{"id":"RHSA-2022:1975","summary":"Red Hat Security Advisory: kernel-rt security and bug fix update","modified":"2026-03-21T10:30:39.091316Z","published":"2024-09-13T22:48:28Z","upstream":["CVE-2020-0404","CVE-2020-13974","CVE-2020-27820","CVE-2021-0941","CVE-2021-20322","CVE-2021-26401","CVE-2021-29154","CVE-2021-3612","CVE-2021-3669","CVE-2021-37159","CVE-2021-3743","CVE-2021-3744","CVE-2021-3752","CVE-2021-3759","CVE-2021-3764","CVE-2021-3772","CVE-2021-3773","CVE-2021-3923","CVE-2021-4002","CVE-2021-4037","CVE-2021-4083","CVE-2021-4093","CVE-2021-4157","CVE-2021-41864","CVE-2021-4197","CVE-2021-4203","CVE-2021-42739","CVE-2021-43389","CVE-2021-43976","CVE-2021-44733","CVE-2021-45485","CVE-2021-45486","CVE-2021-47435","CVE-2021-47544","CVE-2021-47556","CVE-2021-47590","CVE-2021-47614","CVE-2022-0001","CVE-2022-0002","CVE-2022-0286","CVE-2022-0322","CVE-2022-0850","CVE-2022-1011","CVE-2022-3105","CVE-2022-3106","CVE-2022-3108","CVE-2023-0459","CVE-2023-3022"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2022:1975"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1901726"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1903578"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1905749"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1919791"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1946684"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951739"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1974079"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1985353"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986473"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1997467"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1997961"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1999544"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1999675"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2000627"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2000694"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2004949"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2010463"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2013180"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2014230"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016169"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2018205"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2025003"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2025726"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2027239"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2029923"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2030747"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034342"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2035652"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2036934"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2037019"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2039911"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2039914"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2042822"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2061700"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2061712"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2061721"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2064855"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1975.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-0404"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-0404"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-0404"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-13974"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-13974"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-13974"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-27820"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-27820"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27820"},{"type":"ARTICLE","url":"https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/"},{"type":"ARTICLE","url":"https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/"},{"type":"ARTICLE","url":"https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-0941"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-0941"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-0941"},{"type":"ARTICLE","url":"https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3612"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3612"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3612"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3669"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3669"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3669"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3743"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3743"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3743"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb"},{"type":"ARTICLE","url":"https://lists.openwall.net/netdev/2021/08/17/124"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3744"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3744"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3744"},{"type":"ARTICLE","url":"https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3752"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3752"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3752"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2021/09/15/4"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3759"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3759"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3759"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3764"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3764"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3764"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3772"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3772"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3772"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3773"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3773"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3773"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3923"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2019643"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3923"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3923"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-4002"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-4002"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4002"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2021/11/25/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-4037"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-4037"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4037"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-4083"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-4083"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4083"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-4093"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2028584"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-4093"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4093"},{"type":"ARTICLE","url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=2222"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-4157"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-4157"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4157"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-4197"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-4197"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4197"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-4203"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-4203"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4203"},{"type":"ARTICLE","url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=2230&can=7&q=modified-after%3Atoday-30&sort=-modified&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve&cells=tiles&redir=1"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814"},{"type":"ARTICLE","url":"https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-20322"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-20322"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-20322"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-26401"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-26401"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-26401"},{"type":"ARTICLE","url":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-29154"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-29154"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-29154"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-37159"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-37159"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37159"},{"type":"ARTICLE","url":"https://www.spinics.net/lists/linux-usb/msg202228.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-41864"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-41864"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-41864"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-42739"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-42739"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-42739"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-43389"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-43389"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43389"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d"},{"type":"ARTICLE","url":"https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-43976"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-43976"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43976"},{"type":"ARTICLE","url":"https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-44733"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-44733"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44733"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-45485"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-45485"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-45485"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-45486"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-45486"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-45486"},{"type":"ARTICLE","url":"https://arxiv.org/pdf/2112.09604.pdf"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47435"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282879"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47435"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47435"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47544"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2283406"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47544"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47544"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47556"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2283393"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47556"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47556"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47590"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293237"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47590"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47590"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47614"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293265"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47614"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47614"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0001"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0001"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0001"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"},{"type":"ARTICLE","url":"https://www.vusec.net/projects/bhi-spectre-bhb/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0002"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0002"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0002"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0286"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0286"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0286"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0322"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0322"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0322"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0850"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2060606"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0850"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0850"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe"},{"type":"ARTICLE","url":"https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1011"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1011"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1011"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3105"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2153067"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3105"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3105"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3106"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2153066"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3106"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3106"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3108"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2153052"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3108"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3108"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0459"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2216383"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-0459"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0459"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3022"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2211440"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-3022"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3022"}],"affected":[{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.rt7.166.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1975.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}]}