-20194"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-20194"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-20239"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-20239"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-20239"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-23133"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-23133"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23133"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-28950"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-28950"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28950"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-28971"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-28971"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28971"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-29155"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-29155"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-29155"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2021/04/18/4"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-29646"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-29646"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-29646"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-29650"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-29650"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-29650"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-31440"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-31440"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-31440"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36"},{"type":"ARTICLE","url":"https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-31829"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-31829"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-31829"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-31916"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-31916"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-31916"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a"},{"type":"ARTICLE","url":"https://seclists.org/oss-sec/2021/q1/268"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-33033"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1961300"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-33033"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33033"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-33200"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-33200"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33200"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2021/05/27/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46905"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2266253"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46905"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46905"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-20166"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122089"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-20166"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-20166"}],"affected":[{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.rt7.130.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4140.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}