{"id":"RHSA-2024:2950","summary":"Red Hat Security Advisory: kernel-rt security and bug fix update","modified":"2026-03-31T10:04:29Z","published":"2024-09-24T08:36:38Z","upstream":["CVE-2019-13631","CVE-2019-15505","CVE-2020-25656","CVE-2021-3753","CVE-2021-4204","CVE-2022-0500","CVE-2022-23222","CVE-2022-3565","CVE-2022-45934","CVE-2023-1513","CVE-2023-24023","CVE-2023-25775","CVE-2023-28464","CVE-2023-31083","CVE-2023-3567","CVE-2023-37453","CVE-2023-38409","CVE-2023-39189","CVE-2023-39192","CVE-2023-39193","CVE-2023-39194","CVE-2023-39198","CVE-2023-4133","CVE-2023-4244","CVE-2023-42754","CVE-2023-42755","CVE-2023-45863","CVE-2023-51779","CVE-2023-51780","CVE-2023-52340","CVE-2023-52434","CVE-2023-52448","CVE-2023-52489","CVE-2023-52574","CVE-2023-52580","CVE-2023-52581","CVE-2023-52597","CVE-2023-52620","CVE-2023-6121","CVE-2023-6176","CVE-2023-6622","CVE-2023-6915","CVE-2023-6932","CVE-2024-0841","CVE-2024-25742","CVE-2024-25743","CVE-2024-26602","CVE-2024-26609","CVE-2024-26671"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:2950"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1731000"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1746732"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1888726"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1999589"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2039178"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043520"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044578"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150953"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151959"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177759"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179892"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213132"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218332"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219359"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221039"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221463"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221702"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2226777"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2226784"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2226787"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2226788"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2230042"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231410"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2235306"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2239845"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2239847"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2244720"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250043"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253632"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254961"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254982"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255283"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256490"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256822"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257682"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257979"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265285"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265653"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267695"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267750"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267760"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267761"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2269189"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2269217"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270836"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270883"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2272811"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2950.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-13631"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-13631"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13631"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-15505"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-15505"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15505"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-25656"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-25656"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-25656"},{"type":"ARTICLE","url":"https://lkml.org/lkml/2020/10/16/84"},{"type":"ARTICLE","url":"https://lkml.org/lkml/2020/10/29/528"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3753"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3753"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3753"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2021/09/01/4"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-4204"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-4204"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4204"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/01/11/4"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0500"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0500"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0500"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=20b2aff4bc15bda809f994761d5719827d66c0b4"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=216e3cd2f28dbbf1fe86848e0e29e6693b9f0a20"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34d3a78c681e8e7844b43d1a2f4671a04249c821"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4807322660d4290ac9062c034aed6b87243861"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48946bd6a5d695c50b34546864b79c1f910a33c1"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c25b2ae136039ffa820c26138ed4a5e5f3ab3841"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf9f2f8d62eca810afbd1ee6cc0800202b000e57"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3565"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3565"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3565"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-23222"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-23222"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23222"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/01/13/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-45934"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-45934"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45934"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=ae4569813a6e931258db627cdfe50dfb4f917d5d"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1513"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1513"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1513"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3567"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-3567"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3567"},{"type":"ARTICLE","url":"https://www.spinics.net/lists/stable-commits/msg285184.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4133"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-4133"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4133"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4244"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-4244"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4244"},{"type":"ARTICLE","url":"https://lore.kernel.org/netdev/20230810070830.24064-1-pablo@netfilter.org/"},{"type":"ARTICLE","url":"https://lore.kernel.org/netdev/20230815223011.7019-1-fw@strlen.de/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6121"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6121"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6121"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6176"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6176"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6176"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cfaa80c91f6f99b9342b6557f0f0e1143e434066"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6622"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6622"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6622"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/3701cd390fd731ee7ae8b8006246c8db82c72bea"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6915"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6915"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6915"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/af73483f4e8b6f5c68c9aa63257bdd929a9c194a"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6932"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6932"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6932"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24023"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-24023"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-24023"},{"type":"ARTICLE","url":"https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/bluffs-vulnerability/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25775"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-25775"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25775"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00794.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-28464"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-28464"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28464"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2023/03/28/2"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-31083"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-31083"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-31083"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/drivers/bluetooth/hci_ldisc.c?h=v6.6-rc7&id=9c33663af9ad115f90c076a1828129a3fbadea98"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-37453"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-37453"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-37453"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-38409"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-38409"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38409"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=fffb0b52d5258554c645c966c6cbef7de50b851d"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-39189"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-39189"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39189"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-39192"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-39192"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39192"},{"type":"ARTICLE","url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-18408/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-39193"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-39193"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39193"},{"type":"ARTICLE","url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-18866/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-39194"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-39194"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39194"},{"type":"ARTICLE","url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-18111/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-39198"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-39198"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39198"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-42754"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-42754"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-42754"},{"type":"ARTICLE","url":"https://seclists.org/oss-sec/2023/q4/14"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-42755"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-42755"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-42755"},{"type":"ARTICLE","url":"https://seclists.org/oss-sec/2023/q3/229"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-45863"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-45863"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-45863"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-51779"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-51779"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-51779"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-51780"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-51780"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-51780"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52340"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52340"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52340"},{"type":"ARTICLE","url":"https://alas.aws.amazon.com/cve/html/CVE-2023-52340.html"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=af6d10345ca76670c1b7c37799f0d5576ccef277"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52434"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52434"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52434"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=17a0f64cc02d4972e21c733d9f21d1c512963afa"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=af1689a9b7701d9907dfc84d2a4b57c4bc907144"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022033-makeshift-flammable-cb72@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52448"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52448"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52448"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022255-CVE-2023-52448-7bf2@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52489"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52489"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52489"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/20240229155245.1571576-30-lee@kernel.org/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52574"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52574"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52574"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030256-CVE-2023-52574-a423@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52580"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52580"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52580"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030258-CVE-2023-52580-c37e@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52581"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52581"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52581"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030258-CVE-2023-52581-2165@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52597"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2268311"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52597"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52597"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030646-CVE-2023-52597-2ed6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52620"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52620"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52620"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024032147-CVE-2023-52620-11a9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-0841"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-0841"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0841"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-25742"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-25742"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-25742"},{"type":"ARTICLE","url":"https://arxiv.org/html/2404.03526v1"},{"type":"ARTICLE","url":"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-25743"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-25743"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-25743"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26602"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26602"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26602"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/944d5fe50f3f03daacfea16300e656a1691c4a23"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022414-CVE-2024-26602-5e76@gregkh/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26609"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26609"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26671"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26671"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26671"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040219-CVE-2024-26671-2543@gregkh/T"}],"affected":[{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.rt7.342.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2950.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H"}]}