{"id":"RHSA-2023:2736","summary":"Red Hat Security Advisory: kernel-rt security and bug fix update","modified":"2026-05-05T10:02:14Z","published":"2024-09-13T23:27:17Z","upstream":["CVE-2021-26341","CVE-2021-33655","CVE-2021-33656","CVE-2021-47592","CVE-2022-1462","CVE-2022-1679","CVE-2022-1789","CVE-2022-20141","CVE-2022-2196","CVE-2022-25265","CVE-2022-2663","CVE-2022-3028","CVE-2022-30594","CVE-2022-3239","CVE-2022-3522","CVE-2022-3524","CVE-2022-3564","CVE-2022-3566","CVE-2022-3567","CVE-2022-3619","CVE-2022-3623","CVE-2022-3625","CVE-2022-3628","CVE-2022-36879","CVE-2022-3707","CVE-2022-39188","CVE-2022-39189","CVE-2022-41218","CVE-2022-4129","CVE-2022-41674","CVE-2022-42703","CVE-2022-42720","CVE-2022-42721","CVE-2022-42722","CVE-2022-43750","CVE-2022-4662","CVE-2022-47929","CVE-2022-48695","CVE-2023-0394","CVE-2023-0461","CVE-2023-1095","CVE-2023-1195","CVE-2023-1582","CVE-2023-2177","CVE-2023-22998","CVE-2023-23454"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:2736"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2055499"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2061703"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2078466"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2084125"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2085300"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090723"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108691"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108696"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2114937"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122228"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122960"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2123056"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2124788"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2127985"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2130141"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133483"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134377"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134451"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134506"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134517"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134528"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2137979"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143893"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143943"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2144720"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150947"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150960"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150979"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150999"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151270"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154171"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154235"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2160023"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162120"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165721"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2168246"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2168297"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2176192"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2180936"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2736.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-26341"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-26341"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-26341"},{"type":"ARTICLE","url":"https://grsecurity.net/amd_branch_mispredictor_part_2_where_no_cpu_has_gone_before"},{"type":"ARTICLE","url":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1026"},{"type":"ARTICLE","url":"https://www.amd.com/system/files/documents/software-techniques-for-managing-speculation.pdf"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-33655"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-33655"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33655"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-33656"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-33656"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33656"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/releases/5.10.127/vt-drop-old-font-ioctls.patch"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47592"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293235"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47592"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47592"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47592-7ca6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1462"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1462"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1462"},{"type":"ARTICLE","url":"https://seclists.org/oss-sec/2022/q2/155"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1679"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1679"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1679"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/87ilqc7jv9.fsf@kernel.org/t/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1789"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1789"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1789"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-v8pq-23qj-q7x7"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/05/25/2"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2196"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2196"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2196"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2663"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2663"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2663"},{"type":"ARTICLE","url":"https://lore.kernel.org/netfilter-devel/20220826045658.100360-1-dgl@dgl.cx/T/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3028"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3028"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3028"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/ba953a9d89a00c078b85f4b190bc1dde66fe16b5"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3239"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3239"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3239"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c08eadca1bdfa099e20a32f8fa4b52b2f672236d"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3522"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3522"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3522"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20221004193400.110155-3-peterx@redhat.com/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3524"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3524"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3524"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3564"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3564"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3564"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=89f9f3cb86b1c63badaf392a83dd661d56cc50b1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3566"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3566"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3566"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3567"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3567"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3567"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3619"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3619"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3619"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193"},{"type":"ARTICLE","url":"https://vuldb.com/?id.211918"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3623"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3623"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3623"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3625"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3625"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3625"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=6b4db2e528f650c7fb712961aac36455468d5902"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3628"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3628"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3628"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295"},{"type":"ARTICLE","url":"https://seclists.org/oss-sec/2022/q4/60"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3707"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3707"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3707"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz@163.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-4129"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-4129"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4129"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-4662"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2155788"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-4662"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4662"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20220913140355.910732567@linuxfoundation.org/"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA@mail.gmail.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-20141"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-20141"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-20141"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/igmp.c?h=v5.19&id=23d2b94043ca8835bd1e67749020e839f396a1c2"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-25265"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-25265"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25265"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294"},{"type":"ARTICLE","url":"https://github.com/x0reaxeax/exec-prot-bypass"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-30594"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-30594"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-30594"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-36879"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2119855"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-36879"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-36879"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-39188"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-39188"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-39188"},{"type":"ARTICLE","url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=2329"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b67fbebd4cf980aecbcc750e1462128bffe8ae15"},{"type":"ARTICLE","url":"https://lore.kernel.org/stable/20220831191348.3388208-1-jannh@google.com/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-39189"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-39189"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-39189"},{"type":"ARTICLE","url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=2309"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-41218"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-41218"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41218"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20220908132754.30532-1-tiwai@suse.de/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-41674"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-41674"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41674"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/10/13/2"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-42703"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-42703"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42703"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2555283eb40df89945557273121e9393ef9b542b"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-42720"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-42720"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42720"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-42721"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-42721"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42721"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-42722"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-42722"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42722"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-43750"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-43750"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-43750"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/a659daf63d16aa883be42f3f34ff84235c302198"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-47929"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-47929"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-47929"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48695"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278999"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48695"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48695"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050348-CVE-2022-48695-8a9e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0394"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-0394"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0394"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2023/01/18/2"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0461"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-0461"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0461"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1095"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173973"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1095"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1095"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1195"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1195"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1195"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1582"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1582"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1582"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-mm/Yg6ac8WlwtnDH6M0@kroah.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-2177"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187953"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-2177"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2177"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-22998"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182429"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-22998"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22998"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-23454"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-23454"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-23454"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12"}],"affected":[{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.10.1.rt7.274.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2736.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}